About
Articles by Dave
-
CrowdStrike Winter Release: What the !@#$ is next-generation?
CrowdStrike Winter Release: What the !@#$ is next-generation?
By Dave Cole
-
5 Reasons Endpoint Security Must Move To The Cloud
5 Reasons Endpoint Security Must Move To The Cloud
By Dave Cole
Activity
-
Today reminds me of the famous Daniel Kahneman experiment with colonoscopy patients. Crowdstrike likely saved many customers countless hours of pain…
Today reminds me of the famous Daniel Kahneman experiment with colonoscopy patients. Crowdstrike likely saved many customers countless hours of pain…
Liked by Dave Cole
-
hello everyone - we are excited to come out of stealth after 2.5 years of building an exceptional team, kick ass platform and cadre of early…
hello everyone - we are excited to come out of stealth after 2.5 years of building an exceptional team, kick ass platform and cadre of early…
Liked by Dave Cole
Experience & Education
Publications
-
Crimeware: Understanding New Attacks and Defenses
Addison-Wesley Professional
-
Special Ops: Host and Network Security for Microsoft, Unix, and Oracle
Syngress
I wrote a short section on vulnerability assessment & management practices.
Other authorsSee publication
Patents
-
System and Method of Managing Network Security Risks
Issued US 8201257
A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and…
A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets. The security risk management system provides tools for performing preventive action and for tracking the success of preventive action.
Other inventorsSee patent -
Customized Alerting of Users to Probable Data Theft
Issued US 7873999
Computer-implemented methods, systems, and computer-readable media for determining (200) an action time when an action is taken regarding an executable content; storing (205) the action time with an indication of the executable content; storing (215) an entry time and an indication of the entered data source when the data processing system enters one of the plurality of data sources; receiving (220) an indication that the executable content is infected with a malicious code; receiving (225) an…
Computer-implemented methods, systems, and computer-readable media for determining (200) an action time when an action is taken regarding an executable content; storing (205) the action time with an indication of the executable content; storing (215) an entry time and an indication of the entered data source when the data processing system enters one of the plurality of data sources; receiving (220) an indication that the executable content is infected with a malicious code; receiving (225) an indication of a data source targeted by the malicious code; scanning the data processing system for the malicious code at a scan time; storing (230) the scan time; determining (245) whether one of the plurality of data sources corresponds to the targeted data source; and when it is determined that one of the plurality of data sources corresponds to the targeted data source, determining (255) whether the entry time occurs after the action time and before the scan time; and when it is determined that the entry time occurs after the action time and before the scan time, sending (260) a warning regarding the potential threat.
-
Threat Personalization
Issued US 7841008
A determination is made as to whether there is a correlation between a user's security risk profile and a personalized threat profile of an actual or spreading threat. If there is a correlation, a personalized reactive alert is issued in the case of an actual threat. The personalized reactive alert informs the user of specific suspected data that may have been compromised by the threat and the specific non-computer related action that the user should take. Further, if there is a correlation, a…
A determination is made as to whether there is a correlation between a user's security risk profile and a personalized threat profile of an actual or spreading threat. If there is a correlation, a personalized reactive alert is issued in the case of an actual threat. The personalized reactive alert informs the user of specific suspected data that may have been compromised by the threat and the specific non-computer related action that the user should take. Further, if there is a correlation, a personalized proactive alert is issued and/or personalized proactive protective action taken in the case of a spreading threat. The personalized proactive alert informs the user of the spreading threat that the user and/or the user's host computer system is particularly susceptible to. Further, the personalized proactive protective action taken provides automated risk mitigation.
-
System and Method for Network Vulnerability Detection and Reporting
Issued US 7152105
A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical…
A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
Other inventorsSee patent
Languages
-
Spanish
Limited working proficiency
-
Japanese
Elementary proficiency
Recommendations received
2 people have recommended Dave
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Dave Cole in United States
-
Dave Cole
-
Dave Cole
-
Dave Cole
Omnissa, Senior Director and Head of US Public Sector Sales
-
Dave Cole
Chief Operating Officer at Willy's Fresh Salsa
1613 others named Dave Cole in United States are on LinkedIn
See others named Dave Cole