Profile for JohnDeSantis

JohnDeSantis
Member Since: December 7, 2017
Author
Blog Posts: 3
Posts: 1

John De Santis is Chairman & CEO of HyTrust, an IT infrastructure security software company based in Mountain View, CA and backed by VMware, Cisco and Intel Corporation. John is a company builder with experience in the software, networking and information security domains. He has over thirty years of international and US based experience at venture-backed technology start-ups as well as large global public companies in the Telecom and IT fields. 

Prior to HyTrust, he was VP, Cloud Services for VMware. He was Chairman & CEO of TriCipher (acquired by VMware), and prior to that, he was an entrepreneur-in-residence at Trident Capital. John's first CEO role was at Sygate Technologies (acquired by Symantec), where they developed the technical foundation of Symantec's $1B Enterprise Endpoint Protection suite. During the rapid telecom deregulation in Europe in the 1990's, he led the European operations for various software, hardware and telecom networking companies. In the mid-80's, he had co-founded and led to exit a start-up that built the first optical fiber networking capability for IBM mainframes.

He is currently on the board of directors of Stealth Security (detection/mitigation against automated malicious web service attacks), ValiMail (anti-phishing/email authentication), Aetherpal (mobile app/device support software) and noHold (artificial intelligence applied to customer support). He was previously on the boards of NeoHapsis (IT security consulting - acquired by Cisco), Trace Security (GRC software as a service - exit to a management buy out), Arxan Technologies (application security software - private equity exit to TA Associates), Applied Identity (identity management networking software - acquired by Citrix), and Tablus (data leakage protection software - acquired by RSA Security). 

John is a graduate of Fairfield University with an AB in Philosophy (concentration: Mathematics). He completed the Stanford University/AEA Executive Institute program for Management of High Technology Companies.



Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Oh, No, Not Another Security Product
Paul Stokes, Founder & CEO of Prevalent AI,  8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13101
PUBLISHED: 2018-08-15
Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.