Author

 Galina Antova & Patrick McBride
Twitter
LinkedIn
RSS

Profile of Galina Antova & Patrick McBride

Co-founder & Chief Marketing Officer, Claroty
News & Commentary Posts: 1

Galina Antova, Co-founder & Chief Business Development Officer, Claroty
Galina Antova is the co-founder and chief business development officer at Claroty. Prior to co-founding the company, she was the global head of industrial security services at Siemens, overseeing the development of its portfolio of services that protect industrial customers against cyberattacks. While at Siemens, she was also responsible for leading the Cyber Security Practice and the Cyber Security Operations Center, providing managed security services for industrial control systems operators. Previously, Galina was with IBM in Canada in various roles in the provisioning and cloud solutions business. She holds a BS in computer science from York University in Toronto, and an MBA from IMD in Lausanne, Switzerland.

https://twitter.com/GalinaAntova

https://www.linkedin.com/in/galinaantova

 

Patrick McBride, Chief Marketing Officer, Claroty

Patrick McBride is the chief marketing officer of Claroty. Prior to joining the company, he was the vice president of marketing and communications at iSIGHT Partners (now FireEye). In addition to expanding the sales pipeline to bolster aggressive revenue growth, he was responsible for defining the global threat intelligence market, and was a key advocate for security professionals shifting from attack response to proactive preparation. Before iSIGHT Partners, Patrick led global marketing at Xceedium Inc. Previously, he co-founded and served as the CEO of META Security Group, a security and compliance software company, and was a senior vice president of META Group, where he led the global research team's network security and IT operations practice. Patrick holds a BS in Management and an AS in Computer Programming from Keene State College.

https://twitter.com/pmcbrideva1
https://www.linkedin.com/in/patrickmcbride/

Articles by Galina Antova & Patrick McBride
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3961
PUBLISHED: 2018-05-25
Cross-Site Scripting (XSS) vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows authenticated users to allow arbitrary HTML code to be reflected in the response web page via crafted user input of attributes.
CVE-2018-11468
PUBLISHED: 2018-05-25
The __mkd_trim_line function in mkdio.c in libmarkdown.a in DISCOUNT 2.2.3a allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file, as demonstrated by mkd2html.
CVE-2018-6664
PUBLISHED: 2018-05-25
Application Protections Bypass vulnerability in Microsoft Windows in McAfee Data Loss Prevention (DLP) Endpoint before 10.0.500 and DLP Endpoint before 11.0.400 allows authenticated users to bypass the product block action via a command-line utility.
CVE-2018-6674
PUBLISHED: 2018-05-25
Privilege Escalation vulnerability in Microsoft Windows client in McAfee VirusScan Enterprise (VSE) 8.8 allows local users to view configuration information in plain text format via the GUI or GUI terminal commands.
CVE-2018-1133
PUBLISHED: 2018-05-25
An issue was discovered in Moodle 3.x. A Teacher creating a Calculated question can intentionally cause remote code execution on the server, aka eval injection.