About Our Authors
Brad is the director of corporate compliance at Solutionary and all-around go-to guy! His blogs, much like himself, are all over the board, including compliance, physical security, security policy management and training. Brad is on hiatus from blogging at the moment because of a busy audit season but hopes to return and leave his mark on the Interwebs again soon!
When Brad isn't focused on ensuring we meet our compliance objectives or running his kids around town, he's busy collecting and listening to vinyl records, attending metal and rock concerts, and hunting anything in season.
Christopher Barber is a threat analyst with the Solutionary Security Engineering ResearchTeam (SERT). He is a Certified Information Systems Security Professional (CISSP) and a Certified Ethical Hacker (CEHv7) specializing in emerging threat intelligence, digital forensics and vulnerability research. Currently he is finishing his master’s degree in electrical engineering from Louisiana Tech University specializing in cyber security. His research background covers control systems, wireless sensor networks, cognitive radio and micro aerial vehicles.
In 2012 he was the team lead for the DC3 Digital Forensics Team (0x4BAD00D5) which finished third out of eight in the U.S. Graduate Team Division, fifth out of 14 in the Graduate Overall Division, 27th out of 114 in the U.S. Teams Division, and 42nd overall out of the 188 teams participating in the Grand Champion Division.
Court's focus at Solutionary is on product development of the company's managed service offerings. Using his 10+ years of experience in networking technology and security, Court addresses topics like vulnerability scanning, security monitoring, and the consulting/penetration testing skill set in his blog posts.
Court is a self-professed rabid college sports fan - basketball, football, hockey - he loves it all! When he's not spending time with his family, his favorite activity is "destroying" himself on either his road bike or his mountain bike.
Chief Security Strategist Don Gray has a penchant for IT security that can be summed up in his own wise words: "Security follows the laws of quantum mechanics - as soon as you measure it, it changes."
In his blog posts, Don offers high-level coverage of security technology, industry trends and breaking news that involves the security industry as a whole.
In his spare time, he enjoys practicing his skills on the saxophone and rooting for the Pittsburgh Steelers.
Doug is a member of Solutionary's pre-sales engineering team. As the technical lead on the account team, he is responsible for all technical aspects of the solution design. Doug insures that Solutionary services meet the client's information security, compliance, and business objectives. Doug will tap into his experiences in the "pre-sales security trenches" to focus his blog on information and data security challenges that the client faces on a daily basis.
When Doug is not helping clients solve information security initiatives, he is playing electric guitars in a rock band, taking long rides on his BMW motorcycle, or shooting his Glock 19 pistol at the firing range.
I am a global information security professional with over 13 years of experience in cyber security. I’ve traveled to various parts of the world including Brazil, Dubai and Singapore, to share cyber security information, experience, attack trends and ideas with other top security professionals.
My first career was not as a cyber security professional. My first choice was explosive demolitions in the United States Marines where I had plenty of fun coming up with new ways to blow things up. I was famous for my C-4 snowman. However, I have always been interested in cyber security ever since my special screening of the movie “Hackers”.
Areas of Focus
I thrive on anything cyber security related: latest attacks, exploits, policies, procedures, security postures, vulnerability management, data encryption, SIEM technology, incident response, or future technology attack vectors/areas.
When I'm not working or reading the latest cyber security news, you can find me either fishing from “anything” that floats or writing/producing music. I also play basketball in a year round league, known for my tenacious defense and sinister smile. Last but not least, I enjoy a good prank. Oddly enough, it only takes six hours to “Aluminum Foil” a cubicle and everything inside it. If you ever find everything in your office taped, or plastic wrapped to your desk…. It wasn’t me.
Jacob Faires is a research analyst with the Solutionary Security Engineering Research Team (SERT). Jacob specializes in the areas of malware analysis, reverse engineering and threat countermeasures.
In his free time, Jacob likes to spend time rock climbing, skydiving and spending time outdoors in general. His philosophy is if you don't get scared on your day off, you didn't have a very fun day.
Jeremy Scott is a research analyst with the Solutionary Security Engineering Research Team (SERT). Jeremy currently holds several industry certifications and specializes in malware analysis, reverse engineering, and threat intelligence.
When Jeremy isn't in front of the computer, he enjoys spending time with his family and going to the gym. He has also found a new love for competing in obstacle courses like the Warrior Dash, which makes getting out from in front of the computer once in a while more important.
In his posts, Jon will discuss "practical security." In other words, he'll be taking a look at common sense within the realm of IT security, practical security measures, security measurement (ROI, effectiveness) and security awareness and education.
When Jon isn't contemplating common sense and practicality in security measures, he enjoys playing video games and collecting comic books (he's accumulated more than 12,000 since he started collecting in 1966) and swords. His collection includes several museum pieces - a Samurai Daisho (Katana, Wakizashi, and Tanto set, genuine folded steel with 1024 layers) and a 16th century Italian rapier. Jon is also a wealth of information (and an asset to any Trivial Pursuit team) with knowledge that includes the airspeed of a fully laden swallow!
