About
Services
Articles by Michael
Contributions
Activity
-
I wasted a TON of money building Hacker in Heels. If I could go back, here’s what I’d do differently: ⚖️ NOT move my LLC around the country with me,…
I wasted a TON of money building Hacker in Heels. If I could go back, here’s what I’d do differently: ⚖️ NOT move my LLC around the country with me,…
Liked by Michael Scheidell
-
hey linkedin WTF is this? if I wanted to waste my time on facbook playing games, I would. my game now, is guess the connection request: 1)…
hey linkedin WTF is this? if I wanted to waste my time on facbook playing games, I would. my game now, is guess the connection request: 1)…
Shared by Michael Scheidell
-
FBI to Americans: Don't trust the phone networks for sensitive stuff; use apps that support encrypted communications [edit: Signal is a good option…
FBI to Americans: Don't trust the phone networks for sensitive stuff; use apps that support encrypted communications [edit: Signal is a good option…
Liked by Michael Scheidell
Experience & Education
Licenses & Certifications
Volunteer Experience
-
Mentor and Trainer
Grey Team
- Present 4 years 10 months
i18n_veterans
Teaching and mentoring veterans in entry level IT, helpdesk, service desk, and field service engineer.
Assisting them in transitioning from 'in country' back to civilian life.
Created a division (Teamone.Support) as a way to give them real life internships.
Publications
-
Undocumented OSI Layers
Various
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack. Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist. When it comes to navigating the executive suite and undocumented layers of the OSI model, you need to know how to deal with the…
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack. Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist. When it comes to navigating the executive suite and undocumented layers of the OSI model, you need to know how to deal with the corner office.
Other authors
Patents
-
Intrusion detection system
Issued US 7603711
An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or general attacks or attacks directed towards a specific computer network and generates a corresponding signal. The intrusion detections system also tests a computer network's vulnerability to attacks…
An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or general attacks or attacks directed towards a specific computer network and generates a corresponding signal. The intrusion detections system also tests a computer network's vulnerability to attacks detected on the other monitored hosts.
-
Intrusion detection system
Filed US 20100100961
continuation of original patent:
An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or general attacks or attacks directed towards a specific computer network and generates a corresponding signal. The intrusion detections system also tests a computer…continuation of original patent:
An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or general attacks or attacks directed towards a specific computer network and generates a corresponding signal. The intrusion detections system also tests a computer network's vulnerability to attacks detected on the other monitored hosts.
Projects
-
FreeBSD Development Team, Ports Committer
-
As part of the FreeBSD Development team, my responsibilities include reviewing new open source projects for FreeBSD, making sure they can be included in FreeBSD's official third party ports, assisting other third party porters, and committing new ports and changes to the FreeBSD ports source repository.
-
Official Maintainer, FreeBSD port of SpamAssassin
-
SpamAssassin is a mail filter which attempts to identify spam using text analysis and several internet-based realtime blacklists.
Using its rule base, it uses a wide range of heuristic tests on mail
headers and body text to identify "spam", also known as unsolicited commercial email.
Once identified, the mail can then be optionally tagged as spam for later filtering using the user's own mail user-agent application.
I am currently the official port maintainer of the…SpamAssassin is a mail filter which attempts to identify spam using text analysis and several internet-based realtime blacklists.
Using its rule base, it uses a wide range of heuristic tests on mail
headers and body text to identify "spam", also known as unsolicited commercial email.
Once identified, the mail can then be optionally tagged as spam for later filtering using the user's own mail user-agent application.
I am currently the official port maintainer of the FreeBSD port of SpamAssassin (under FreeBSD: mail/p5-Mail-SpamAssassin)
-
Official SpamAssassin Update Mirror
-
One of three official SpamAssassin Update mirrors. These three mirrors serve the official updates for the SpamAssassin Open Source anti-spam engine. That engine that is at the core of (many? most?) of the commercial anti-spam systems in production today.
The update servers host the latest rule updates for all supported versions of SpamAssassin, and are pgp signed to prevent issues with man in the middle attacks, dns hijacking, or compromise of the slave or master servers.
Each…One of three official SpamAssassin Update mirrors. These three mirrors serve the official updates for the SpamAssassin Open Source anti-spam engine. That engine that is at the core of (many? most?) of the commercial anti-spam systems in production today.
The update servers host the latest rule updates for all supported versions of SpamAssassin, and are pgp signed to prevent issues with man in the middle attacks, dns hijacking, or compromise of the slave or master servers.
Each official server gets near real time updates from a master server and, via the sa-update command in SpamAssassin, users and systems administrators can periodically receive updates (see url above)
Unique to this project is the use of a virtualized FreeBSD server, and an embedded web server rather than a full Apache web server.
