Todd Lewellen
2016 Emerging Technology Domains Risk Survey
• Technical Report
By Christopher King , Dan J. Klinedinst , Todd Lewellen , Garret Wassermann
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
• Technical Note
Tempering the Vulnerability Hype Cycle with CVSS
• Blog Post
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
• Technical Note
By George Silowash , Todd Lewellen , Joshua W. Burns , Daniel L. Costa
2016 Emerging Technology Domains Risk Survey
• Technical Report
By Christopher King , Dan J. Klinedinst , Todd Lewellen , Garret Wassermann
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
• Technical Note
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
• Technical Note
By George Silowash , Todd Lewellen , Joshua W. Burns , Daniel L. Costa
Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders
• Technical Note
Tempering the Vulnerability Hype Cycle with CVSS
• Blog Post
"Spotlight On: Insider Threat from Trusted Business Partners" Article Revised and Released
• Blog Post
Insider Threats Evident in All Industry Sectors
• Blog Post