“Corey and I worked together at both Microsoft and Parallels. He did such a fantastic job at both companies across a range of functions and products, and it has been great to see what he has gone on to accomplish at Rapid7 over the past several years. I highly recommend Corey.”
About
Activity
-
I’m honored to share that I’ve been appointed CEO of MongoDB. It is evident that Dev Ittycheria and his team have built a remarkable foundation at…
I’m honored to share that I’ve been appointed CEO of MongoDB. It is evident that Dev Ittycheria and his team have built a remarkable foundation at…
Liked by Corey Thomas
-
When I talk with security leaders, something I often hear is that they’re chasing measurable impact. At Rapid7, our mission is to simplify access…
When I talk with security leaders, something I often hear is that they’re chasing measurable impact. At Rapid7, our mission is to simplify access…
Shared by Corey Thomas
-
Very honored and excited to be a part of the Decelerate crew! James Roycroft-Davis and I bonded awhile ago over a shared frustration (anger?) that…
Very honored and excited to be a part of the Decelerate crew! James Roycroft-Davis and I bonded awhile ago over a shared frustration (anger?) that…
Liked by Corey Thomas
Volunteer Experience
Patents
-
Methods and systems for testing and analyzing vulnerabilities of computing systems based on exploits of the vulnerabilities
Filed US US 20110191854 A1
A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities. The security tool can determine the risk level based on exploits associated with the vulnerabilities. The security tool can determine the risk level based on factors associated with the exploits such as whether an exploit exists, a rank of the exploit, a number of exploits that exist for the vulnerability, a difficulty to identify whether the exploit exists, and an effect of the…
A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities. The security tool can determine the risk level based on exploits associated with the vulnerabilities. The security tool can determine the risk level based on factors associated with the exploits such as whether an exploit exists, a rank of the exploit, a number of exploits that exist for the vulnerability, a difficulty to identify whether the exploit exists, and an effect of the exploit on the vulnerability. The security tool can a report identifying the vulnerabilities of the computing system, the exploits associated with the vulnerabilities, and the risk level of the vulnerabilities. The report can also include links to information about the exploits.
Other inventorsSee patent
Languages
-
Spanish
-
Recommendations received
4 people have recommended Corey
Join now to viewMore activity by Corey
-
"There's no 'there' there; there's only 'here' here." This truth hit me during a week of hiking in England's Lake District with poet David Whyte.…
"There's no 'there' there; there's only 'here' here." This truth hit me during a week of hiking in England's Lake District with poet David Whyte.…
Liked by Corey Thomas
-
I’m honored to share that I’ve joined DTCC as Chief Information Security Officer, leading first-line cybersecurity strategy and operations within the…
I’m honored to share that I’ve joined DTCC as Chief Information Security Officer, leading first-line cybersecurity strategy and operations within the…
Liked by Corey Thomas
-
Christina Luconi, the GOAT Chief People Officer in Boston, had the reward crowd glued to their seats with her brilliant session on Work-Life Harmony!…
Christina Luconi, the GOAT Chief People Officer in Boston, had the reward crowd glued to their seats with her brilliant session on Work-Life Harmony!…
Liked by Corey Thomas
-
Big news! Delighted to announce the launch of our new Rapid7 Intelligence Hub. Designed to address the challenges faced by security teams of…
Big news! Delighted to announce the launch of our new Rapid7 Intelligence Hub. Designed to address the challenges faced by security teams of…
Liked by Corey Thomas
Other similar profiles
-
Karen Page
Karen Page
-
Kelly Ford Buckley
Kelly Ford Buckley
-
Leif E. Pedersen
Leif E. Pedersen
-
Luke Vernon
Luke Vernon
-
Byron Deeter
Byron Deeter
-
Bogomil Balkansky
Bogomil Balkansky
-
Jason Green
Jason Green
-
Alexander "Sasha" Galitsky, Ph.D.
Alexander "Sasha" Galitsky, Ph.D.
-
Spencer Tall
Spencer Tall
-
Will Price
Will Price
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Corey Thomas
629 others named Corey Thomas are on LinkedIn
See others named Corey Thomas