Author

 Wayne Lloyd
Twitter
LinkedIn
RSS
E-Mail

Profile of Wayne Lloyd

Federal CTO at RedSeal
Member Since: 7/9/2018
Author
News & Commentary Posts: 1
Comments: 0

Wayne Lloyd has over 25 years of field experience in information technology, with the last 15 years directly focusing in cybersecurity, including computer and network security, advanced threat analysis, intrusion detection and operations, vulnerability risk assessment, and policy and compliance.  Mr. Lloyd ran data center operations for 10 years in the intelligence community and 12 years conducting Blue and Red Team assessments of mission systems within the intelligence community. Before joining RedSeal, he was the team lead for the FAA's cyber protection team. Working closely with the Department of Defense, the intelligence community, and federal civilian agencies, Mr. Lloyd focuses on security and network engineering solutions that deliver actionable recommendations and remediation strategies, based on the mission requirements and the current system and network security state. Engaged in strategic customer projects including cloud, mobility, data center/network consolidation, and virtualization, Mr. Lloyd specializes in identifying the cyber strategies needed to effectively secure the client infrastructure as a whole.

Articles by Wayne Lloyd
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14364
PUBLISHED: 2018-07-18
GitLab Community and Enterprise Edition before 10.7.7, 10.8.x before 10.8.6, and 11.x before 11.0.4 allows Directory Traversal with write access and resultant remote code execution via the GitLab projects import component.
CVE-2018-14387
PUBLISHED: 2018-07-18
An issue was discovered in WonderCMS before 2.5.2. An attacker can create a new session on a web application and record the associated session identifier. The attacker then causes the victim to authenticate against the server using the same session identifier. The attacker can access the user's acco...
CVE-2018-14388
PUBLISHED: 2018-07-18
joyplus-cms 1.6.0 has XSS via the manager/admin_ajax.php can_search_device array parameter.
CVE-2018-14389
PUBLISHED: 2018-07-18
joyplus-cms 1.6.0 has SQL Injection via the manager/admin_ajax.php val parameter.
CVE-2018-12429
PUBLISHED: 2018-07-18
JEESNS through 1.2.1 allows XSS attacks by ordinary users who publish articles containing a crafted payload in order to capture an administrator cookie.