Nick Lewis (CISSP) is an information security architect at Saint Louis University. Nick received his Master of Science in Information Assurance from Norwich University in 2005 and Telecommunications from Michigan State University in 2002. Prior to joining Saint Louis University in 2011, Nick worked at the University of Michigan and previous at Children's Hospital Boston, the primary pediatric teaching hospital of Harvard Medical School, as well as for Internet2 and Michigan State University.
Do you have a question for our experts?
Contributions from Nick Lewis, Enterprise Threats
- How to manage Samsung Android kernel issues for BYOD
- How to manage Google Chrome clickjacking flaw
- How malware evasion techniques affect anti-malware
- How much risk does the WordPress pingback flaw pose?
- What lessons can be learned from Project Blitzkrieg?
- Exploit toolkits explained: How they aid cyberattacks
- Red October deconstructed: What enterprises can learn
- How to stop DNS resolver abuse, DDoS amplification
- How the Blacksheep technique can help detect rootkits
- How to mitigate the database-wiping Narilam malware
- How to defend against the updated Makadocs malware
- Define pen testing scope to reduce risks
- Utilize security flaws in malicious RATs for defense
- Does miniFlame represent a threat to enterprises?
- How blocking HLP files can prevent social engineering
- Assessing the impact of a DKIM protocol vulnerability
- Analyzing updated man-in-the-browser attack techniques
- Be wary of the watering hole ... attack technique
- Android remote-wipe vulnerability defense options
- Evaluating embedded systems security in the enterprise