9 Posts

Paul Ionescu

IBM X-Force Ethical Hacking Team Lead

Paul Ionescu leads the Security Engineering program for the IBM Security Systems division. He also manages a team of highly skilled security experts tasked with pen-testing IBM products: the IBM X-Force Ethical Hacking Team. Since he joined IBM in 2007 he worked in several areas of the Application Security business including support, technical sales, technical enablement and development. Before taking on his current role Paul was a senior developer for the AppScan line of products and contributed to key projects and research. Paul also holds an IBM Master Inventor title for his contribution to the IBM patent base.

Written By Paul Ionescu

Inside the Mind of a Hacker: Attacking Web Pages With Cross-Site Scripting

Web application developers must learn to think like cybercriminals to combat the growing threat of cross-site scripting (XSS) attacks.

Impressions From DEF CON 24: The Machines Are Rising

The machines rose at DEF CON 24 in Las Vegas. Autonomous hacking machines successfully analyzed, patched and exploited software at the conference.

Inside the Mind of a Hacker: Attacking the Memory

A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them.

Inside the Mind of a Hacker: Attacking the Shell

To better prevent command injection attacks, developers need to learn how to think like a hacker and identify weak points in software.

Inside the Mind of a Hacker: Attacking Databases With SQL Injection

Hackers frequently use SQL injection as a means of attacking and taking over databases. Here's what you need to know to avoid this type of breach.

Is Your Smart Office Creating Backdoors for Cybercriminals?

Companies must start paying attention to smart office security risks within their physical spaces in order to protect their building, employees and data.

Challenges to Running an Effective Application Security Program

Effective application security requires developers to take part in a multistep process covering many aspects of coding and testing.

Software Defenses to OWASP’s Top 10 Most Common Application Attacks

Software developers must learn how to build security in from the ground up to defend against the most common application attacks, as determined by OWASP.

The 10 Most Common Application Attacks in Action

Based on OWASP's list of the 10 most common application attacks, IBM has created a video series highlighting each one and how organizations can stay safe.

Co-Written By Paul Ionescu