About
Software engineer, entrepreneur, executive and investor with a long history of building…
Services
Activity
-
George Kurtz, founder and CEO of CrowdStrike, has joined the Armadin Board of Directors. With 30+ years of cybersecurity leadership across…
George Kurtz, founder and CEO of CrowdStrike, has joined the Armadin Board of Directors. With 30+ years of cybersecurity leadership across…
Liked by Roger Thornton
-
Excited to welcome CrowdStrike founder and CEO George Kurtz to the Board of Directors of Ballistic Ventures portfolio company Armadin! Ultimately in…
Excited to welcome CrowdStrike founder and CEO George Kurtz to the Board of Directors of Ballistic Ventures portfolio company Armadin! Ultimately in…
Liked by Roger Thornton
-
3rd-party libraries and packages are occasionally compromised to insert backdoors, malware, etc. (ie Shai-Hulud, Axios, XZ utils, is-parser-js…
3rd-party libraries and packages are occasionally compromised to insert backdoors, malware, etc. (ie Shai-Hulud, Axios, XZ utils, is-parser-js…
Liked by Roger Thornton
Experience
Education
-
San Jose State University
3.96
-
Activities and Societies: Tau Beta Pi Engineering honor society
Graduate education was self-funded through full-time employment. Graduate project: Object Oriented Framework for Computer Integrated Manufacturing (CIM) Application Development
-
-
-
Publications
Patents
-
Malware clustering based on function call graph similarity
Issued 10,990,674
See patentTechniques are disclosed relating to malware clustering based on function call graph similarity. In some embodiments, a computer system may access information corresponding to a plurality of malware samples and, based on the information, generate a function call graph for each of the malware samples. In some embodiments, generating the function call graph for a given malware sample includes identifying a plurality of function calls included in the information, assigning a label to each of the…
Techniques are disclosed relating to malware clustering based on function call graph similarity. In some embodiments, a computer system may access information corresponding to a plurality of malware samples and, based on the information, generate a function call graph for each of the malware samples. In some embodiments, generating the function call graph for a given malware sample includes identifying a plurality of function calls included in the information, assigning a label to each of the function calls, identifying relationships between the function calls, and generating the function call graph based on the relationships and the labels. Based on the function call graphs, the computer system may assign each of the plurality of malware samples into one of a plurality of clusters of related malware samples.
-
Storage system for network information
Issued 10,992,519
See patentTechniques are disclosed relating to storage of network event information for multiple tenants. In some embodiments, one or more host computer systems are configured to maintain a plurality of containers operable to isolate network event information of a plurality of tenants from others of the plurality of tenants. The plurality of containers includes a first container that includes a first database executable to store network event information for a first of the plurality of tenants, and a…
Techniques are disclosed relating to storage of network event information for multiple tenants. In some embodiments, one or more host computer systems are configured to maintain a plurality of containers operable to isolate network event information of a plurality of tenants from others of the plurality of tenants. The plurality of containers includes a first container that includes a first database executable to store network event information for a first of the plurality of tenants, and a second container that includes a second database executable to store network event information for a second of the plurality of tenants. In some embodiments, a management computer system is configured to receive, from the first tenant, a request to access network event information of the first tenant and route the request to a host computer system maintaining the first container to cause the first database to service the request.
-
Detection system for network security threats
Issued US 10904278
-
Malware clustering based on analysis of execution behavior
Issued US 10846406
-
Apparatus and method for monitoring secure software
Issued US 7,975,306
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions perform a security audit of program instructions. Based upon the security audit, sensors are inserted into the program instructions. The program instructions are executable and the sensors generate a stream of security events. The stream of security events is monitored and security performance results are reported.
Other inventorsSee patent -
APPARATUS AND METHOD FOR DEVELOPING SECURE SOFTWARE
Issued US US 7207065 B2
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
Other inventorsSee patent
Honors & Awards
-
2017 Alumni Award of Distinction
SJSU Charles W. Davidson College of Engineering
79th recipient of the Award of Distinction, given annually to SJSU alumni with notable outstanding accomplishments.
