whitehat

flowolf

IRL Name: 
Florian Klien
Biography: 

Florian Klien is a student of software development, hobbyist, photographer, webhoster, diver, gourmet, outdoors lover and a computer geek from Austria. He owns the blog http://blog.flo.cx/ which is about Tech, Food and his life.

Pictures: 
References

Matt Devost

IRL Name: 
Matt Devost
Biography: 

Matthew G. Devost is a technologist, entrepreneur, and international security expert specializing in counter terrorism, critical infrastructure protection, intelligence, risk management and cyber-security issues. He founded the Terrorism Research Center in 1996 where he served as President and CEO until November 2008. Mr. Devost has been an Adjunct Professor at Georgetown University since 2002 where he teaches a graduate course on Information Warfare and security, and is a Founding Director of the Cyberconflict Studies Association. He also has held leadership positions at SIGHT Partners, Technical Defense, Security Design International, iDEFENSE and SAIC. Mr. Devost has been a speaker at hundreds of international conferences and a contributor/author to several books on terrorism and information security.

Pictures: 
References

Yuji Ukai

IRL Name: 
Yuji Ukai
Biography: 

Yuji Ukai is currently the he chief executive officer of Fourteenforty Research Institute, Inc, known as a technical opinion leader in Japanese security industry which he co-founded in 2007.

After completing his Ph.D. in computer science at the National University of Tokushima, he began his employment at Kodak research and development center in Japan where he worked on research and development for digital device and embedded security. In 2003, he moved to United States and started working on development of vulnerability scanner product at eEye Digital Security as a Senior Software Engineer. He also worked for research of vulnerability analysis, vulnerability auditing, malware analysis, embedded system security, P2P network security, etc. as a Senior Research Engineer at eEye research group. In 2007, he moved back to Japan and became a co-founder of Fourteenforty Research Institute, Inc.

Pictures: 
References

David Byrne

IRL Name: 
David Byrne
Biography: 

David Byrne has been involved with information security for a decade. Before Trustwave, he was the Security Architect at EchoStar Satellite and the Senior Network Engineer at TIAA-CREF. David frequently presents at security events including DEFCON, Black Hat, Toorcon, SANS, and OWASP AppSec.

References

Cesar Cerrudo

IRL Name: 
Cesar Cerrudo
Biography: 

Cesar is a security researcher and consultant specialized in application security from Argentina. He is regarded as a leading application security researcher and credited for discovering and fixing dozens of vulnerabilities in applications including Microsoft SQL Server, Oracle database server, IBM DB2, Microsoft BizTalk Server, Microsoft Commerce Server, Microsoft Windows, Yahoo! Messenger, etc. which can be found in exploit databases.

Pictures: 
References

Zapotek

IRL Name: 
Anastasios Laskos
Biography: 

Anastasios Laskos a.k.a Zapotek or Tasos is a WebApp Security Consultant and FOSS developer from Greece. Some people call him as 'the Arachni guy' for developing a web application security scanner framework called Arachni.

Pictures: 
References

Lee Felsenstein

IRL Name: 
Lee Felsenstein
Biography: 

Lee Felsenstein was born on 1945 in Philadelphia. He is a computer engineer who played a central role in the development of the personal computer. He was one of the original members of the Homebrew Computer Club and the designer of the Osborne 1, the first mass-produced portable computer. He is a Laureate of the Tech Museum of Innovation for his work on sustainable information and communication systems for the developing world, and has been awarded the Pioneer of the Electronic Frontier award of the Electronic Frontier Foundation. He received his Bachelor’s degree in Electrical Engineering in 1972 from the University of California at Berkeley.

Pictures: 
References

Raphael Mudge

IRL Name: 
Raphael Mudge
Biography: 

Raphael Mudge is a Washington, DC based security engineer and the founder of Strategic Cyber LLC . He is the creator or Armitage, a GUI for Metasploit to help security professionals better understand the hacking process and appreciate what's possible with the powerful Metasploit framework. You can contact him at http://www.hick.org/~raffi/.

Pictures: 
References

Andrés Riancho

IRL Name: 
Andrés Riancho
Biography: 

Andrés Riancho is an information security researcher from Argentina who is the Director of Web security at Rapid7 and founder of Bonsai, where he is mainly involved in Penetration Testing and Vulnerability Research. His main focus has always been the Web Application Security field, in which he developed w3af a Web Application Attack and Audit Framework used extensively by penetration testers and security consultants. Andrés has spoken and hold trainings at many security conferences around the globe, like OWASP World C0n (USA), CanSecWest (Canada), T2 (Finland) and ekoparty (Buenos Aires).

Pictures: 
References

Aseem Jakhar

IRL Name: 
Aseem Jakhar
Biography: 

Aseem Jakhar is a security researcher from Pune Area, India. He has worked on various security software including IBM ISS Proventia UTM appliance, Mirapoint messaging/security appliance, anti-spam engine, anti-virus software, multicast packet reflector, Transparent HTTPS proxy with captive portal, bayesian spam filter to name a few. He is well known in the hacking and security community as the founder of null - The open security community (registered not-for-profit organization, http://null.co.in), the largest security community in India.

He is an active speaker at security and open source conferences; some of the conferences he has spoken at include AusCERT, Defcon, Hack.lu, Blackhat, Xcon, Cyber security summit, Cocon, OSI Days, Clubhack, Gnunify.

Pictures: 
References
Syndicate content