Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/28/2020
03:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Intrusion Inc. Appoints Jack Blount as President and Chief Executive Officer

Most recently, Blount founded a strategic consultancy for enterprise, startup, and federal government organizations.

Richardson, Texas – May 27, 2020 – Intrusion Inc. (OTCQB: INTZ), (“Intrusion”) announced today that its Board of Directors has named Jack B. Blount to the position of President and Chief Executive Officer. Mr. Blount was also appointed as a director of the company. Michael L. Paxton, former Interim President and Chief Executive Officer retains the positions of Chairman, Chief Financial Officer, Secretary and Treasurer. 

“We are excited to have Jack join Intrusion. He is an experienced executive with a tremendous amount of experience,” stated Michael L. Paxton, Vice President and CFO of Intrusion.

“I have never been more energized and excited about joining a company than I am now about Intrusion,” stated Jack B. Blount, President and CEO of Intrusion. “The world has suffered $3 trillion in cybercrime losses in 2019, with that loss predicted to reach $6 trillion in 2021. Intrusion has been fighting cybercrime for more than 20 years and as a result has the largest database of historical internet data. By combining that data and expertise with machine learning, we are creating an affordable cybercrime prevention tool that I fully expect will change the landscape of cybersecurity,” concluded Blount.

As recently pointed out in the Cyberspace Solarium Commission report, “Our country is at risk, not only from a catastrophic cyberattack but from millions of daily intrusions disrupting everything from financial transactions to the inner workings of our electoral system. China, Russia, Iran, and North Korea all probe U.S. critical infrastructure with impunity. Criminals leverage globally connected networks to steal assets from individuals, companies, and governments.”

Blount had an extensive career in technology as a visionary in the personal computer, local area networking, ERP, mobile computing, big data, cybersecurity, and AI. Most recently, Blount founded a strategic consultancy for enterprise, startup and federal government organizations. Prior to that, he served as CIO of the United States Department of Agriculture where he was responsible for designing a new, 10-layer cyber security architecture that protected more than 100,000 employees and billions of dollars.

Blount began his career as an engineer at IBM and was then recruited from IBM for the role of SVP of Business Development at Novell in the 1980’s where he helped expand its business from $50M to $2B in just six years. He has served as the CTO, COO, and CEO of eight technology, turnaround companies and has served on twelve technology company Boards of Directors, five of which were public companies, and he held the role of Chairman of five of those companies. Blount has conducted business in more than 40 countries and has been a speaker at many public conferences in China, France, Germany, Norway, Russia, and the United States. He graduated from Southern Methodist University with a degree in Mathematics and did his graduate MBA studies while working at IBM.

Interested investors can access a call later today to discuss Mr. Blount’s appointment at 10:00 A.M., CDT by calling 1-833-360-0880. At the replay prompt, enter conference identification number 4547798. For those unable to participate in the live conference call, a replay will be accessible beginning May 27, 2020 at approximately 3:00 P.M., CDT until June 3, 2020 by calling 1-855-859-2056. In addition, a live and archived audio webcast of the conference call will be available at www.intrusion.com.

About Intrusion Inc. 

Intrusion Inc. is a global provider of entity identification, high speed data mining, cybercrime and advanced persistent threat detection products.  Intrusion’s product families include TraceCop™ for identity discovery and disclosure, and Savant™ for network data mining and advanced persistent threat detection.  Intrusion’s products help protect critical information assets by quickly detecting, protecting, analyzing and reporting attacks or misuse of classified, private and regulated information for government and enterprise networks.  For more information, please visit www.intrusion.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29378
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. It is possible to elevate the privilege of a CLI user (to full administrative access) by using the password [email protected]#y$z%x6x7q8c9z) for the e...
CVE-2020-29379
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. During the process of updating the firmware, the update script starts a telnetd -l /bin/sh process that does not require authentication for TELNET access.
CVE-2020-29380
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. TELNET is offered by default but SSH is not always available. An attacker can intercept passwords sent in cleartext and conduct a man-in-...
CVE-2020-29381
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. Command injection can occur in "upload tftp syslog" and "upload tftp configuration" in the CLI via a crafted filename...
CVE-2020-29382
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. A hardcoded RSA private key (specific to V1600D, V1600G1, and V1600G2) is contained in the firmware images.