Author Archives: Nathan Cooprider


Nathan Cooprider is a software engineer working on the Endpoint team within Bit9’s engineering division. Nathan has led the signal processing software team for the MQ9 Predator drone at BAE prior to joining Bit9. He received his BS in CS from Brigham Young University and his PhD in CS from the University of Utah. Nathan has over a decade of experience working with computer systems. This includes eight refereed publications on the static analysis of microcontroller applications written in C. He also wrote a paper on multivariate data visualization, co-authored a paper on multiple hypothesis tracking, and has supported language modeling research. Nathan has accumulated experience with many software engineering languages and tools through this exposure to various areas of computer science. These languages and tools include C, C++, perl, doxygen, Jenkins, OCaml, CIL, and many others.

All posts written by Nathan Cooprider

Legal and Political Perspectives of Cyber Security

By: October 21, 2013
Cyber Attack

I recently listened to Paul Rosenzweig‘s Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare from the Great Courses. I found the content thought-provoking and relevant, which surprised me. Not knowing anything about Professor Rosenzweig or the Great Courses program,… Read More

Managing Security Tradeoffs between Private and Public Information

By: July 11, 2013

My smartphone died last week. That’s a pain in and of itself, but my security mindset compounded the problem by setting up two-factor authentication on the device. On the one hand, bad actors can’t get into my accounts without my… Read More

Thinking About Security Daemons

By: June 14, 2013
Hand Code

Looking for a good book to read at the beach? I highly recommend the techno-thriller Daemon (and its sequel Freedom™) by Daniel Suarez. The story follows the fallout when a fictional game designer writes a powerful Internet daemon that activates… Read More

Threat Intelligence: Using The Machine for Cybersecurity or Cyberattacks

By: May 29, 2013

My first post to this blog came as a response to the season finale of the hit CBS drama Person of Interest. The second season has now finished, and finished well. I remain very excited by where the story has… Read More

Convenience vs. Security: Avoiding Trade-offs That Hurt Your Business

By: April 25, 2013

I have fond memories of visiting the Oklahoma City Science Museum with my grandfather. I always found the pendulum clock fascinating. We can glean a lot from a pendulum as it swings back and forth between two points. It seems… Read More

The Realities of Cyberwar: Fear, Uncertainty and Doubt

By: April 2, 2013

Cyberwar – what does that even mean? I typically try to avoid semantic disputes; I think this mostly comes from experience (my wife has a degree in linguistics and I always lose). I also feel like most semantic arguments mask… Read More