Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

7/17/2019
11:43 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Snyk Names New CEO

Snyk names Peter McKay new CEO; Founder Guy Podjarny continues to drive the company's dev-first security vision

London/Boston - July 17, 2019 - Developer-first security company, Snyk, has appointed Board Member and Advisor Peter McKay as Chief Executive Officer effective September 1, 2019. With more than 300,000 users today and a projected 400% revenue growth in 2019, Snyk is investing across the business for the next phase of rapid growth with this change in leadership and an increased focus on driving adoption in enterprise development and security teams.

Snyk’s current CEO and Co-Founder Guy Podjarny will continue as President and Chairman of the Board. In this new role, Podjarny will double-down on guiding the company in its vision to help developers embrace security responsibility and to help businesses easily scale security across their organizations.

“Amidst the recent market successes of devops, security and product-led companies, including several 2019 IPOs, we are strengthening our team to continue to build our momentum,” said Podjarny. “Our founding vision of disrupting the security market by focusing on developers has become a reality. Now, with Peter joining us as CEO, I will dedicate my time and attention to helping Snyk lead the developer-first security transformation that is happening across the industry today.”  

McKay brings a wealth of experience in executive leadership positions to Snyk, where he has been an advisor for several years. Most recently, as co-CEO at Veeam, McKay led the team in doubling revenue to nearly $1B in 2.5 years; and, as SVP and General Manager of Americas at VMware, McKay led all go-to-market functions, managing $4B in annual revenue. In his new role as CEO at Snyk, McKay will bring his hands-on, go-to-market experience; proven leadership in hyper-growth companies; and close relationships with the team, to help accelerate the business and provide expertise and continuity as the company grows. 

“Snyk is meeting a massive need in the market by offering an easy and accessible way for organizations to secure development at scale. This hasn’t been available before, and I look forward to helping accelerate this mission,” said McKay. “From fast developer adoption, to increasing product usage, to a team that has grown 6x in 18 months, Snyk has all of the ingredients to build on and continue this path of explosive growth. I’m thrilled to be a part of it.”

Since raising its Series B last summer, Snyk has experienced significant growth in product adoption and usage, with more than 90% of its customers coming from inbound and product-led opportunities. Snyk’s success has been built on developer adoption and affection for the security tool, which has 300,000 global users and protects more than 320,000 projects on GitHub and other platforms. As an open platform that developers can automate and integrate with, Snyk runs more than 8 million tests each month, across free and paying customers that include Google, Microsoft and New Relic.

“Snyk has created a unique position within the market that is bringing together the efficiency of a product-led business model with the growing demand for software security. These dynamics are essential to its impressive growth and the widespread impact the company is having in the security market,” said Philippe Botteri, Partner, Accel. “Peter is a powerful addition to the Snyk team, where he will leverage his go-to-market experience and reinforce Guy’s vision of changing how organizations reduce risk and empower developers to own security.” 

 

About Snyk

Snyk is a developer-first security company that helps organizations use open source and stay secure.  Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. Snyk’s solution is built on a comprehensive, proprietary vulnerability database, maintained by an expert security research team in Israel and London. With tight integration into existing developer workflows, source control (including GitHub, Bitbucket, GitLab), and CI/CD pipelines, Snyk enables efficient security workflows and reduces mean-time-to-fix. For more information or to get started with Snyk for free today, visit https://snyk.io.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...
CVE-2019-4409
PUBLISHED: 2019-10-18
HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entere...