Ed Skoudis is the founder of Counter Hack, an information security training organization, and a SANS fellow. He previously was founder and Senior Security Consultant with InGuardians, a Washington, DC-based information security consulting firm. His expertise includes information security attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed information security governance and operations teams for Fortune 500 companies, and responded to computer attacks for clients in financial, high technology, health care, and other industries. Ed conducted a demonstration of hacker techniques against financial institutions for the U.S. Senate and is a frequent speaker on issues associated with hacker tools and defenses. In addition to Counter Hack Reloaded, Ed is also the author of Malware: Fighting Malicious Code. He was also awarded 2004, 2005, and 2006 Microsoft MVP awards for Windows Server Security, and is an alumnus of the Honeynet Project. Previous to InGuardians, Ed served as a security consultant with International Network Services (INS), Predictive Systems, Global Integrity, SAIC, and Bell Communications Research (Bellcore).
Do you have a question for our experts?
Contributions from Ed Skoudis, Contributor
- How can I prevent an FU rootkit from spreading throughout a network?
- What is 'Trixie' and how do we remove it?
- Laptop crypto: Do it, but realize it's not a panacea
- How to prevent input validation attacks
- What are the security risks associated with virtual PCs?
- Combating phishing scams
- Creating a security awareness program
- How to prevent VoIP phishing
- Avoiding the scourge of DNS amplification attacks
- Shareware applications vs. commercial software
- How to prevent cross-site scripting
- Are there any Trojans or malware that target Blackberries?
- Phishing vs. Pharming attacks
- What is the best antivirus software to use when running Linux?
- How do I secure Windows NT/XP using the NetBIOS and LDAP protocols?
- How to protect your company against cybercrime
- How to protect the network from DoS attacks
- Powerful payloads: The evolution of exploit frameworks
- Don't discount software update sites as attack vectors
- What is spyware? The definition dilemma