Threat Seekers | SC Media Threat Seekers

Threat Seekers

Ben Seri – Armis Security

Why nomintated: Ben Seri’s work in the IoT space specifically around BlueBorne, the first airborne IoT vulnerabilities impacting more than five billion devices globally, and BLEEDINGBIT, chip- level vulnerabilities used in the fabric of internet infrastructure. Seri has fought against the fast-paced creation and adoption of IoT devices that are created and deployed with security…

Ben Herzberg – Imperva

Why Nominated: Under Ben Herzberg’s leadership, Imperva’s threat research team has uncovered key vulnerabilities in Facebook, Google Photos, Drupal and other online services and platforms. Profile: Herzberg and his Imperva research team are charged with identifying and evaluating software flaws that undermine application and data security. In November 2018, Imperva disclosed a significant Facebook vulnerability that…

Alejandro Hernandez – IOActive

Why Nominated: A top security consultant who has dedicated himself to improving security for over 15 years, Alejandro Hernández was responsible for uncovering major security flaws in stock trading technologies. Profile: Alejandro Hernández, who presented new, ground-breaking research regarding security flaws in stock trading technologies during the 2018 Black Hat conference, also discovered significant stock trading…

Erez Yalon – Checkmarx

Why nominated: Erez Yalon’s he has put his talents and tools he had previously developed as an independent security researcher to work at Checkmarx to help find vulnerabilities at wide range of websites. This includes Tinder where he found security flaws could have allowed an attacker to monitor a user’s interaction with the app and…

Elisa Costante – Forescout Technologies

Why Nominated: Elisa Costante conducts research on critical infrastructure and industrial systems and then applies her findings toward the development of important technology solutions. She recently developed a specialization in business automation systems, last year revealing five vulnerabilities in popular BAS devices. Profile: Costante’s nearly 20 years of career research has led to discoveries on how…

Next post in Reboot Leadership Awards 2019