David Harley

From Wikipedia, the free encyclopedia
David Harley
Born 1949
Residence England
Fields Author
Information security
Malware
Alma mater Bangor University
Open University

David Harley BA CITP FBCS CISSP is an IT security researcher, author/editor and consultant living in the United Kingdom, known for his books on and research into malware, Mac security,[1] anti-malware product testing[2] and management of email abuse.[3]

Career

After a checkered career that included spells in music, bar-work, work with the mentally handicapped, retail and the building trade, Harley entered the IT field in the late 1980s, working initially in administration at the Royal Free Hospital in London, and in 1989 went to work for the Imperial Cancer Research Fund (now merged into Cancer Research UK), where he held administrative and IT support roles and eventually moved into full-time security. In 2001 he joined the National Health Service where he ran the Threat Assessment Centre.[4] After leaving the NHS in 2006 to work as an independent consultant,[5] he worked closely with the security company ESET[6] where since 2011 he holds the position of Senior Research Fellow,[6] working with the Cyber Threat Analysis Center.[7] In 2009 he was elected to the Board of Directors of the Anti-Malware Testing Standards Organization (AMTSO).[8] He stood down in February 2012, when Righard Zwienenberg, president of AMTSO, joined ESET, as the AMTSO bylaws don't allow more than one Board member to represent the same AMTSO member entity.[9] He runs the Mac Virus website,[10] and formerly held an undefined executive role[11] in AVIEN. He is a Fellow of the British Computer Society.

Writing

Harley is co-author (with Robert Slade and Urs Gattiker) of Viruses Revealed,[12] and technical editor and principal author of The AVIEN Malware Defense Guide for the Enterprise.[13]

He has also contributed chapters to a number of other security-related books, and sometimes writes for specialist security publishers such as Virus Bulletin[14] and Elsevier.[15] He often presents papers at specialist security conferences including Virus Bulletin, AVAR, and EICAR.[16] He blogs regularly for ESET,[17] and on occasion for Infosecurity Magazine,[18] SC Magazine,[19] (ISC)2,[20] SecuriTeam,[21] Mac Virus,[22] and Small Blue-Green World.[23] His Geek Peninsula[24] metablog lists many of his papers and articles.

Other work

Some recordings, miscellaneous prose and verse are posted to his personal blog page.[25]

Lyrics and MP3s from a 1980s cassette album are posted on the Sheer Bravado[26] page.

Lyrics and MP3s from an unreleased album with Don MacLeod, Bob Theil, Bob Cairns and Pat Orchard are posted on the Diverse Brew sessions[26] page.

Other 1980s lyrics and MP3s are posted on the Scriptwrecked sessions[26] page.

Miscellaneous prose - some but not all connected to the security industry - is posted to the Miscellaneous Prose[26] page.

Miscellaneous published verse is posted to the David Harley's Verse[27] page.

Some parodies have been posted to the related Parodies Regained[28] page.

Family life

Harley hardly ever talks publicly about his private life, but a biographical article for Virus Bulletin,[29] and the dedications page to Viruses Revealed indicate that he has a daughter. He lives with his third wife in Shropshire, in the UK.

Bibliography

  • Bidgoli, Hossein, et al (2008). The Handbook of Computer Networks. Wiley. ISBN 978-0-471-78460-9.  Volume 3, "E-Mail Threats and Vulnerabilities."
  • Baccas, Paul, et al (2008). OS X Exploits and Defense. Syngress. ISBN 978-1-59749-254-6.  Chapter 3: "Malicious Macs: Malware and the Mac." Chapter 4: "Malware Detection and the Mac."
  • Harley, David, et al (2007). AVIEN Malware Defense Guide for the Enterprise. Syngress. ISBN 978-1-59749-164-8.  (Editor, technical editor, several chapters.)
  • Schiller, Craig A.,, Binkley, Jim et al (2007). Botnets: the Killer Web App. Syngress. ISBN 1-59749-135-7.  Co-wrote Chapter 5, "Botnet Detection: Tools and Techniques" with Jim Binkley.
  • Bidgoli, Hossein, et al (2006). Handbook of Information Security. Wiley. ISBN 0-471-64833-7.  Volume 3, "E-Mail Threats and Vulnerabilities."
  • Paulus, S., Pohlmann N., Reimer, H. et al (2004). ISSE 2004: Securing Electronic Business Processes. Vieweg. ISBN 978-3-528-05910-1.  Massmailers: New Threats Need Novel Anti-Virus Measures.
  • Bosworth, Seymour, Kabay M.E. et al (2002). Computer Security Handbook. John Wiley. ISBN 0-471-41258-9.  Co-wrote Chapter 49, "Medical Records Security" with Paul Brusil.
  • Anonymous, et al (2002). Maximum Security Fourth Edition. SAMS. ISBN 0-672-32459-8.  Revised Chapter 17 "Viruses and Worms", Chapter 18 "Trojans."
  • Anonymous, et al (2001). Maximum Security Third Edition. SAMS. ISBN 0-672-31871-7.  Chapter 17 "Viruses and Worms", Chapter 18 "Trojans."
  • Harley, David, Robert Slade and Urs E. Gattiker (2001). Viruses Revealed. McGraw-Hill Companies. ISBN 0-07-213090-3.  Co-Author.

Papers

Harley has published white papers, conference papers and presentations, and on-line articles with or on behalf of ESET since 2006. Some previous papers, articles and presentations are available from his Geek Peninsular blog.

References

  1. "OS X Exploits and Defense". Syngress.com. Retrieved 12 November 2011. 
  2. "Making Sense of Anti-Malware Comparative Testing « Small Blue-Green World". Smallbluegreenblog.wordpress.com. 18 June 2009. Retrieved 12 November 2011. 
  3. "Check Chain Mail and Hoaxes". Chainmailcheck.wordpress.com. Retrieved 12 November 2011. 
  4. Dan Raywood (25 October 2010). "SC Magazine interview: David Harley, senior research fellow at ESET". SC Magazine UK. Retrieved 12 November 2011. 
  5. David HarleySmall Blue Green World, UK (1 January 2007). "Virus Bulletin : From immunology to heuristics". Virusbtn.com. Retrieved 12 November 2011. 
  6. 6.0 6.1 http://www.eset.eu/press-2011/eset-infosecurity
  7. http://www.eset.eu/press-2010-attacks-on-facebook-and-other-social
  8. "Boards – Board of Directors". AMTSO. Retrieved 12 November 2011. 
  9. "The End of an Ear « AMTSO". amtso.wordpress.com. Retrieved 24 March 2012. 
  10. "About Us « Mac Virus". Macviruscom.wordpress.com. Retrieved 12 November 2011. 
  11. Aryeh Goretsky says: (28 February 2011). "20 years of Windows Malware « The AVIEN Blog". Avien.net. Retrieved 12 November 2011. 
  12. "Viruses Revealed: Amazon.co.uk: David Harley, Urs E. Gattiker, Robert Slade: Books". Amazon.co.uk. Retrieved 12 November 2011. 
  13. http://www.avien.net/publications.html
  14. "Virus Bulletin : Searching for 'david harley'". Virusbtn.com. Retrieved 12 November 2011. 
  15. "ScienceDirect – Information Security Technical Report : Making sense of anti-malware comparative testing". Dx.doi.org. Retrieved 12 November 2011. 
  16. Eddy WillemsEICAR and G Data, Belgium (1 June 2011). "Virus Bulletin : EICAR 2011: a 20th anniversary in Austria". Virusbtn.com. Retrieved 12 November 2011. 
  17. "Infosecurity – Blog". Infosecurity-us.com. Retrieved 12 November 2011. 
  18. "David Harley | ESET ThreatBlog". Blog.eset.com. Retrieved 12 November 2011. 
  19. "Cybercrime Corner". SC Magazine US. Retrieved 12 November 2011. 
  20. "(ISC)2 Blog: Authors". Blog.isc2.org. Retrieved 12 November 2011. 
  21. "Securiteam Blog". blogs.securiteam.com. Retrieved 28 November 2013. 
  22. http://macviruscom.wordpress.com/?s=david+harley
  23. "Welcome « Small Blue-Green World". Smallbluegreenblog.wordpress.com. 5 April 2011. Retrieved 12 November 2011. 
  24. "Geek Peninsula". Small Blue-Green World. Retrieved 19 November 2011. 
  25. "David Harley Words & Music". Small Blue-Green World. Retrieved 14 July 2012. 
  26. 26.0 26.1 26.2 26.3 "David Harley Words & Music". Small Blue-Green World. Retrieved 3 September 2012. 
  27. "David Harley's Verse". Small Blue-Green World. Retrieved 10 July 2013. 
  28. "Parodies Regained". Small Blue-Green World. Retrieved 1 September 2012. 
  29. "I'm OK, You're Not OK". Virus Bulletin. Retrieved 20 November 2011. 

External links


This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.