This project was an experiment in adding a lightweight webserver, trying to see how little resources could be allocated to a public server. (We did 10 times as much with the same cpu/ram resources as a traditional server).
The results of this experiment allowed SECNAP to apply what it learned to their HackerTrap/CloudJacket Managed IPS service, as well as their SpammerTrap email security appliance.
Additionally, the virtualization and resource results allowed SECNAP to reduce the resource requirements for their IONSPAM VPS system that server fault tolerant/clustered versions of their SpoammerTrap email security appliance.
-
Enterprise VOIP Communications Server
-
Selected, developed and maintained software, SIP Trunk providers and platform for SECNAP's in house communications and collaboration server.* (sipx, asterisk)
System included capacity for 23 simultaneous inbound or outbound local calls to the PSTN 80 simultaneous inbound Toll free calls, and 20 outbound international calls, all via SIP Trunking though multiple SIP Trunk Providers.
System supported up to 43 simultaneous conference calls, individual private conference rooms for…Selected, developed and maintained software, SIP Trunk providers and platform for SECNAP's in house communications and collaboration server.* (sipx, asterisk)
System included capacity for 23 simultaneous inbound or outbound local calls to the PSTN 80 simultaneous inbound Toll free calls, and 20 outbound international calls, all via SIP Trunking though multiple SIP Trunk Providers.
System supported up to 43 simultaneous conference calls, individual private conference rooms for users, voicemail to email, call forwarding, call forwarding find me, hunt groups, ACD. Individual users could upload and select their own music on hold, or use default MOH media device or shared file directory.
Additionally, a freeswitch based secondary server was located in SECNAP's DR site to accept and route calls to selected managers in case of primary server or service outage.
System supported multiple SIP based telephones, as well as softphones and SIP clients for Android and Iphone.
Modifications to the provided software included a .wav to .mp3 conversion program that allowed for smaller voicemails. This was especially important to mobile users who received voicemail in their email.
System was placed behind its own dedicated firewall and internal network. This was necessary for two reasons: Security and performance. Isolating the internal SIP traffic from the internal network via physically isolated network drops kept any internal bandwidth usage from degrading voice quality. Additionally, the default sip trunking ports needed to be changed, and specific QOS tags added. -
IONSPAM Cloud based email security
-
IONSPAM is a virtualized, geographically disperse set of clustered high availability servers designed to logically and physically isolate performance and downtime issues.
With its initial release, the SpammerTrap was given a 4* rating by SC magazine who called it 'The King of Spam Filters'. https://www.scmagazine.com/review/secnap-spammertrap/
Built on FreeBSD, SpamAssassin, Mysql, clamav and amavisd, it uses no commercial virtualization products.
Due to the zero…IONSPAM is a virtualized, geographically disperse set of clustered high availability servers designed to logically and physically isolate performance and downtime issues.
With its initial release, the SpammerTrap was given a 4* rating by SC magazine who called it 'The King of Spam Filters'. https://www.scmagazine.com/review/secnap-spammertrap/
Built on FreeBSD, SpamAssassin, Mysql, clamav and amavisd, it uses no commercial virtualization products.
Due to the zero virtual task switching costs, it can host more users per cpu than traditional cloud based solutions.
High availability servers at each data center ensure 99.999% uptime at each location. Two geographic locations, clustered together ensures virtually 100% data availability.
Client isolation, inherent in virtualization technologies allow each client the ability of full control over their email security environment while enhancing the security.Other creators -
SpammerTrap/Rule18. Email Security and Encryption
-
I was chief scientist and inventor of SECNAP's SpammerTrap award winning email security and anti-spam appliance, as well as the Rule18 email encryption engine for it.
5 star ratings from third party reviewers, accuracy above 99.96%. Included 4 real time reputation databases, 4 times the number of spam/virus checks. Quarantined zero day attachments.
Other creators -
Hackertrap
-
HackerTrap (currently marketed as 'Cloudjacket' and has been used to protect US State Department SCIF / SAP Top Secret emails) integrates a patented Edge Attack Sensor Network and Smart Alert Filter, an extensive and robust database of rules and signatures.
At the core is SourceFire's SNORT attack detection engine, customized rulesets.
It is a Hybrid IDS/IPS with zero latency. I was able to achieve zero latency due to my background in real time/ robotics and factory…HackerTrap (currently marketed as 'Cloudjacket' and has been used to protect US State Department SCIF / SAP Top Secret emails) integrates a patented Edge Attack Sensor Network and Smart Alert Filter, an extensive and robust database of rules and signatures.
At the core is SourceFire's SNORT attack detection engine, customized rulesets.
It is a Hybrid IDS/IPS with zero latency. I was able to achieve zero latency due to my background in real time/ robotics and factory automation.
