Mr. Jeff Melrose is the Principal Technology Strategist for Cybersecurity at Yokogawa US. Prior to his assignment with Yokogawa, Mr. Melrose was a Principal Security Engineer at Lockheed Martin and Raytheon designing secure systems for the US Military. In those roles, he led Security Designers creating secure wireless technologies, developing secure networks and cryptographic infrastructures for the most paranoid of customers.
Mr. Melrose has over 20 years of experience in Computer Security. He has an MS in Mathematics from the University of Oklahoma and holds both the Certified Information Systems Security Professional (CISSP) and Information Systems Security Engineering Professional (ISSEP) certifications from ISC(2). He is also a member of ISA99, Isa100as and ISC(2).
Articles by Jeff
Nation states are in the process of regulating their Cyber Infrastructure to a greater degree. No more can IT, Cyber or Cyber-physical systems be free of binding law at a National level, specifically in the US, Germany, and China.
Recently, expert Jeff Melrose spoke at the prestigious security conference Blackhat in Las Vegas, Nevada on the topic of drones that can be bought off-the-shelf and used in cyber crime. Watch a James Bond parody on how drones can be used to implement a cone of silence on both stationary targets and moving targets.
With web content becoming ever more dynamic, it’s now necessary for even casual users to be aware of Plug-in helper applications, and the vulnerabilities that they create. As the sophistication of hacker groups continues to grow, the dark side to Plug-in use becomes more threatening; as web Browsers inherently trust such Plug-ins, an unguarded backdoor if left open for unintended remote execution of malware.
Hacks and insecure code may be lurking within the internal software, unbeknownst to software development groups and the targeted victims. Learn from security expert Jeff Melrose on what preventive measure you should take, to keep yourself and your company safe.
It can be daunting to come up with and remember multiple passwords to meet the demands of complex password filters of the several e-businesses and social sites that we use everyday. But now using an easy to remember method you too can create complex passwords with the best security professionals. Learn from Jeff Melrose in our second article in our SecureIT series.
The first article in a new security series: 'SecureIT.' In this article, Jeff Melrose explains the various threats, key points, and simple tips in mitigating up to 85% of cyber intrusions. Learn about why it is necessary for all PC and mobile users to perform regular security administration functions, at the very least.