Search

Mark Dehus Phones & Addresses

  • Thornton, CO
  • Denver, CO
  • 6879 Pentland Way APT 62, Fort Myers, FL 33966
  • Boulder, CO

Work

Position: Craftsman/Blue Collar

Education

Degree: High school graduate or higher

Resumes

Resumes

Mark Dehus Photo 1

Über Tech Guru & System Administrator

View page
Position:
Application & Research Manager at University of Colorado at Boulder
Location:
Greater Denver Area
Industry:
Computer Networking
Work:
University of Colorado at Boulder since Jul 2008
Application & Research Manager

University of Colorado at Boulder Aug 2005 - May 2008
Linux System Administrator

Advantage Business Computing, Inc. Jan 2000 - Aug 2005
Networking Technology Coordinator
Education:
University of Colorado Boulder 2005 - 2008
M.S., Computer Science
Florida Gulf Coast University 2002 - 2005
B.S., Computer Science
Interests:
Linux, Unix, System Administration, New Technologies, Distributed Computing, Virtualization, Video Production, Digital Photography, Networking
Mark Dehus Photo 2

Mark Dehus

View page

Publications

Us Patents

System And Method For Utilization Of Threat Data For Network Security

View page
US Patent:
20200329072, Oct 15, 2020
Filed:
Apr 10, 2020
Appl. No.:
16/845799
Inventors:
- Broomfield CO, US
Michael BENJAMIN - Broomfield CO, US
Mark DEHUS - Thornton CO, US
Peter BRECL - Highlands Ranch CO, US
International Classification:
H04L 29/06
G08B 21/18
Abstract:
Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.
Mark D Dehus from Thornton, CO, age ~41 Get Report