About
With over 25 years of experience in cybersecurity, I am passionate about building and…
Articles by Caleb
Activity
-
Summary of this: adapt or die https://lnkd.in/g_mBYgmU
Summary of this: adapt or die https://lnkd.in/g_mBYgmU
Shared by Caleb Sima
-
This week I closed the chapter on Google Cloud, next week I start a new chapter as the CISO at Salesforce. Salesforce has always been a pioneer in…
This week I closed the chapter on Google Cloud, next week I start a new chapter as the CISO at Salesforce. Salesforce has always been a pioneer in…
Liked by Caleb Sima
-
AI is moving from assistant → operator. In this episode, Caleb walks Ashish through how he built an AI “Chief of Staff", an orchestrator that…
AI is moving from assistant → operator. In this episode, Caleb walks Ashish through how he built an AI “Chief of Staff", an orchestrator that…
Liked by Caleb Sima
Experience
Education
Publications
-
Hacking Exposed Web Applications 3rd Edition
McGraw-Hill Professional
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web…
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource.
Other authorsSee publication
Patents
-
Secure web application development and execution environment
Issued US 8,800,042
See patentProviding secure web application development and operation. In a web development environment, code developed for the web application is analyzed to identify vulnerabilities and remedial actions are identified. The remedial actions may be automatically invoked or a developer can be prompted to take particular actions to remediate the vulnerability.
-
Web application assessment based on intelligent generation of attack strings
Issued US 8,656,495
See patentA web application is more efficiently analyzed by intelligently generating attack sequences to be used in the assessment. Rather than simply sending a canned list of static strings at a web application, the operation of the web application is analyzed to determine the filtering and acceptance characteristics of the web site. As this information is ascertained, a vocabulary of allowed symbols is created. This vocabulary is used in the building of attack strings and as such, the number of attack…
A web application is more efficiently analyzed by intelligently generating attack sequences to be used in the assessment. Rather than simply sending a canned list of static strings at a web application, the operation of the web application is analyzed to determine the filtering and acceptance characteristics of the web site. As this information is ascertained, a vocabulary of allowed symbols is created. This vocabulary is used in the building of attack strings and as such, the number of attack strings fired at the web application is greatly reduced, as well as the number of false positives.
-
System and method for testing web applications with recursive discovery and analysis
Issued US 8,566,945
See patentA recursive web crawling and analysis tool that includes conducting an initial crawl of a target to identify testable or analyzable objects. The objects are then parsed to identify vulnerabilities, as well as additional objects that can be analyzed. An attack is then launched against the analyzable objects in an effort to break or verify the vulnerabilities. During this attack, additional analyzable objects may be discovered. If such additional objects are discovered, the web crawler is invoked…
A recursive web crawling and analysis tool that includes conducting an initial crawl of a target to identify testable or analyzable objects. The objects are then parsed to identify vulnerabilities, as well as additional objects that can be analyzed. An attack is then launched against the analyzable objects in an effort to break or verify the vulnerabilities. During this attack, additional analyzable objects may be discovered. If such additional objects are discovered, the web crawler is invoked on the additional objects as well, and the results of the crawl are fed back into the parser and attacker functions.
-
Secure web application development environment
Issued US 8,266,700
See patentVarious embodiments of systems, methods, software tools, etc. for providing secure web application development are provided. One embodiment comprises a method for developing a secure web application. One such method comprises: analyzing code associated with a web application to identify at least one vulnerable input; and validating the at least one vulnerable input.
-
Integrated crawling and auditing of web applications and web content
Issued US 7,765,597
See patentA vulnerability assessment tool that is operative to analyze web sites by simultaneously operating a crawling process and an audit process. Once the crawling process is invoked, the results are provided to the audit process. The audit process, rather than waiting until the crawl process is completed, simultaneously audits the web site based on the already provided crawl results. The results of the audit are also fed back to the crawl process to further enhance the crawl.
-
Automated user interaction in application assessment
Issued US 7,647,631
See patentVarious embodiments of systems, methods, software tools, etc. for performing an assessment of an application are provided. One embodiment comprises a method for performing an assessment of a web application. One such method comprises: recording user interactions with a web application; and playing back the user interactions to perform an assessment of the web application.
-
Web application auditing based on sub-application identification
Filed US 20080120305
See patentTechniques to programmatically identify similar areas of a website or web application to reduce the scope required for a web security audit
-
Characterization of web application inputs
Filed US 20080120420
See patentTechniques to programmatically determine valid input for a given web application from the outside, including allow and denied sequences, to aid in the auditing of web site security
Projects
-
Blackhat CISO & Entrepreneur Summit Committee
Help build the Blackhat agendas and topics as well as create the first Entrepreneur Summit
-
Investor & Advisor
Portfolio includes but not limited to: ArmorBlox, Bridgecrew, Cequence, CloudZero, Cobalt, Capsule8, Cyral, DeepFactor, Drata, Eclypsium, Endor Labs, Fossa, Halcyon, Hivewatch, Incode, Island, JupiterOne, Noq, Orca, Otterize, Permiso, Pindrop, Polaris, ProjectDiscovery, Remediant, Resourcely, Rezilion, Truffle, Tines, Tonic, Tromzo, Phylum, Traceable, Wing, Kabbage, Veza
-
Riskrubric.ai
-
Organizations
-
SVCI - Silicon Valley CISO Investments
Investor
- Present -
Pindrop Security
Investor & Advisor
- Present
Recommendations received
16 people have recommended Caleb
Join now to viewMore activity by Caleb
-
Everyone should read this - CISO or not. Has great insights
Everyone should read this - CISO or not. Has great insights
Shared by Caleb Sima
-
The HITCH PARTNERS 2026 Global CISO Compensation Benchmark Report is here! Here is the link: https://lnkd.in/gV4a8qVT (this is an interactive report…
The HITCH PARTNERS 2026 Global CISO Compensation Benchmark Report is here! Here is the link: https://lnkd.in/gV4a8qVT (this is an interactive report…
Liked by Caleb Sima
-
If your AI agent can read sensitive data and take actions, you must assume runtime abuse. Treat every tool invocation as a privileged action: →…
If your AI agent can read sensitive data and take actions, you must assume runtime abuse. Treat every tool invocation as a privileged action: →…
Liked by Caleb Sima
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content