19 Posts

Chris Poulin

Research Strategist, X-Force R&D, IBM

Chris Poulin brings a balance of management experience and technical skills encompassing 30 years in information security, software development, and IT management, to his role as Research Strategist for IBM’s X-Force Research & Development team. Chris is responsible for researching and analyzing security trends, creating programs to help customers keep pace with emerging threats, and forging the vision for a secure planet. Chris joins IBM through the Q1 Labs acquisition, where he served as CSO. He started his security career in the U.S. Air Force managing global intelligence networks and developing software. Chris left the Department of Defense to leverage his leadership and technical skills to found and build FireTower, Inc., a successful information security consulting firm serving many Fortune 100 clients.

Written By Chris Poulin

Ransomware Evolves and Enjoys a New Playground

Ransomware has worked for cybercriminals for many years, and it continues to be a valuable tool in their arsenal as it evolves to suit the times.

Reducing the Application Attack Surface: Breaking Payloads With Runtime Code Stripping and Image Freezing

Collaborative research has recently devised a means to reduce a Windows application's attack surface by removing unused functions from libraries that are loaded dynamically.

The Importance of IPv6 and the Internet of Things

Security professionals need to increase their understanding of IPv6 and the new threats that it and the Internet of Things (IoT) will bring.

IBM X-Force Perspective on the Aftermath of Heartbleed and Shellshock

With the Bash Shellshock exploit still clouding our vision, it's easy to lose sight of the Heartbleed OpenSSL vulnerability. How are the two similar?

What to Do to Protect against Heartbleed OpenSSL Vulnerability

More than half of web servers on the internet use OpenSSL to safeguard data and user accounts. Versions 1.0.1 through 1.0.1f are vulnerable to an exploit that may expose user credentials, credit card data, sensitive documents and the server's...

Improve Application Security Immediately with These 5 Software Development Practices

SQL injection and cross-site scripting are the most prevalent Web application vulnerabilities and have been for many years. We know how to avoid introducing these code flaws into our applications. Here are five easy steps to get closer to...

What Retailers Need to Learn from the Target Breach to Protect against Similar Attacks

If you’re a US shopper, there’s almost a 50% chance that your information was compromised in the Target breach. So how can fellow retailers and other enterprises avoid this fate?

Application Sandboxing Makes Exploiting Vulnerabilities Less Profitable

Sandboxing isn’t a new concept; it’s been used in various forms for some time. Application sandboxes add one more layer of defense in the struggle to regain the right to peaceful enjoyment in our own networks.

Balancing Identity Confidence and User Convenience with Risk-Based Authentication

What if you demanded a picture ID for everyone you meet, whether they're complete strangers or long time friends since grade school? You'd certainly end up with a much diminished social network. So why do we require the same user...

Enterprises Need to Take Care of the Basics before Worrying about More Sophisticated Threats

APTs Are So Tomorrow: Enterprises Need to Take Care of the Basics Like SQL Injection and Cross Site Scripting Before Worrying About More Sophisticated Threats “Step right up folks! Behold the child what has four legs! Marvel at bearded lady and...