Tom Parker (information security)
Tom Parker is an English-born author, vulnerability researcher and computer security professional. He has been performing vulnerability research and providing information security expertise to organizations ranging from those in the financial services, petrochemical and software development domains, to large local and federal government institutions, since the mid 1990s.
In 2000 he founded a security consulting company, Global InterSec, to do software security research, and increase awareness of software security vulnerabilities throughout the public and private sectors. He is now a consulting practice director at a Washington DC-based security consulting firm, Securicon LLC, whose customers include large power generation and petrochemical organizations, as well as the federal government.
Parker is a member of the information security community and is called for comment by members of the media, on topics relating to cybersecurity [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] and is engaged in discussions about topics such as the development of improved regulatory compliance and furthering Cyber Security initiatives. He donates his time to lecturing on the topic of Information Warfare at academic institutions including Georgetown University.
See also
He has authored and co-authored published works including:
- Cyber Adversary Characterization – Auditing the Hacker Mind: Syngress publishing (ISBN 1-931836-11-6)
- Stealing the Network – How to Own a Continent: Syngress publishing (ISBN 1-931836-05-1)
- Stealing the Network – How to Own an Identity: Syngress publishing (ISBN 1-59749-006-7)
References
- ↑ The Register - Cybersecurity Law Would Give Feds Unprecedented Net Control. April 2009
- ↑ The Register - Web Maven Gives Convicted Botmaster Keys to New Kingdom. March 2009.
- ↑ The Register - Obama urged to create White House Cyber Security Chief. December 2008
- ↑ The Register - Facebook Summarily Denies Undeniable User-Menacing Security Hole. August 2008.
- ↑ The Register - World's biggest ISPs drag feet on critical DNS patch. July 2008.
- ↑ CIO Today - Malware Writers Eye Virtual Servers. September 2007.
- ↑ Network World - Virtualization security needed – now! August 2007.
- ↑ Secure Computing Magazine - Web 2.0 Security. August 2007.
- ↑ Convergencia Latina - Seguridad! January 2007.
- ↑ Info World - Shielding Web Services from Attack. November 2006.
- ↑ Cisco Press - A Student-Hacker Showdown at the Collegiate Cyber Defense Competition. March 2006.
- ↑ Government Computer News - Information warfare: The need to know your enemy. January 2006.
- ↑ Federal Computer Week - Experts: Countries make dangerous cyber adversaries. January 2006.
- ↑ Info World - New worm and phishing scam hits AIM, Yahoo IM. May 2005.
- ↑ The Register - Security bugs take a bite out of Apple. December 2004.
- ↑ The Register - Auditing the Hacker Mind. March 2004.
- ↑ Yahoo - Blaster worm confounds home users, variant emerges. August 2003.
- ↑ ZDNet - What the feds really think about cybersecurity. August 2002.