Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Drew Peck & Tim Butler
LinkedIn
RSS
E-Mail

Profile of Drew Peck & Tim Butler

Executive Director and CEO & Founder of Tego
Member Since: 8/20/2018
Author
News & Commentary Posts: 1
Comments: 0

Drew Peck, Executive Director at Tego

Drew Peck is an Executive Director at Tego. He currently serves in an advisory capacity on several semiconductor company boards, focusing on IP and finance issues. He has been involved in the semiconductor industry for 40 years, first in a research capacity at MIT Lincoln Laboratory, and subsequently working on Wall Street as an industry analyst. As an industry analyst, Drew was named to Institutional Investor's All-Star Research Team, and cited as "Best on the Street" by the Wall Street Journal while heading the semiconductor research teams at Donaldson Lufkin & Jenrette and Cowen & Company. LinkedIn profile.

Tim Butler, CEO & Founder of Tego

Timothy Butler is the original Founder and CEO of Tego. He is a resourceful and inventive contributor with a 20-plus year track record of success taking quantifiable risks to leverage strategic advantages in order to grow market share and assist companies in achieving profit-generating status. Tim has an MBA from the Wharton School and a master's degree in international political economy from Northwestern University.

Articles by Drew Peck & Tim Butler
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9046
PUBLISHED: 2020-05-26
A vulnerability in all versions of Kantech EntraPass Editions could potentially allow an authorized low-privileged user to gain full system-level privileges by replacing critical files with specifically crafted files.
CVE-2020-12388
PUBLISHED: 2020-05-26
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
CVE-2020-12389
PUBLISHED: 2020-05-26
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
CVE-2020-12390
PUBLISHED: 2020-05-26
Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks. This vulnerability affects Firefox < 76.
CVE-2020-12391
PUBLISHED: 2020-05-26
Documents formed using data: URLs in an OBJECT element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin. This vulnerability affects Firefox < 76.