Nick Lewis (CISSP) is an information security officer at Saint Louis University. Nick received his Master of Science in Information Assurance from Norwich University in 2005 and Telecommunications from Michigan State University in 2002. Prior to joining Saint Louis University in 2011, Nick worked at the University of Michigan and previous at Children's Hospital Boston, the primary pediatric teaching hospital of Harvard Medical School, as well as for Internet2 and Michigan State University.
Do you have a question for our experts?
Contributions from Nick Lewis, Enterprise Threats
- Is attack attribution worthwhile for enterprises?
- How to 'sell' the benefits of threat modeling
- Why bother with Java patching?
- Attack obfuscation: What it is and how to mitigate it
- Inside RAM scrapers: Defending against RAM-scraping malware
- Vobfus and Beebone: Defeating auto-propagating malware
- How to defend against a femtocell hack
- KINS malware: Rootkit vs. bootkit
- How to detect the latest Mac malware evasion techniques
- Advanced volatile threats: Are they a game changer?
- Analyzing the threat of digitally signed malware
- DOM-based XSS vs. typical XSS: What's the difference?
- How does the APT downloader PinkStats work?
- How malware is using DLL preloading to avoid detection
- How Google can help enterprise website blacklisting?
- How to identify malware manipulating Windows EFS
- Locking the backdoor: Mitigating the risk of unauthorized access
- Assessing the threat of proxy auto-config malware
- To detect Web-based malware, look beyond antimalware
- Is TeamViewer safe for sensitive communications?