Nick Lewis (CISSP) is an information security officer at Saint Louis University. Nick received his Master of Science in Information Assurance from Norwich University in 2005 and Telecommunications from Michigan State University in 2002. Prior to joining Saint Louis University in 2011, Nick worked at the University of Michigan and previous at Children's Hospital Boston, the primary pediatric teaching hospital of Harvard Medical School, as well as for Internet2 and Michigan State University.
Do you have a question for our experts?
Contributions from Nick Lewis, Enterprise Threats
- KINS malware: Rootkit vs. bootkit
- How to detect the latest Mac malware evasion techniques
- Advanced volatile threats: Are they a game changer?
- Analyzing the threat of digitally signed malware
- DOM-based XSS vs. typical XSS: What's the difference?
- How does the APT downloader PinkStats work?
- How malware is using DLL preloading to avoid detection
- How Google can help enterprise website blacklisting?
- How to identify malware manipulating Windows EFS
- Locking the backdoor: Mitigating the risk of unauthorized access
- Assessing the threat of proxy auto-config malware
- To detect Web-based malware, look beyond antimalware
- Is TeamViewer safe for sensitive communications?
- How to mitigate new heap spray attack techniques
- Security lessons learned from Facebook's 'red team'
- For HTTPS security, BREACH attack offers important lessons
- Early detection of multi-stage malware attacks
- Inside the PushDo botnet's new capabilities
- Linking attacks: Finding value in attribution
- Understanding and defending AutoIt-based malware attacks