-
Nick Lewis (CISSP) is an information security officer at Saint Louis University. Nick received his Master of Science in Information Assurance from Norwich University in 2005 and Telecommunications from Michigan State University in 2002. Prior to joining Saint Louis University in 2011, Nick worked at the University of Michigan and previous at Children's Hospital Boston, the primary pediatric teaching hospital of Harvard Medical School, as well as for Internet2 and Michigan State University.
Read Nick Lewis's advice on information security threats
Ask Nick Lewis your questions about information security threats
-
Do you have a question for our experts?
-
- Follow:
Contributions from Nick Lewis, Enterprise Threats
- How to stop DNS resolver abuse, DDoS amplification
- How the Blacksheep technique can help detect rootkits
- How to mitigate the database-wiping Narilam malware
- How to defend against the updated Makadocs malware
- Define pen testing scope to reduce risks
- Utilize security flaws in malicious RATs for defense
- Does miniFlame represent a threat to enterprises?
- How blocking HLP files can prevent social engineering
- Assessing the impact of a DKIM protocol vulnerability
- Analyzing updated man-in-the-browser attack techniques
- Be wary of the watering hole ... attack technique
- Android remote-wipe vulnerability defense options
- Evaluating embedded systems security in the enterprise
- How should enterprises advise users on shortened URLs?
- How to secure Oracle's database authentication process
- Data recovery plan essential to Shamoon malware defense
- How to protect iOS users from mobile phishing problems
- Concerned about business logic abuse? Improve the SDLC
- Assessing the security of Adobe's certificates
- Should enterprises worry about NFC security risks?
Security Management Strategies for the CIO