PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
April 2002

Information security professional: What's in a name?

On a door inside eEye Digital Security headquarters is a modified zoo sign warning guests not to annoy, torment, pester, plague, molest, vex or worry the engineers within. Two skateboards are parked at the suite's entrance. Among employees in this large lair is Marc Maiffret, the company's chief hacking officer. His hair-blue now, green then-stands out but also fits in with the bluish-purple ("blurple") walls, paper lanterns, candy dispensers and video game paraphernalia that make for funky feng shui. The company, a maker of high-end network security software, last year discovered a vulnerability in Microsoft's IIS Web server and later issued the first warning of malicious code exploiting that flaw. Maiffret and his crew named that worm Code Red after the caffeine-rich soft drink that sustained their long hours of research. At 21, the Southern California native devotes his days to writing code, working on OEM deals, finding vulnerabilities and talking to the press. He bristles when asked about his BMW and his Aliso Viejo, Calif....

Access this PRO+ Content for Free!

Features in this issue

  • Becky Bace: The IDS security den mother

    by  Richard Thieme

    Former NSA employee and "den mother of computer security" Becky Base built an impressive and successful career that has undeniably influenced the industry.

  • Four computer forensics books worth investigating

    by  Gary C. Kessler & Michael Schirling

    Check out four computer forensics books that can help you learn the ins and outs of computer forensics technology and laws in place to manage cybercrime.

  • Do's and don'ts of building a forensics workstation

    by  Elizabeth A. Genco

    Elizabeth Genco explains the pros and cons of building a forensics workstation from scratch. Read now to learn what forensic tools are beneficial and which ones aren't.

Columns in this issue

  • Secure reads: Wireless Security

    by  Randall K. Nichols & Panos C. Lekkas

    Wireless Security offers a detailed overview of wireless security topics and covers big-picture characteristics of today's wireless security technologies.

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

-ADS BY GOOGLE

Close