Cloud

6/26/2018
10:20 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

First Women-Led Cybersecurity Venture Capital Firm Launches

Chenxi Wang, former Forrester VP of research and Twistlock executive, heads up Rain Capital, with the intent to also help build new startups.

While consulting for venture capital firms in Silicon Valley over the past year, security expert Chenxi Wang regularly found herself the only woman at the meetings.

"Very rarely did they have a woman partner sitting at the table," says Wang, the former strategy officer at Twistlock and vice president of research at Forrester. "I felt that was a very strange thing. ... If you go to Google, Facebook ... there are a lot of women engineers. But in VC, it's very hard to find women."

Wang decided to channel her security expertise, as well as her interest in investing in early-stage startups, into creating her own VC firm, Rain Capital, which she launched today. "We are the first cyber investment firm with an all-female partner team," she says, noting that the firm's venture partners include both women and men.

So far Rain Capital has closed the first $10 million of its $20 million goal, with investments in Altitude Networks, a stealth-mode cloud security firm founded by the former CISO of Twitter and lead data scientist of Capital One; Capsule8, which provides security for containerized, virtual, and traditional systems; and ICS security vendor Claroty.

Wang – who is the managing general partner of Rain Capital – has teamed with VC expert Amena Zhang, who serves as operating partner. Zhang brings to Rain Capital her veteran experience as an investor in startups in Asia.

One of the firm's goals is to promote and support women and minority startups, Wang says. "We want to create a space for women and minority entrepreneurs to collaborate," she says. While she traditionally hasn't received many cybersecurity pitches from women, her firm is actively reaching out to them to pave the way for more diverse entrepreneur representationin the industry, Wang adds.

Rain Capital won't operate purely as a VC investment firm. It also plans to help build new startups to solve stubborn or new security problems. "We are hoping to seek out founding teams for interesting [security] problems and make companies with entrepreneurs," Wang explains. "If I see a [security] problem that really needs a different approach and can identify folks who will be really good at doing this, we'll ask them, 'How about [starting] a company?'"

Among the areas in which Rain Capital is interested in investing is security awareness and culture, Wang says, as well as new ways to solve fraud detection and other nagging security problems. Though the firm initially will invest in early-stage cybersecurity firms, it also might join in later-stage funding rounds as well.

Rain Capital's venture partners include Jamie Lewis, founder of the Burton Group and former president of Gartner, and Charisse Castagnoli, who is the general counsel of the new firm. 

Its advisory board includes Renee Guttmann, chief information security/IT executive/board member of Fortune 50 companies and board member at NETSHEILD; Jim Routh, CSO of Aetna and board chair at National Health ISAC; Richard Seiersen, senior vice president and CISO at Lending Club; Scott Howitt, senior vice president and CISO at MGM Resorts International and a board member at the Retail ISAC; Jay Leek, managing director at ClearSky Security and board member at Capsule8, BigID, and Demisto; and Joe Horowitz, managing general partner at Icon Venture and board member at Area 1 Security, National Venture Capital Association, and Thanx.

Related Content:

Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go here for more information on this free event.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NathanDavidson
50%
50%
NathanDavidson,
User Rank: Apprentice
7/2/2018 | 4:41:21 AM
hi
Women are smart about where the industry is going too, I am pretty sure that it's just a matter of time before there are an equal amount of ladies running the show in IT or Telco companies in the future. At the end of the day, as long as the company is able to provide good and reliable services, it's not like people would penalise them for the gender they are. What matters most is that we are able to get a quality product out of these companies right?
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18519
PUBLISHED: 2018-11-19
BestXsoftware Best Free Keylogger 5.2.9 allows local users to gain privileges via a Trojan horse "%PROGRAMFILES%\BFK 5.2.9\syscrb.exe" file because of insecure permissions for the BUILTIN\Users group.
CVE-2018-19355
PUBLISHED: 2018-11-19
modules/orderfiles/ajax/upload.php in the Customer Files Upload addon 2018-08-01 for PrestaShop (1.5 through 1.7) allows remote attackers to execute arbitrary code by uploading a php file via modules/orderfiles/upload.php with auptype equal to product (for upload destinations under modules/productfi...
CVE-2008-7320
PUBLISHED: 2018-11-18
** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.
CVE-2018-19358
PUBLISHED: 2018-11-18
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig...
CVE-2018-19351
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHand...