Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Rafal Los, Managing Director, Solutions Research and Development, Optiv

Profile of Rafal Los

Managing Director, Solutions Research and Development, Optiv
News & Commentary Posts: 1

Rafal Los brings a blend of pragmatism and thought leadership in his approach to enterprise information security. As managing director, solutions research and development at Optiv, Los helps organizations build mature, defensible and operationally efficient security programs. Leveraging over 15 years of technical, consulting and management skills his team researches, develops and delivers program strategy frameworks, maturity models, and provides operational guidance from across industry verticals and varying maturity levels.Los previously worked at Acccuvant. Prior to that, he served as principal, strategic security services at HP Enterprise Security Services. Los developed a methodology for refocusing enterprise security programs through an assessment and threat-centric approach, directly aligning security to business value. While there, he developed new services-based offerings from concept through prototype and launch stages, and spearheaded a cross-business task team to develop new use cases for products and service offerings within the existing portfolio. Previously at HP, Los served several diverse roles including security strategist in enterprise security products where he advised customers on implementing practical solutions. He also wrote and maintained the top blog in HP Software, "Following the White Rabbit." Prior to HP, Los held various positions at GE Energy, EnterEdge Technology and Envestnet PMC.Los is an advocate for focus on sound security fundamentals and for the principles of "proportional, common sense security." He has been contributor to open standards and various organizations such as the Open Web Application Security Project (OWASP) and the Cloud Security Alliance. He has served as a speaker at conferences such as Black Hat, ISSA International, InfoSec World and many others. In addition, he maintains a regular column in SecurityWeek and contributes to other community forums. Los received his bachelor's degree in computer information systems from Concordia University.

COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9046
PUBLISHED: 2020-05-26
A vulnerability in all versions of Kantech EntraPass Editions could potentially allow an authorized low-privileged user to gain full system-level privileges by replacing critical files with specifically crafted files.
CVE-2020-12388
PUBLISHED: 2020-05-26
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
CVE-2020-12389
PUBLISHED: 2020-05-26
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
CVE-2020-12390
PUBLISHED: 2020-05-26
Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks. This vulnerability affects Firefox < 76.
CVE-2020-12391
PUBLISHED: 2020-05-26
Documents formed using data: URLs in an OBJECT element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin. This vulnerability affects Firefox < 76.