-
Nick Lewis (CISSP) is an information security officer at Saint Louis University. Nick received his Master of Science in Information Assurance from Norwich University in 2005 and Telecommunications from Michigan State University in 2002. Prior to joining Saint Louis University in 2011, Nick worked at the University of Michigan and previous at Children's Hospital Boston, the primary pediatric teaching hospital of Harvard Medical School, as well as for Internet2 and Michigan State University.
Read Nick Lewis's advice on information security threats
Ask Nick Lewis your questions about information security threats
-
Do you have a question for our experts?
-
- Follow:
Contributions from Nick Lewis, Enterprise Threats
- Can I trace email origin locations to thwart email attachment viruses?
- Latest computer virus count: Does more malware mean greater threat?
- Is a full vulnerability disclosure strategy a responsible approach?
- Computer hijacking: Protecting against the Microsoft DLL download flaw
- Adobe Flash alternatives: The best way to avoid Adobe Flash malware?
- What does the Stuxnet worm mean for SCADA systems security?
- Creating a third-party security policy to prevent a software exploit
- Prevent a privilege escalation attack with database security policy
- Seeking an ethical hacking career: How to learn ethical hacking
- Managing remote workers: Musts for setting up a secure home network
- Can regional banking Trojans hide from signature-based antivirus?
- AT&T email address security breach: Can hackers track a SIM card?
- Security for Windows XP: Knowing when to update a Windows version
- After Facebook attack, has the threat of clickjacking attacks increased?
- Is there antivirus software that detects malware files via database files?
- Hacking detection: Using a Windows server comparison to find a hack
- Defending against SEO attacks in the enterprise
- Which tools will help in validating form input in a website?
- What controls should be used to block social networking sites?
- Tips on how to remove malware manually
Security Management Strategies for the CIO