Author Archives: Harry Sverdlove


Harry Sverdlove, Bit9′s Chief Technology Officer, draws from nearly two decades of application design and analysis with industry-leading IT enterprises to add a new layer of technical expertise and strategic vision to Bit9′s Trust-based Security Platform. Prior to joining Bit9 Sverdlove was principal research scientist for McAfee, Inc., where he supervised the overall architecture of crawlers, spam detectors and link analyzers. He joined McAfee through its 2006 acquisition of SiteAdvisor Inc., where he was chief scientist and developed systems for testing, detecting and analyzing any Windows-based application. Prior to SiteAdvisor, Sverdlove ran his own consulting company specializing in Windows automation and spam detection. He also was director of engineering at Compuware Corporation (formerly NuMega Technologies). Prior to NuMega, Sverdlove was principal architect for Rational Software, where he designed the core automation engine behind Rational Robot. He earned a bachelor’s degree in electrical engineering from the Massachusetts Institute of Technology.

All posts written by Harry Sverdlove

5 Ways to Make Information Sharing Programs More Successful

By: May 20, 2015

Threat intelligence and information sharing are critical ingredients to improving the cyber-security posture of both the private and public sectors. It is clear from the volume, sophistication and diversity of the cyber attacks we are seeing that the “bad guys”… Read More

CTO Corner: 3 Mobile Threats to Keep on Your Radar

By: May 6, 2015

Last week, my colleague Chris Lord offered an excellent look at some of the mobile trends seen at this year’s RSAC. As he noted, the increased prevalence and creation of apps and mobile malware as well as changes to the… Read More

3 Reasons Why Breached Organizations Are More Susceptible to Future Attacks

By: April 13, 2015

According to report from KrebsOnSecurity, the hotel franchise firm White Lodging Services Corporation acknowledged a suspected point-of-sale beach at 10 locations. As noted in the report, this is the second time in a year that multiple financial institutions noted fraud… Read More

Information Sharing: Walking a Tightrope or Tightening the Rope?

By: March 31, 2015

Technology and politics make strange bedfellows. Rarely do politicians understand the capabilities or nuances of the cyber landscape, and rarely do technologists understand (or care to understand) the compromises of politics. But in a world of cyber espionage and cyber… Read More

CTO Corner: A “FREAK” Accident or Totally Foreseeable?

By: March 4, 2015

Researchers have discovered a security hole impacting millions of web sites and web servers. Like the recent Heartbleed, Shellshock and POODLE vulnerabilities, this is another flaw that impacts core components of what make up the modern Internet. There are a… Read More

CTO Corner: Creation of CTIIC Demonstrates Heightened Importance of Cyber Security

By: February 11, 2015

The U.S. government is establishing a new federal agency tasked with correlating threat intelligence information and providing analysis of cyber-security risks. The new agency, known as the Cyber Threat Intelligence Integration Center (CTIIC), was officially announced Tuesday. The CTIIC will… Read More