Author

 Ketan Shah
Twitter
LinkedIn
RSS
E-Mail

Profile of Ketan Shah

Vice President of Products at Fortanix
Member Since: 6/4/2018
Author
News & Commentary Posts: 1
Comments: 0

Ketan Shah is an entrepreneurial product leader with 20+ years of functional experience that spans product management, business operations, go-to-market, and product development. In his career, at both startups and publicly traded companies, he has launched several new products from inception, growing them into successful businesses.

Before joining Fortanix, where he is Vice President of Products, Ketan was Senior Director of Product Management at Springpath (acquired by Cisco Systems). Prior to that, he was Director of Product Management at Symantec, leading data security and information governance offerings. Ketan holds a bachelor's degree in electrical and computer engineering from Brigham Young University and a master's in business administration (MBA) from UC Berkeley, Haas School of Business.

Articles by Ketan Shah
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13101
PUBLISHED: 2018-08-15
Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.