About
Software engineer, entrepreneur, executive and investor with a long history of building…
Services
Activity
-
Thank you Paul Johnson for having Josh Burgess and me on Optimistic American to discuss Citizens' Assemblies and the power (and opportunity) we have…
Thank you Paul Johnson for having Josh Burgess and me on Optimistic American to discuss Citizens' Assemblies and the power (and opportunity) we have…
Liked by Roger Thornton
-
As businesses worldwide navigate the adoption of AI, WitnessAI's team unveils a significant breakthrough! WitnessAI has announced the general…
As businesses worldwide navigate the adoption of AI, WitnessAI's team unveils a significant breakthrough! WitnessAI has announced the general…
Shared by Roger Thornton
-
Welcome Gregory Crabb, former United States Postal Service CISO, as a new CISO-in-Residence at Ballistic Ventures! With 25 years of experience in…
Welcome Gregory Crabb, former United States Postal Service CISO, as a new CISO-in-Residence at Ballistic Ventures! With 25 years of experience in…
Liked by Roger Thornton
Experience
Education
-
San Jose State University
-
Activities and Societies: Tau Beta Pi Engineering honor society
Graduate education was self-funded through full-time employment. Graduate project: Object Oriented Framework for Computer Integrated Manufacturing (CIM) Application Development
-
-
Activities and Societies: Chairman, SJSU Student Union Board of Directors
Undergraduate education funded through full time employment.
Publications
Patents
-
Malware clustering based on function call graph similarity
Issued 10,990,674
Techniques are disclosed relating to malware clustering based on function call graph similarity. In some embodiments, a computer system may access information corresponding to a plurality of malware samples and, based on the information, generate a function call graph for each of the malware samples. In some embodiments, generating the function call graph for a given malware sample includes identifying a plurality of function calls included in the information, assigning a label to each of the…
Techniques are disclosed relating to malware clustering based on function call graph similarity. In some embodiments, a computer system may access information corresponding to a plurality of malware samples and, based on the information, generate a function call graph for each of the malware samples. In some embodiments, generating the function call graph for a given malware sample includes identifying a plurality of function calls included in the information, assigning a label to each of the function calls, identifying relationships between the function calls, and generating the function call graph based on the relationships and the labels. Based on the function call graphs, the computer system may assign each of the plurality of malware samples into one of a plurality of clusters of related malware samples.
-
Storage system for network information
Issued 10,992,519
Techniques are disclosed relating to storage of network event information for multiple tenants. In some embodiments, one or more host computer systems are configured to maintain a plurality of containers operable to isolate network event information of a plurality of tenants from others of the plurality of tenants. The plurality of containers includes a first container that includes a first database executable to store network event information for a first of the plurality of tenants, and a…
Techniques are disclosed relating to storage of network event information for multiple tenants. In some embodiments, one or more host computer systems are configured to maintain a plurality of containers operable to isolate network event information of a plurality of tenants from others of the plurality of tenants. The plurality of containers includes a first container that includes a first database executable to store network event information for a first of the plurality of tenants, and a second container that includes a second database executable to store network event information for a second of the plurality of tenants. In some embodiments, a management computer system is configured to receive, from the first tenant, a request to access network event information of the first tenant and route the request to a host computer system maintaining the first container to cause the first database to service the request.
-
Detection system for network security threats
Issued US 10904278
-
Malware clustering based on analysis of execution behavior
Issued US 10846406
-
Apparatus and method for monitoring secure software
Issued US 7,975,306
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions perform a security audit of program instructions. Based upon the security audit, sensors are inserted into the program instructions. The program instructions are executable and the sensors generate a stream of security events. The stream of security events is monitored and security performance results are reported.
Other inventorsSee patent -
APPARATUS AND METHOD FOR DEVELOPING SECURE SOFTWARE
Issued US US 7207065 B2
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
Other inventorsSee patent
Honors & Awards
-
2017 Alumni Award of Distinction
SJSU Charles W. Davidson College of Engineering
79th recipient of the Award of Distinction, given annually to SJSU alumni with notable outstanding accomplishments.
