Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Tim Callan
Twitter
LinkedIn
RSS
E-Mail

Profile of Tim Callan

Senior Fellow, Comodo CA
Member Since: 10/5/2018
Author
News & Commentary Posts: 1
Comments: 0

Tim Callan has more than 20 years' experience as a strategic marketing and product leader for successful B2B software and SaaS companies. Tim's recent experience includes CMO at SLI Systems (NZX: SLI), VP of Marketing at Verisign (VRSN), CMO at Melbourne IT Digital Brand Services (ASX: MBIT), and CMO at RetailNext. At Verisign, Tim led the creation and launch of the Verisign Secured Seal, which quickly grew to be a staple item for online commerce sites and at its height was displayed on more than 100,000 web sites in 160 countries. He played a pivotal role in establishing Extended Validation SSL and served as the primary spokesman for the company's Trust Services business unit

Tim served on the DigiCert Board of Directors from 2013 to 2015 and on the Online Trust Alliance Board of Directors from 2010 to 2011. He also has held marketing and product leadership roles at Symantec, Caere Corporation (now known as Nuance Communications), and Delrina (acquired by Symantec). In addition to his role at Comodo CA, Tim is a mentor for Santa Clara University's Miller Center for Social Entrepreneurship.

Tim took his Bachelor's in English with honors from UCLA.

Articles by Tim Callan
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13575
PUBLISHED: 2019-07-18
A SQL injection vulnerability exists in WPEverest Everest Forms plugin for WordPress through 1.4.9. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via includes/evf-entry-functions.php
CVE-2019-13607
PUBLISHED: 2019-07-18
The Opera Mini application through 16.0.14 for iOS has a UXSS vulnerability that can be triggered by performing navigation to a javascript: URL.
CVE-2019-13915
PUBLISHED: 2019-07-18
b3log Wide before 1.6.0 allows three types of attacks to access arbitrary files. First, the attacker can write code in the editor, and compile and run it approximately three times to read an arbitrary file. Second, the attacker can create a symlink, and then place the symlink into a ZIP archive. An ...
CVE-2019-9230
PUBLISHED: 2019-07-18
An issue was discovered on AudioCodes Mediant 500L-MSBR, 500-MBSR, M800B-MSBR and 800C-MSBR devices with firmware versions F7.20A to F7.20A.253. A cross-site scripting (XSS) vulnerability in the search function of the management web interface allows remote attackers to inject arbitrary web script or...
CVE-2019-10100
PUBLISHED: 2019-07-18
Lawrence Livermore National Laboratory msr-safe v1.1.0 is affected by: Incorrect Access Control. The impact is: An attacker could modify model specific registers. The component is: ioctl handling. The attack vector is: An attacker could exploit a bug in ioctl interface whitelist checking, in order t...