Coupled with my earlier work at Florida Datamation on robotics, artificial intelligence, war and game theory, I was able to build a statistical engine that eliminated up to 98% of the false positives.
The GUI included customizable dashboard widgets that allow high visibility into network and attack status.Other creators -
Nessus/OpenVas Plugins
-
Originally written for Nessus Open Source Vulnerabilities Scanner, but incorporated into the OpenVas scanner when it branched from Nessus.
29 of my original Nessus Plugins survive in the OpenVas project.
http://openvas.komma-nix.de/ select [*] Copyright
16 copyright scheidell and 13 written by me and copyright secnap
Honors & Awards
-
Security Privateers LLC Receives 2015 Best of Boca Raton Award
Boca Raton Award Program
BOCA RATON September 30, 2015 -- Security Privateers LLC has been selected for the 2015 Best of Boca Raton Award in the Management Consulting Services category by the Boca Raton Award Program.
Each year, the Boca Raton Award Program identifies companies that we believe have achieved exceptional marketing success in their local community and business category. These are local companies that enhance the positive image of small business through service to their customers and our community…BOCA RATON September 30, 2015 -- Security Privateers LLC has been selected for the 2015 Best of Boca Raton Award in the Management Consulting Services category by the Boca Raton Award Program.
Each year, the Boca Raton Award Program identifies companies that we believe have achieved exceptional marketing success in their local community and business category. These are local companies that enhance the positive image of small business through service to their customers and our community. These exceptional companies help make the Boca Raton area a great place to live, work and play.
http://bocaraton.bocaraton.local-best.com/PressReleaseub.aspx?cc=DE3G-RBFG-Y8QQ
-
Senior Member ISSA
ISSA
ISSA created Senior Membership to recognize, as well as tap into, the wealth of experiences their members bring to the association and the information security community.
ISSA looks to their Senior Members to be ambassadors for the ISSA and to provide insights and guidance in a range of areas:
· Technical, academic and research excellence
· Managerial and program/project excellence
-
Senior Member IEEE Computer Society
IEEE.org
The IEEE is the world's largest professional association for the advancement of technology, only 8% of it's over 430,000 members have achieved senior grade. Senior Member is the highest grade for which IEEE members can apply.
-
Golden Bridge Awards: 2008-2009 Executive Award Winner
Golden Bridge Award
Golden Bridge Awards are an annual industry and peers recognition program honoring Best Companies of all types and sizes in North America, Europe, Middle-East, Africa, Asia-Pacific, and Latin-America, Best Products, Innovations, Management and Teams, Women in Business and the Professions, and PR and Marketing Campaigns from all over the world. Learn more about The Golden Bridge Awards at www.goldenbridgeawards.com.
The Golden Bridge Business awards were created to honor and generate…Golden Bridge Awards are an annual industry and peers recognition program honoring Best Companies of all types and sizes in North America, Europe, Middle-East, Africa, Asia-Pacific, and Latin-America, Best Products, Innovations, Management and Teams, Women in Business and the Professions, and PR and Marketing Campaigns from all over the world. Learn more about The Golden Bridge Awards at www.goldenbridgeawards.com.
The Golden Bridge Business awards were created to honor and generate industry wide recognition of the achievements and positive contributions of organizations and businesses worldwide in every area.
http://theglobee.com/world/2010/index.html -
Finalist, EETimes ACE Award, Innovators of the Year
EE Times Magazine
One of five international Finalists,
http://www.eetimes.com/document.asp?doc_id=1269210
-
MVP Award for Technology Leadership, CTO
Network Products Guide
Industry's Most Valuable Players, Chief Technology Officer
http://www.networkproductsguide.com/MVP/2008/index.html
-
Shaping Information Security Award
Information Security Products Guide
-
Technology Award in Internet-Based Technology
South Florida Business Journal
Languages
-
English
Native or bilingual proficiency
-
NewSpeak
Full professional proficiency
Organizations
-
Federalist Society
Member
- PresentThe Federalist Society for Law and Public Policy Studies is a group of conservatives and libertarians interested in the current state of the legal order. It is founded on the principles that the state exists to preserve freedom, that the separation of governmental powers is central to our Constitution, and that it is emphatically the province and duty of the judiciary to say what the law is, not what it should be. The Society seeks both to promote an awareness of these principles and to…
The Federalist Society for Law and Public Policy Studies is a group of conservatives and libertarians interested in the current state of the legal order. It is founded on the principles that the state exists to preserve freedom, that the separation of governmental powers is central to our Constitution, and that it is emphatically the province and duty of the judiciary to say what the law is, not what it should be. The Society seeks both to promote an awareness of these principles and to further their application through its activities.