My blog posts will focus on Internal Penetration Tests, External Penetration Tests, Vulnerability Management, Application Assessments and Vulnerability Research.
Fun facts about me: I love cold pizza and the Dallas cowboys, which are both bad for my heart. I enjoy playing basketball, rock shows, reading underground security E-zines and drinking beers with my friends.
Joseph (J.B.) Blankenship
Joseph, or J.B. as he’s known to all of us, is the Web 2.0 brain of “Solutionary Minds”. With over 14 years of experience in some of the leading organizations in the information security, IT and telecommunications industries, J.B. joined the Solutionary team in 2010 as the Senior Director of Product Marketing and Strategy and was promoted to Director of Marketing in 2011.
A McAfee alum, blended threats are not J.B.’s only interests. In addition to being Solutionary’s resident craft beer aficionado, J.B. is an avid outdoorsman – enjoying cycling and hiking. Among his talents: chili making and beach bumming. Other hobbies include listening to music until his ears bleed, and reading. Unfortunately for him, J.B. is also a long-suffering Auburn football fan.
I’m an avid runner and marathoner. I’ve completed six marathons in the last five years, and plan on completing at least one marathon each year of my life going forward.
In my spare time, I explore and work in education and social entrepreneurship, and am a founding board member and finance committee chair of People’s Preparatory Charter School in Newark, NJ. I also used to DJ quite a bit over the years, especially house music, and have a pretty big record collection.
I love dogs, especially my boxer, Nina.
My areas of interest to blog in:
- Challenges of implementing an effective security monitoring program for any enterprise, large to small
- Growing economic dependencies on safe and reliable online computing, and the real social impact of information security
- Challenges of effective correlation for any security intelligence system
As Solutionary's President and CTO, Mike focuses on strategy and direction for the company's IT functions, information security and business continuance best practices. His blog posts will cover a wide variety of security topics, industry trends and current events and news.
When he's not at the office, Mike enjoys driving his ProAM race car, flying small aircraft and competing in BBQ contests with his top-secret recipe brisket.
Ramece is a research analyst with the Solutionary Security Engineering Research Team (SERT). Ramece focuses on the areas of malware analysis, reverse engineering and packet analysis.
When not at work, Ramece enjoys photography, cooking, reading and catching up on his javelin catching. He has a seemingly endless cache of useless facts and bad jokes (please, don’t get him started). Ramece found his way into IT Security after watching the movie “Hackers”. Fascinated with the pretty lights that occur during hacking, he decided to learn everything he could. After discovering there are no pretty lights in hacking, and that it takes longer then 30 seconds to crack 1024 bit encryption, he intends to keep learning.
Rob Kraus is the Director of Research for the Solutionary Engineering Research Team (SERT). He is a Certified Information Systems Security Professional (CISSP), specializing in vulnerability research, malware analysis, threat intelligence, web application security assessments, external and internal penetration testing, and social engineering.
Rob was previously a manager within Solutionary’s Security Consulting Services group. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration testing, web application penetration tests, and vulnerability research. As a manager, Rob was also responsible for leading and managing a team of penetration testers who performed assessment services for Solutionary’s customers.
In Rob's spare time, he frequently contributes to noted journals, books, and speaks at industry conferences several times a year. He most recently authored Seven Deadliest Microsoft Attacks and Co-Authored Seven Deadliest Network Attacks, part of Syngress' "The Seven Deadliest Attack Series.” Rob was also published in the May 2009 issue of The ISSA Journal for his article “Ethical Hacking – From Start to Success.”
Robert (RJ) Jeffries
Rob "RJ" Jeffries is a Research Analyst with Solutionary's Security Engineering Research Team (SERT), and specializes in making ambiguous situations clear. In doing so, he strives to find relevant, accessible, and pragmatic uses for even the most abstract of datasets.
Fascinated by 'Big Data' and passionate about all things security, RJ was previously with Solutionary's Security Operations Center where he filled various technical and non-technical leadership roles, specializing Intrusion and Vulnerability Analysis.
In his spare time, when RJ is not at the gym or simply thinking about Vintage Honda motorcycle restoration, he tinkers with statistical modeling, visualization techniques and ideas in the hope that it will all make sense some day.
Susan Carter is an incident response team lead with the Solutionary Security Engineering Research Team (SERT). Susan currently holds several industry certifications and specializes in incident handling coordination and computer forensics. Susan came to Solutionary after a two-decade stint working with a contractor for the Department of Energy.
Susan is a mud running, scuba diving, gun loving grandma that has a special interest in personal and computer security. When she’s not hiking, biking, swimming or working, she loves nothing more than spending the day playing with her grandchildren.