Careers & People

11:30 AM
Dark Reading
Dark Reading
Products and Releases

Gigamon Appoints Security Veteran Arthur W. Coviello Jr. to Board of Directors

SANTA CLARA, Calif., April 27, 2017 /PRNewswire/ -- Gigamon Inc. (NYSE: GIMO), the industry leader in traffic visibility solutions, announced today that Arthur (Art) W. Coviello Jr. is joining its board of directors. Art brings over 30 years of security, financial and operational management experience. He is recognized for his many achievements including his two-decade career at RSA. As CEO of RSA and later as an EVP at EMC (which acquired RSA in 2006), he oversaw RSA's growth from $25 million in 1995 to $1 billion in 2014.  

"Art Coviello is one of the most recognized and influential pioneers who defined the cybersecurity industry," said Corey Mulloy, chairman of the Gigamon Board of Directors. "His deep understanding of the market and proven experience will play a critical role in driving the Company's  leadership as pervasive visibility transcends into core security, cloud and virtualized environments."

Coviello currently sits on the board of directors at EnerNOC, Inc., a provider of energy intelligence software and services, and Synchrony Financial. He also serves as a venture partner at Rally Ventures and plays key roles in national and international cybersecurity initiatives.

"Gigamon is on the cusp of transforming the security market as traditional security architectures cannot keep up with the increasing loads of traffic and network performance demands," said Art Coviello. "I'm excited about the company, its leadership team and innovative visibility platform that will become the  foundation of modern security and cloud infrastructures. The opportunity to build and grow Gigamon to its full potential is an adventure not to miss."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Pat Osborne, Principal - Executive Consultant at Outhaul Consulting, LLC, & Cybersecurity Advisor for the Security Innovation Center,  3/12/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.