Todd Lewellen
2016 Emerging Technology Domains Risk Survey
• Technical Report
By Christopher King , Dan J. Klinedinst , Todd Lewellen , Garret Wassermann
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
• Technical Note
By Todd Lewellen , George Silowash , Daniel L. Costa
Tempering the Vulnerability Hype Cycle with CVSS
• Blog Post
By Todd Lewellen
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
• Technical Note
By George Silowash , Todd Lewellen , Joshua W. Burns , Daniel L. Costa
2016 Emerging Technology Domains Risk Survey
• Technical Report
By Christopher King , Dan J. Klinedinst , Todd Lewellen , Garret Wassermann
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
• Technical Note
By Todd Lewellen , George Silowash , Daniel L. Costa
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
• Technical Note
By George Silowash , Todd Lewellen , Joshua W. Burns , Daniel L. Costa
Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders
• Technical Note
By George Silowash , Todd Lewellen
Tempering the Vulnerability Hype Cycle with CVSS
• Blog Post
By Todd Lewellen
Common Sense Guide to Mitigating Insider Threats - Best Practice 11 (of 19)
• Blog Post
By Todd Lewellen , CERT Insider Threat Center
"Spotlight On: Insider Threat from Trusted Business Partners" Article Revised and Released
• Blog Post
By Todd Lewellen , CERT Insider Threat Center
