Ed Skoudis is the founder of Counter Hack, an information security training organization, and a SANS fellow. He previously was founder and Senior Security Consultant with InGuardians, a Washington, DC-based information security consulting firm. His expertise includes information security attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed information security governance and operations teams for Fortune 500 companies, and responded to computer attacks for clients in financial, high technology, health care, and other industries. Ed conducted a demonstration of hacker techniques against financial institutions for the U.S. Senate and is a frequent speaker on issues associated with hacker tools and defenses. In addition to Counter Hack Reloaded, Ed is also the author of Malware: Fighting Malicious Code. He was also awarded 2004, 2005, and 2006 Microsoft MVP awards for Windows Server Security, and is an alumnus of the Honeynet Project. Previous to InGuardians, Ed served as a security consultant with International Network Services (INS), Predictive Systems, Global Integrity, SAIC, and Bell Communications Research (Bellcore).
Do you have a question for our experts?
Contributions from Ed Skoudis, Contributor
- Has ransomware made a comeback?
- Can fuzzing identify cross-site scripting (XSS) vulnerabilities?
- What are the best bot detection tools?
- Will Web browsers ever be fully equipped to detect and remove malware?
- Has cross-site scripting evolved?
- What are the risks of logging into a botnet control channel?
- Will allowing virtual machines increase risk exposure?
- Are iPhone security risks different than those of other mobile devices?
- Finding malware on your Windows box (using the command
- Investigating phone phishing calls
- Can companies control their affiliate-based adware?
- Does SMS spoofing require as much effort as email spoofing?
- Is it possible to detect today's peer-to-peer (P2P) botnets?
- Can an antivirus program's behavior-based functions be judged?
- Do the Common Vulnerabilities and Exposures protect applications?
- Are attackers using malware to exploit service oriented architectures?
- Will fixed-mobile convergence (FMC) create more security risks?
- Is the Storm worm virus still a serious threat?
- Investigating logic bomb attacks and their explosive ef
- Mergers and acquisitions: Building up security after an