Organizations
-
Tau Beta Pi - Engineering Honor Society
Member
- Present
More activity by Roger
-
Tulips Are Here! Farm will be open for you all to visit this Sunday March 22 from 11am to 4pm... A bunch of you asked about coming to see the…
Tulips Are Here! Farm will be open for you all to visit this Sunday March 22 from 11am to 4pm... A bunch of you asked about coming to see the…
Liked by Roger Thornton
-
We’re excited to share that Ballistic Ventures led the Series A investment in Above Security, as the company emerges from stealth today with $50M in…
We’re excited to share that Ballistic Ventures led the Series A investment in Above Security, as the company emerges from stealth today with $50M in…
Liked by Roger Thornton
-
Something new is coming. We’ve been quietly working on a different way to think about vulnerability management. One grounded in evidence instead of…
Something new is coming. We’ve been quietly working on a different way to think about vulnerability management. One grounded in evidence instead of…
Liked by Roger Thornton
-
"We tried Salesforce and it was OK. We never got to the place where it did exactly what we wanted it to do." - William Schonbrun, COO of CarboNet…
"We tried Salesforce and it was OK. We never got to the place where it did exactly what we wanted it to do." - William Schonbrun, COO of CarboNet…
Liked by Roger Thornton
-
When this photo was taken, I was 5 years old, suitcase packed, standing on the tarmac about to board a Braniff flight to Washington, D.C. A kid…
When this photo was taken, I was 5 years old, suitcase packed, standing on the tarmac about to board a Braniff flight to Washington, D.C. A kid…
Liked by Roger Thornton
-
It is true what they say about Dartmouth College: You can take them out of the Green but you can't take the Green out of them. After an eight year…
It is true what they say about Dartmouth College: You can take them out of the Green but you can't take the Green out of them. After an eight year…
Liked by Roger Thornton
-
Calling all women in cyber! Join us at RSA for the Vision & Voice Women's Breakfast: Empower the Next. We'll be at the Children's Creativity Museum…
Calling all women in cyber! Join us at RSA for the Vision & Voice Women's Breakfast: Empower the Next. We'll be at the Children's Creativity Museum…
Liked by Roger Thornton
-
We trust employees to deploy production code. We trust them to move millions in payroll and vendor payments. We trust them to sign contracts, shape…
We trust employees to deploy production code. We trust them to move millions in payroll and vendor payments. We trust them to sign contracts, shape…
Liked by Roger Thornton
-
So proud of our team! Reed Clayton knocking it out of the park for us! Well deserved recognition for a ton of blood, sweat and tears! I'm feeling…
So proud of our team! Reed Clayton knocking it out of the park for us! Well deserved recognition for a ton of blood, sweat and tears! I'm feeling…
Liked by Roger Thornton
-
Today we’re excited to announce our seed investment in AiStrike! Security operations are entering a new era. Attackers are moving faster and…
Today we’re excited to announce our seed investment in AiStrike! Security operations are entering a new era. Attackers are moving faster and…
Liked by Roger Thornton
-
📣 We're expanding our library of connected apps to help you strengthen security across your most critical business systems. We've just added…
📣 We're expanding our library of connected apps to help you strengthen security across your most critical business systems. We've just added…
Liked by Roger Thornton
-
Last night I had the honor of sharing the stage with Edward Amoroso at the launch of his book, Reaching the Chasm. For anyone building an early-stage…
Last night I had the honor of sharing the stage with Edward Amoroso at the launch of his book, Reaching the Chasm. For anyone building an early-stage…
Liked by Roger Thornton
-
A month or so ago, we heard whispers that someone in India might be placing an order for 2,500 copies of Another Way. I wasn’t sure it had actually…
A month or so ago, we heard whispers that someone in India might be placing an order for 2,500 copies of Another Way. I wasn’t sure it had actually…
Liked by Roger Thornton
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content