About Andrew Hay

Andrew Hay is an information security industry veteran with close to 20 years of experience as a security practitioner, industry analyst, and executive. As the Chief Information Security Officer (CISO) at DataGravity, Inc., he advocates for the company’s total information security needs and is responsible for the development and delivery of the company’s comprehensive information security strategy.

Andrew has served in various roles and responsibilities at a number of companies including OpenDNS (now a Cisco company), CloudPassage, Inc., 451 Research, the University of Lethbridge, Capital G Bank Ltd. (now Clarien Bank Bermuda), Q1 Labs (now IBM), Nokia (now Check Point), Nortel Networks, Magma Communications (now Primus Canada), and Taima Corp (now Convergys).

Andrew is frequently approached to provide expert commentary on security-industry developments, and has been featured in such publications as Forbes, Bloomberg, Wired, USA Today, International Business Times, Sacramento Bee, Delhi Daily News, Austin Business Journal, Ars Technica, RT, VentureBeat, LeMondeInformatique, eWeek, TechRepublic, Infosecurity Magazine, The Data Center Journal, TechTarget, Network World, Computerworld, PCWorld, and CSO Magazine.

The draft NIST Special Publication 800-101, Guidelines on Cell Phone Forensics, is available for public comment. The guide outlines general principles and provides technical information intended to aid organizations evolve appropriate policies and procedures for preserving, acquiring, and examining digital evidence found on cell phones. Computer forensic specialists and members of the law enforcement community are encouraged to provide feedback on all or part of the document. NIST requests submission of public comments on the draft on or before September 29, 2006. Comments may be sent to SP800-101@nist.gov. Adobe PDF (1,289 KB) Zipped PDF (1,005 KB) ...

Read More

Didier Stevens needed to convince someone that patching Windows is necessary. That’s why he made him a short video clip where he uses Metasploit 2.6 to exploit vulnerability MS06-040 on a Windows 2000 SP4 server. Didier creates a remote shell on the attacked server, connects to it and changes the administrators password to Hacked. The Metasploit web interface is used to create a higher visual impact. ...

Read More