Contributor Biography

Home  /  Blogs  /  Contributors  /  Contributor Biography
Tom Badders

Tom Badders

Tom Badders is a Senior Product Manager at Telos Corporation, a leading provider of cyber, cloud and enterprise security solutions for the world’s most security-conscious organizations. Tom’s focus is on network capabilities to protect organizations and individuals from cyber threats.  Tom has extensive knowledge and expertise in managed attribution, obfuscation, and encryption for cloud and premise-based networks.  Leveraging over 40 years of experience in systems and network integration, Tom is an expert in secure wireless and mobility solutions, including the application of wireless technology to voice, video, and data operational environments. At Telos, Tom drives the strategy and direction for the company's cloud-based managed attribution products and services business and, in turn, provides industry leadership for the development of obfuscation technologies to help eliminate attack surfaces targeted by cyber adversaries.

Tom is a member of the Armed Forces Communications and Electronics Association's Department of Defense Mobility Working Group. He holds multiple Product Management certifications.

How to protect cyber red teams from blowing their cover.

Tom Badders
June 17, 2020

Organizations employ red teams to stress-test the security of their IT systems and the personnel who use and manage them.  The red team may be an internal unit or they may be consultants engaged from the outside. In either case, the team takes on the persona of an adversary whose mission is to find, exploit, and report on vulnerabilities in systems and people under hostile real-world conditions.  

Continue Reading ...

A Hitchhiker’s Guide to the Lawless Internet

Tom Badders
March 12, 2020

What you can do to protect your information when it leaves the enterprise network.

Continue Reading ...

Ensuring Privacy and Security in the Wake of the Iranian Cyber Threat

Tom Badders
January 15, 2020

DHS’ practical advice contains good housekeeping measures for normal organizational operation over the internet. However, we can no longer afford to pursue our organizational missions as if these are normal times.

Continue Reading ...

Digital Disguises for Cyber Operations

Tom Badders
November 4, 2019

There are various types of cyber operations that need to disguise the identities of their personnel and avoid detection to protect networks and information: red teams, penetration testers, security researchers, and cyber threat analysts.

Continue Reading ...

Secure the Supply Chain by Eliminating the Cyber Attack Surface

Tom Badders
June 12, 2019

According to the Symantec 2019 Internet Security Threat Report, supply chain attacks spiked 78 percent in 2018.  Not only is the volume and severity of these attacks growing, so is their sophistication.

Continue Reading ...

Improving Endpoint Security via Obfuscation and Managed Attribution

Tom Badders
April 18, 2019

Organizations’ network communications depend on the internet. This week, we announced enhancements to Telos Ghost, a network infrastructure provided as a service that secures your organization’s valuable network resources by providing high levels of obfuscation and encryption.

Continue Reading ...

Can Your Thermostat Take Down the Internet?

Tom Badders
September 27, 2016

The recent Krebs attack is a case study in exploiting IoT for DDoS.

Continue Reading ...

Mobile device management and the future of enterprise mobility.

Tom Badders
June 21, 2016

Integration, interoperability, and security are the key factors in deploying a successful mobile enterprise.

Continue Reading ...