Organizations
-
Tau Beta Pi - Engineering Honor Society
Member
- Present
More activity by Roger
-
This year’s Uniting Women in Cyber (#UWIC) event was sold out, and I couldn’t be more proud to see the incredible impact this organization is having.…
This year’s Uniting Women in Cyber (#UWIC) event was sold out, and I couldn’t be more proud to see the incredible impact this organization is having.…
Liked by Roger Thornton
-
AirEye protects against the downside risk that WiFi connectivity has exposed to airspace vulnerability heretofore not addressed. Enterprises need to…
AirEye protects against the downside risk that WiFi connectivity has exposed to airspace vulnerability heretofore not addressed. Enterprises need to…
Liked by Roger Thornton
-
We're incredibly excited to welcome longtime Snowflake CISO Mario Duarte as the new CISO of Aembit. Mario's impact on Snowflake from pre-revenue to…
We're incredibly excited to welcome longtime Snowflake CISO Mario Duarte as the new CISO of Aembit. Mario's impact on Snowflake from pre-revenue to…
Liked by Roger Thornton
-
Protopia AI's Stained Glass Transform, accelerated by NVIDIA DGX Cloud, enables secure, privacy-preserving LLMs by transforming data into secure…
Protopia AI's Stained Glass Transform, accelerated by NVIDIA DGX Cloud, enables secure, privacy-preserving LLMs by transforming data into secure…
Liked by Roger Thornton
-
Barmak, Great addition of Paul Nakasone to Ballistic Ventures’ deep bench. Adding global threat awareness, NSA connections and established leadership…
Barmak, Great addition of Paul Nakasone to Ballistic Ventures’ deep bench. Adding global threat awareness, NSA connections and established leadership…
Liked by Roger Thornton
-
Congratulations to our portfolio companies, Aembit and Oligo Security, which were recognized in the 2024 SC Media Awards: 🏆 Best Authentication…
Congratulations to our portfolio companies, Aembit and Oligo Security, which were recognized in the 2024 SC Media Awards: 🏆 Best Authentication…
Liked by Roger Thornton
-
See why leading fintech apps are using Open Banking to build smarter, faster, and more cost-effectively.
See why leading fintech apps are using Open Banking to build smarter, faster, and more cost-effectively.
Liked by Roger Thornton
-
A few weeks ago I finished up the 3-body problem by Liu Cixin. Regardless of the story, I was really taken by the physics of the problem described…
A few weeks ago I finished up the 3-body problem by Liu Cixin. Regardless of the story, I was really taken by the physics of the problem described…
Liked by Roger Thornton
-
This 💯 from Bob Lord We live in a world of what I refer to as "digital Boeing's" that have already inflicted massive damages/harms and more to come…
This 💯 from Bob Lord We live in a world of what I refer to as "digital Boeing's" that have already inflicted massive damages/harms and more to come…
Liked by Roger Thornton
-
👀 Check out this #feature! Managing employee #risk around #AI app adoption is important. Equally important, and usually less visible, is observing…
👀 Check out this #feature! Managing employee #risk around #AI app adoption is important. Equally important, and usually less visible, is observing…
Liked by Roger Thornton
-
I'll be discussing activity monitoring for safe GenAI use during this SecureWorld session. Register below to join us on September 17th!
I'll be discussing activity monitoring for safe GenAI use during this SecureWorld session. Register below to join us on September 17th!
Liked by Roger Thornton
-
Not sure my family finds me *that* fascinating, but I still try to convince my son I'm a cybercrime fighting superhero and now I have data. Thanks…
Not sure my family finds me *that* fascinating, but I still try to convince my son I'm a cybercrime fighting superhero and now I have data. Thanks…
Liked by Roger Thornton
-
Many of you asked what happened behind the scenes with my #blackhat panel with George Kurtz, Barmak Meftah, and Andrew Peterson. This is also why I…
Many of you asked what happened behind the scenes with my #blackhat panel with George Kurtz, Barmak Meftah, and Andrew Peterson. This is also why I…
Liked by Roger Thornton
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Roger Thornton in United States
-
Roger Thornton
Senior Human Resources Manager at Saddle Creek Logistics Services
-
Roger Thornton
-
Roger Thornton
Controls Systems Lead
-
Roger Thornton
Marketing Manager at Hammer Restoration Inc.
47 others named Roger Thornton in United States are on LinkedIn
See others named Roger Thornton