Ed Skoudis is the founder of Counter Hack, an information security training organization, and a SANS fellow. He previously was founder and Senior Security Consultant with InGuardians, a Washington, DC-based information security consulting firm. His expertise includes information security attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed information security governance and operations teams for Fortune 500 companies, and responded to computer attacks for clients in financial, high technology, health care, and other industries. Ed conducted a demonstration of hacker techniques against financial institutions for the U.S. Senate and is a frequent speaker on issues associated with hacker tools and defenses. In addition to Counter Hack Reloaded, Ed is also the author of Malware: Fighting Malicious Code. He was also awarded 2004, 2005, and 2006 Microsoft MVP awards for Windows Server Security, and is an alumnus of the Honeynet Project. Previous to InGuardians, Ed served as a security consultant with International Network Services (INS), Predictive Systems, Global Integrity, SAIC, and Bell Communications Research (Bellcore).
Do you have a question for our experts?
Contributions from Ed Skoudis, Contributor
- What tools can remove rookits or prevent their installation?
- How well does virtualization technology defend against malware?
- What are polymorphic viruses?
- Is Warezov a security concern?
- Can intrusion prevention systems alone prevent botnet attacks?
- Cross-site tracing vs. Cross-site scripting
- Interpretting firewall security alert messages
- How does a mail server respond to fake email addresses?
- Who should install handheld device security: Vendors or customers?
- Do USB memory sticks pose enterprise threats?
- Google Code Search -- Finding security flaws has never
- Can simple antispam filters solve the image spam problem?
- What is WiPhishing?
- What new tactics can prevent cross-site scripting attacks?
- Why is spyware still a powerful data theft weapon?
- If a virtual machine is hacked, what are the consequences?
- The case for information security freeware
- Defensive measures for evolving phishing tactics
- How can I prevent an FU rootkit from spreading throughout a network?
- How to reduce wireless driver security vulnerabilities