-
Miami Electronic Crime Task Force (MECTF)
Member
- PresentUnited States Secret Service Miami Electronic Crimes Task Force investigates cyber crime, computer crimes, network intrusions, online enticements, hacking cases, web site defacements and identity theft relative to the security of financial and personal information. Members of the MECTF include the federal and local law enforcement community, as well as financial institutions, academia and members of the private sector involved in computer…
United States Secret Service Miami Electronic Crimes Task Force investigates cyber crime, computer crimes, network intrusions, online enticements, hacking cases, web site defacements and identity theft relative to the security of financial and personal information. Members of the MECTF include the federal and local law enforcement community, as well as financial institutions, academia and members of the private sector involved in computer security. http://www.secretservice.gov/ectf_miami.shtml
-
FBI InfraGard
Member/Former Board Member FBI InfraGard South Florida Chapter
- PresentInfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. Each InfraGard Chapter has an FBI Special Agent Coordinator assigned to it, and the FBI Coordinator works closely with Supervisory Special Agent Program Managers in the Cyber Division at FBI Headquarters in Washington, D.C.
-
ISACA
Platinum Member, South Florida Chapter
- PresentInformation Systems Audit and Control Association (ISACA) provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide. The COBIT, Val IT and Risk IT governance frameworks and the CISA, CISM, CGEIT and CRISC certifications are ISACA brands respected and used by these professionals…
Information Systems Audit and Control Association (ISACA) provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide. The COBIT, Val IT and Risk IT governance frameworks and the CISA, CISM, CGEIT and CRISC certifications are ISACA brands respected and used by these professionals for the benefit of their enterprises.
-
ISSA
Senior Member and Speaker, South Florida Chapter
-Was a senior member, they refused to stop sending sponsored spam unless I remove my membership that I pay for. I asked they delete me information. Shame on you ISSA. The goal of the Information Systems Security Association, Inc. is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources. The ISSA is dedicated to providing resources to such people and organizations, as well as to generally raising the level of…
Was a senior member, they refused to stop sending sponsored spam unless I remove my membership that I pay for. I asked they delete me information. Shame on you ISSA. The goal of the Information Systems Security Association, Inc. is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources. The ISSA is dedicated to providing resources to such people and organizations, as well as to generally raising the level of security and data privacy consciousness among information systems personnel in all organizations.
-
Cloud Security Alliance, South Florida Chapter
President, South Florida Chapter
-The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. http://cloudsecurityalliance.org
-
ASIS International
Member
-ASIS International is a global community of security practitioners, each of whom has a role in the protection of assets - people, property, and/or information. Our members represent virtually every industry in the public and private sectors, and organizations of all sizes. From entry-level managers to CSOs to CEOs, from security veterans to consultants and those transitioning from law enforcement or the military, the ASIS community is global and diverse.
-
FISA, the Financial Institution Security Association
Member
-Formed in 1980 to combat crimes perpetrated against our members. We serve as a vital communications link for financial institutions of all sizes in the South Florida region, developing and distributing security information to our members and to law enforcement agencies. *We maintain a comprehensive member directory. *We provide training and networking opportunities. Through strength in numbers, common vigilance and the sharing of information, FISA empowers our members to prevent losses as well…
Formed in 1980 to combat crimes perpetrated against our members. We serve as a vital communications link for financial institutions of all sizes in the South Florida region, developing and distributing security information to our members and to law enforcement agencies. *We maintain a comprehensive member directory. *We provide training and networking opportunities. Through strength in numbers, common vigilance and the sharing of information, FISA empowers our members to prevent losses as well as improve the strength of our businesses and the financial industry in general. Join today and enjoy the peace-of-mind of being informed by the leading authorities in our industry
-
IAPP
Member
-The International Association of Privacy Professionals (IAPP) is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge.
-
IEEE
Senior Member, Palm Beach Section, Computer Society
Institute of Electrical and Electronics Engineers (IEEE) is the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards, and professional and educational activities.
-
SFTA
Member
The South Florida Technology Alliance (SFTA) promotes the growth, success and awareness of the regional technology community. Through events, networking, programs and education, we provide south Florida’s technology-related companies, academic institutions, entrepreneurs, governments and related organizations with an active forum to grow the business of technology in our region.
Recommendations received
20 people have recommended Michael
Join now to viewMore activity by Michael
-
Really excited about our new software platform as we think it can be a game changer for first line SOC workloads...using AI at a fraction of the cost…
Really excited about our new software platform as we think it can be a game changer for first line SOC workloads...using AI at a fraction of the cost…
Liked by Michael Scheidell
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Michael Scheidell
1 other named Michael Scheidell is on LinkedIn
See others named Michael Scheidell