Some of our team:
Stephen a. ridley
Principal , CHIEF RESEARCHER
Stephen A. Ridley is principal researcher at Xipiter. Stephen has more than 10 years of experience in software development, software security, and reverse engineering. Within that last few years, he has presented his research and spoken about reverse engineering and software security research on every continent except Antarctica. He's been featured on NPR, SecurityWeek, Wired and numerous other publications.
Prior to his current work at Xipiter, Mr. Ridley previously served as the Chief Information Security Officer of a financial services firm. Prior to that, various information security researcher/consultant roles (Matasano, et al), Senior Security Architect at McAfee. Earlier in his career, Stephen was a founding member of the Security and Mission Assurance (SMA) group at a major U.S. Defense contractor where he did vulnerability research and reverse engineering in support of the U.S. Defense and Intelligence community.
LinkedIn | Twitter | Pubkey
logistics and industrial design
Tom manages product logistics at Xipiter. Tom is also the lead industrial engineer for a number of Xipiter products including all the industrial design and manufacturing of the SyncStop and a number of other projects.
Tom received his B.S. in Industrial Design after completing his B.S. in Environmental Science. Prior to Xipiter, Tom spent the better part of a year teaching his skills in Prague before returning to the states to help build a Security company.
Chris Hayes leads development of the circuit and firmware design for Xipiter’s “Osprey” low-lower RF sensor surveillance platform. Prior to Xipiter, Mr. Hayes was Electrical Systems Lead for Green Vehicles, a electric and renewable fuel car startup. While Chris spends much of his work time developing and designing the firmware for Xipiter’s “Osprey” platform, he also plays a pivotal role in Xipiter’s hardware and software reverse engineering consulting efforts.
John G. Sieh is Sr. Security Consultant/Researcher at Xipiter. John has over 10 years of experience as a computer security engineer, developer and researcher with a focus on penetration testing, opsec and vulnerability management. He has industry experience with leading ﬁnancial services companies including Visa, Wells Fargo, Washington Mutual, Bain Capital, Umpqua Bank and Umpqua Investments.
He has performed services for a diverse set of clients including Fortune 100/500, healthcare, banking, investment ﬁrms, state government, insurance providers, enterprise software shops, network service providers and information security consulting ﬁrms.
John is highly trained in a variety of security disciplines. He holds 6 GIAC certiﬁcations including the GSNA, GCIH, GCFW, GWAPT, GCIA, and GSEC.
stephen c. lawler
Stephen Lawler is the Founder and President of a small computer software and security consulting firm. Mr. Lawler has been actively working in information security for over 7 years, primarily in reverse engineering, malware analysis, and exploit development. While working at Mandiant he was a principal malware analyst for high-profile computer intrusions affecting several Fortune 100 companies.
Prior to this, as a founding member of ManTech International’s Security and Mission Assurance (SMA) division he discovered numerous “0-day” vulnerabilities in COTS software and pioneered several exploitation techniques that have only been recently published.
Prior to his work at ManTech, Stephen Lawler was the lead developer for the AWESIM sonar simulator as part of the US Navy SMMTT program.
Stephen is also the technical editor of a “Practical Malware Analysis” by No Starch Press.
some of our Advisors:
John is responsible for Product Management, Product Marketing, Engineering, Professional Services, and Thought Leadership at SilverSky.
John is the co-author of six books on security, The Myths of Security (O'Reilly, 2009), Beautiful Security, (O'Reilly, 2009) Building Secure Software(Addison Wesley, 2001), Network Security with OpenSSL (O’Reilly, 2002), the Secure Programming Cookbook (O’Reilly, 2003) and the 19 Deadly Sins of Software Security (McGraw Hill, 2005).
John is also an Adjunct Professor at NYU Poly. He is the former editor-in-chief for IEEE Security and Privacy Magazine. His research areas have included application security, cryptography, programming languages and usability. He co-developed GCM, a mode of operation for block ciphers such as AES, which has been standardized by NIST, the IEEE and the IETF. He is also the original author of Mailman, the GNU Mailing List Manager.
John received a MS in Computer Science and a BA from the University of Virginia.
Ben is CTO of CarbonBlack (recently merged with Bit9). At CarbonBlack he is the technical leader and his development prowess is directly responsible for the powerful functionality of Carbon Black. He has extensive experience building complex systems for environments where speed and reliability are paramount.
His background also includes a lot of technical “agility,” having worked on advanced operational teams supporting U.S. national security missions and writing complex calculation engines for the financial sector. Ben has degrees in Computer Science from the University of Chicago and Johns Hopkins University. He is a 35th Generation Shaolin Kung Fu Disciple.