Author

 Christy Wyatt
LinkedIn
Twitter
RSS
E-Mail

Profile of Christy Wyatt

CEO, Dtex Systems
Member Since: 5/21/2018
Author
News & Commentary Posts: 1
Comments: 0

Christy Wyatt, CEO, Dtex Systems

Christy Wyatt is chief executive officer of Dtex Systems and serves as a member of the board. Most recently Christy was chairman, CEO and president of Good Technology, the global leader in mobile security across the Global 2000. During her tenure at Good, she led the company through significant transformation and aggressive growth, and Good's subsequent acquisition by Blackberry in 2015. Prior to Good, Christy held leadership positions across both consumer and enterprise at Citigroup, Motorola, Apple, Palm and Sun. In 2015, Christy was named one of Inc. Magazines Top 50 Women Entrepreneurs in America. Also in 2015, Christy was named CEO of the Year by the Information Security Global Excellence Awards. She was named one of the top 100 Women Leaders in STEM in 2012 and named one of Fierce Wireless "Most Influential Women in Wireless" several years in a row.

Christy serves as a member of the board for Centrify, a leader in identity and access management, as well as Abilities United, non-profit organization focused on enriching the lives of individuals and families with developmental disabilities. Originally a software engineer, Christy has lived in Silicon Valley for almost 20 years. She is married and has four children.

Articles by Christy Wyatt
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Insider Threat Prevention activated!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10091
PUBLISHED: 2019-03-21
AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow XSS.
CVE-2018-10093
PUBLISHED: 2019-03-21
AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution.
CVE-2017-2659
PUBLISHED: 2019-03-21
It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.
CVE-2017-16231
PUBLISHED: 2019-03-21
** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of st...
CVE-2017-16232
PUBLISHED: 2019-03-21
** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue.