Nick Lewis (CISSP) is an information security officer at Saint Louis University. Nick received his Master of Science in Information Assurance from Norwich University in 2005 and Telecommunications from Michigan State University in 2002. Prior to joining Saint Louis University in 2011, Nick worked at the University of Michigan and previous at Children's Hospital Boston, the primary pediatric teaching hospital of Harvard Medical School, as well as for Internet2 and Michigan State University.
Do you have a question for our experts?
Contributions from Nick Lewis, Enterprise Threats
- How to harden Twitter accounts against MITB attacks
- Lessons learned in malware C&C infrastructure
- Why would a toolkit whitelist potential victims?
- Do privileged users always need to be privileged?
- How to react to shifting Web security threats
- Does an Adobe PDF flaw give attackers too much info?
- Is attack attribution worthwhile for enterprises?
- How to 'sell' the benefits of threat modeling
- Why bother with Java patching?
- Attack obfuscation: What it is and how to mitigate it
- Inside RAM scrapers: Defending against RAM-scraping malware
- Vobfus and Beebone: Defeating auto-propagating malware
- How to defend against a femtocell hack
- KINS malware: Rootkit vs. bootkit
- How to detect the latest Mac malware evasion techniques
- Advanced volatile threats: Are they a game changer?
- Analyzing the threat of digitally signed malware
- DOM-based XSS vs. typical XSS: What's the difference?
- How does the APT downloader PinkStats work?
- How malware is using DLL preloading to avoid detection