Dave Lewis

Dave Lewis has over 20 years industry experience. He has extensive experience in IT operations and management. Currently, Dave is a global security advocate for Akamai Technologies . He is the founder of the security site Liquidmatrix Security Digest and co-host of the Liquidmatrix podcast. Dave also serves on the (ISC)2 Board of Directors. Prior to his current role, Dave worked in the finance, healthcare, entertainment, manufacturing and critical infrastructure verticals. He has worked for a defense contractor as a security consultant to clients such as the FBI, US Navy, Social Security Administration, US Postal Service and the US Department of Defense to name a few. When not at work Dave can be found spending time with his family, playing bass guitar and polishing his “brick of enlightenment”.

5 Canadian security conferences in 2017

All through the house, not a hacker was stirring...

All through the house, not a hacker was stirring...

The holiday season is a time to spin down and relax for many people. Where we hang up our spurs, or rather, we tuck the carry-on suitcase into a corner at least five feet away from the door. But, as with every holiday season we...

War stories: escalation attack loopback

War stories: escalation attack loopback

Last month I shared some stories about events that I’ve had to contend with over the last 20 years. One incident that I recall was a particular individual who thought that only scanning up to port 1023 was the only proper way to...

War stories: diary of a box hugger

War stories: diary of a box hugger

After years in the information security space there are few things that get me misty eyed like a massive data center. In part because it gives me a chance to reminisce about the good old days. Hundreds of hours sitting cross...

War stories: for your eyes only

War stories: for your eyes only

There are few things that make for as amusing reading as an acceptable use policy. In some organizations that I’ve been through, it was clear that no one had ever read their unicorn-esque like policy document. Some of the...

War stories: just shut off telnet

War stories: just shut off telnet

Years ago I was working on a project that had a rather interesting premise. It was a way to send a file between two parties that was stamped as verified by a third party intermediary. Pretty basic stuff but, in the 90s it was...

War stories: Logs are where the dead things dwell

War stories: Logs are where the dead things dwell

Over the years there has been one love hate relationship that I could never truly get away from entirely. That was logging on systems and anything else that had something to say. I got so silly that at one point when I was doing...

War stories: the water shut off valve

War stories: the water shut off valve

Years ago I worked for a company that had some manner of connection to the goings on for the power grid. *cough* It was a job that afforded me all sorts of different projects as security had previously been more of an afterthought...

War stories: the vulnerability scanning argument

War stories: the vulnerability scanning argument

Over the last couple of decades I have had all sort of different jobs. I have to count myself as rather fortunate for the experiences I have had along the way. They really went a long way to teach me some valuable lessons. Also,...

Hutton Hotel removes unwanted malware guest

Hutton Hotel removes unwanted malware guest

The long sorted list of companies that have had their payment systems has added a new victim to it’s ranks. This past Friday the upscale Hutton Hotel, a stones throw from Vanderbilt University in Nashville, disclosed that their...

IP Expo Nordic and getting Popp’d by ransomware

IP Expo Nordic and getting Popp’d by ransomware

Ransomware has become all the rage in the security field these days. Both from the perspective of the writers and the defenders. The media is lousy with these articles and I’m apparently not above writing about it myself. This...

Information security and the flaming sword of justice

Information security and the flaming sword of justice

There have been times in my career where I found it almost necessary for me to breathe into a paper bag after hearing some asinine positions on what security should be. I have encountered what I like to refer as the “flaming...

Load More