Author

 Christy Wyatt
LinkedIn
Twitter
RSS
E-Mail

Profile of Christy Wyatt

CEO, Dtex Systems
Member Since: 5/21/2018
Author
News & Commentary Posts: 1
Comments: 0

Christy Wyatt, CEO, Dtex Systems

Christy Wyatt is chief executive officer of Dtex Systems and serves as a member of the board. Most recently Christy was chairman, CEO and president of Good Technology, the global leader in mobile security across the Global 2000. During her tenure at Good, she led the company through significant transformation and aggressive growth, and Good's subsequent acquisition by Blackberry in 2015. Prior to Good, Christy held leadership positions across both consumer and enterprise at Citigroup, Motorola, Apple, Palm and Sun. In 2015, Christy was named one of Inc. Magazines Top 50 Women Entrepreneurs in America. Also in 2015, Christy was named CEO of the Year by the Information Security Global Excellence Awards. She was named one of the top 100 Women Leaders in STEM in 2012 and named one of Fierce Wireless "Most Influential Women in Wireless" several years in a row.

Christy serves as a member of the board for Centrify, a leader in identity and access management, as well as Abilities United, non-profit organization focused on enriching the lives of individuals and families with developmental disabilities. Originally a software engineer, Christy has lived in Silicon Valley for almost 20 years. She is married and has four children.

Articles by Christy Wyatt
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1715
PUBLISHED: 2018-08-16
IBM Maximo Asset Management 7.6 through 7.6.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 14700...
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.