Author: Travis Rosiek

About: Travis Rosiek

Bio: With nearly 20 years of experience in the security industry, Travis Rosiek is a highly accomplished cyber defense professional having led several commercial and U.S. government programs. He is known for developing and executing strategic plans to build the technical capacity across product development, quality assurance, technical marketing, professional services and sales engineering. Prior to his role at BluVector, Rosiek held several leadership roles including CTO at Tychon and Federal CTO at FireEye as well as senior roles at CloudHASH Security, McAfee and Defense Information Systems Agency (DISA).

Posts by Travis:

Cybersecurity Overview for the Oil and Gas Industry
Posted on: June 19, 2018

The Result of Not Addressing Increasing Cybersecurity Risk The increased potential of blurring boundaries between Information Technology (IT) networks and Operational Technology (OT), for example Industrial Control Systems (ICS), poses a huge risk to the oil and gas industry. As the industry increases its efficiency with automation, companies are significantly increasing their cyber attack surface.… Read more »

Meltdown and Spectre: Bracing for Impact
Posted on: January 10, 2018

By: Travis Rosiek, Chief Technology and Strategy Officer, BluVector In the second post in our series, Meltdown and Spectre: How They Could Be Targeted, we discussed ways in which cyber adversaries could leverage the Meltdown and Spectre vulnerabilities. Now we will switch focus on addressing what organizations and security operations teams should be doing to help mitigate… Read more »

Meltdown and Spectre: How They Could Be Targeted
Posted on: January 05, 2018

By: Travis Rosiek, Chief Technology and Strategy Officer, BluVector In yesterday’s post, Meltdown and Spectre: The Threats in Your Machine, we discussed the significance and some of the technical details of the Meltdown and Spectre vulnerabilities. Today, let’s talk about how a cyber adversary could leverage these vulnerabilities to target your organization or your personal systems.… Read more »

Meltdown and Spectre: The Threats in Your Machine
Posted on: January 04, 2018

By: Travis Rosiek, Chief Technology and Strategy Officer, BluVector After responsibly disclosing the details to affected vendors, a collective of security researchers publicly announced details of two critical vulnerabilities they found in current CPUs from Intel, AMD and ARM. Labeled as Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715), these vulnerabilities are distinct and have separate mitigations.… Read more »

WannaCry, North Korea and the DHS SAFETY Act
Posted on: December 19, 2017

By: Kris Lovejoy, CEO, BluVector In the wake of the revelation that North Korea was behind the latest WannaCry ransomware attack, it has become apparent that companies of any size or industry can become targets (or merely unwitting victims) for acts of cyber warfare launched between governments. It is equally clear, with the “success” of… Read more »

What’s My IDS Missing?
Posted on: December 07, 2017

By: Travis Rosiek, Chief Technology and Strategy Officer, BluVector Today’s society is quick to adopt and leverage new features and technology without consideration for the security risks and possible consequences. Combined with a thirst for new web applications created with a multitude of easy to program scripting languages, these realities seed a growing attack surface… Read more »

Understanding the Technology in Next Generation Network Intrusion Detection Systems
Posted on: November 22, 2017

As described in earlier posts, a Next Generation Network Intrusion Detection System (NG-NIDS) is a software- or appliance-based solution that monitors network traffic for indications of cyber-attacks or intrusions that have evaded the firewall or endpoint controls. Once identified, high priority attacks can be contained by the NG-NIDS via integration with existing infrastructure or by… Read more »

What is a Next Generation Network Intrusion Detection System?
Posted on: November 15, 2017

Intrusion detection was first introduced to the commercial market two decades ago as SNORT and quickly became a key cybersecurity control. Deployed behind a firewall at strategic points within the network, a Network Intrusion Detection System (NIDS) monitors traffic to and from all devices on the network for the purposes of identifying attacks (intrusions) that… Read more »