Welcome!

Microsoft Cloud Authors: Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White, Yeshim Deniz

News Feed Item

Carsten Eiram joins Risk Based Security as Chief Research Officer

Risk Based Security, Inc. announces the appointment of Carsten Eiram, a leading software vulnerability expert, as Chief Research Officer.

RICHMOND, Va., Dec. 4, 2012 /PRNewswire-iReach/ -- Risk Based Security, Inc. today announced that it has appointed Carsten Eiram as Chief Research Officer (CRO). The appointment of Mr. Eiram, a leading vulnerability researcher and reverse engineer, signals a strategic focus on software vulnerability research to drive new product development and improvements in existing solutions.

As CRO, Mr. Eiram will play a leading role in enhancing the quality of Risk Based Security's solutions and promoting Risk Based Security in the security community by contributing to national and international research discussions and vulnerability analysis.

Eiram said, "I am very excited about joining Risk Based Security as they continue to build upon the existing credibility and strength of the OSVDB by adding in-depth vulnerability research. I look forward to working with the Company's visionary management team to bring innovative products, research content, and "outside the box" thinking when conducting vulnerability research and creating/enhancing new security concepts, products and services."

Most recently, Eiram was responsible for managing the Research team at Secunia as well as the core advisories service. Eiram also performed in-depth technical analysis of critical vulnerabilities in closed-source and open-source software and has discovered critical vulnerabilities in high-profile products from major software vendors including Microsoft, Adobe, Apple, Symantec, IBM, Google, Novell, and Trend Micro.

Risk Based Security's CEO, Barry Kouns said, "Carsten is a world-renowned technology leader in vulnerability research and reverse engineering and I look forward to working with him to enhance Risk Based Security's product offerings and further contributing to the security community." 

Eiram is a member of the CVE Editorial Board, has presented at various conferences including RSA and Defcon, is a regular contributor to SC Magazine's "Threat of the Month" column, and has lately performed extensive analysis into the effectiveness of Microsoft's SDL (Security Development Lifecycle) for Microsoft Office.

"Risk Based Security's products will continue to enhance our clients' ability to defend against threats while we contribute to the community at large. There is plenty to do and I can't wait to get started", Eiram said.

About Risk Based Security, Inc.

Risk Based Security equips organizations with vulnerability intelligence, data breach analytics, risk management services, ISO/IEC 27001:2005 consulting, and on-demand security solutions to establish customized risk-based programs to address information security and compliance challenges.

For more information, please visit http://www.riskbasedsecurity.com/ or call 855-RBS-RISK.

Press release submitted by online press release distribution service Submitpressrelease123.com

Media Contact: Barry Kouns Risk Based Security, 855-727-7475, [email protected]

News distributed by PR Newswire iReach: https://ireach.prnewswire.com

 

SOURCE Risk Based Security

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...