“Chris is defibatly a icon for all in Security Community. He is visionary and really knows the meaning of innovation. Chris had been in the front of most innovations in security community: from vulnerability assesment to intrusion prevention and protection. I do recommend this talent in any position in Security Information Technology. Hopefuly we will work again.”
About
Helping grow startups and virtual worlds.
Activity
-
Hudson joined us 10 months ago as Head of Operations. Starting today, he’s Co-founder & COO. He came from the structural engineering world. No…
Hudson joined us 10 months ago as Head of Operations. Starting today, he’s Co-founder & COO. He came from the structural engineering world. No…
Liked by Christopher Klaus
-
Proud moment for Team Pindrop. We’ve been named by TIME as one of the "The 10 Most Influential Software Companies of 2026" alongside Microsoft…
Proud moment for Team Pindrop. We’ve been named by TIME as one of the "The 10 Most Influential Software Companies of 2026" alongside Microsoft…
Liked by Christopher Klaus
-
Thirty years ago, at 16, I joined the team that built one of the first cybersecurity companies. Today I get to announce I'm working with them again…
Thirty years ago, at 16, I joined the team that built one of the first cybersecurity companies. Today I get to announce I'm working with them again…
Liked by Christopher Klaus
Experience
Education
Volunteer Experience
-
-
-
Advisory Board Member
Hands On Atlanta
- Present 22 years
Science and Technology
Exploring ways to bring technology and the mission of Hands On Atlanta together.
-
Woodruff Art Center Board of Trustees
Arts for Learning, Woodruff Arts Center
- Present 16 years
Arts and Culture
Publications
Patents
-
Method and system for dynamically protecting a computer system from attack
Issued US US 10/400,938
See patentA dynamic protection system can analyze a computer system to determine its vulnerabilities to attack and generate a policy for protecting the computer system based on the identified vulnerabilities. Data received by the computer system can be analyzed to determine if it poses a threat to the system. This can prevent the data from entering the system or host based on a determination that the data poses a threat. Also, the dynamic protection system can receive policy updates to allow it to…
A dynamic protection system can analyze a computer system to determine its vulnerabilities to attack and generate a policy for protecting the computer system based on the identified vulnerabilities. Data received by the computer system can be analyzed to determine if it poses a threat to the system. This can prevent the data from entering the system or host based on a determination that the data poses a threat. Also, the dynamic protection system can receive policy updates to allow it to protect the system more efficiently and effectively. In other words, the dynamic protection system can protect an evolving computer system operating in an environment that is characterized by constantly changing methods of attack. Furthermore, by minimizing a need for manual intervention, attacks can be rapidly and accurately detected with a minimization of false positives, thereby lowering the cost of operation.
-
Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
Issued US US5892903 A
See patentA system and method is disclosed for detecting security vulnerabilities in a computer network. The system includes an IP spoofing attack detector, a stealth port service map generator, a source port verifier, source routing verifier, an RPC service detector and a Socks configuration verifier. Each of these verifiers may be operated separately or as a group to detect security vulnerabilities on a network. Each verifier may be programmed to exhaustively test all ports of all computers on a…
A system and method is disclosed for detecting security vulnerabilities in a computer network. The system includes an IP spoofing attack detector, a stealth port service map generator, a source port verifier, source routing verifier, an RPC service detector and a Socks configuration verifier. Each of these verifiers may be operated separately or as a group to detect security vulnerabilities on a network. Each verifier may be programmed to exhaustively test all ports of all computers on a network to detect susceptibility to IP spoofing attacks, access to services with little or no authorization checks or misconfigured routers or Socks servers. The detected vulnerabilities or the location of services having little or no authorization checks may be stored in a table for reference by a network administrator. The service map generated by the stealth service map generator may be used to identify all service ports on a network to facilitate the operation of the other verifiers which send service command messages to service ports to detect their accessibility. A graphic user interface (GUI) may be used to provide input and control by a user to the security verifiers and to present options and display information to the user.
Languages
-
English
-
-
C computer language
-
Organizations
-
Georgia Game Developer Association
Interim Chairman
Recommendations received
4 people have recommended Christopher
Join now to viewMore activity by Christopher
-
🚀 Celebrating Innovation at the Klaus Startup Challenge Demo Day! 🚀 What an incredible night, at the College of Computing at Georgia Tech, as we…
🚀 Celebrating Innovation at the Klaus Startup Challenge Demo Day! 🚀 What an incredible night, at the College of Computing at Georgia Tech, as we…
Liked by Christopher Klaus
-
I'm excited to share that I've moved to the California Bay Area and joined forces with Jakob Knudsen to co-found a company whose mission is greater…
I'm excited to share that I've moved to the California Bay Area and joined forces with Jakob Knudsen to co-found a company whose mission is greater…
Liked by Christopher Klaus
-
This financing, comprising $200M in equity and $150M in debt, accelerates Hermeus’ path toward becoming a leader in defense aviation…
This financing, comprising $200M in equity and $150M in debt, accelerates Hermeus’ path toward becoming a leader in defense aviation…
Liked by Christopher Klaus
-
Georgia Institute of Technology changed Tony Kepano's life and launched his career in real estate. He's now founded and funded a Real Estate center…
Georgia Institute of Technology changed Tony Kepano's life and launched his career in real estate. He's now founded and funded a Real Estate center…
Liked by Christopher Klaus
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Christopher Klaus in United States
34 others named Christopher Klaus in United States are on LinkedIn
See others named Christopher Klaus