Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Roselle Safran & Utpal Desai
LinkedIn
RSS
E-Mail

Profile of Roselle Safran & Utpal Desai

President of Rosint Labs/Director of Product Management of Bitdefender
Member Since: 12/12/2018
Author
News & Commentary Posts: 6
Comments: 1

Roselle Safran is President of Rosint Labs, a cybersecurity consultancy to security teams, leaders, and startups. She is also the Entrepreneur in Residence at Lytical Ventures, a venture capital firm that invests in cybersecurity startups. Previously, Roselle was CEO and Co-Founder of Uplevel Security, which garnered Fortune 1000 customers and numerous industry accolades under her leadership. Earlier, Roselle managed cybersecurity operations at the Executive Office of the President during the Obama Administration, directing the Security Operations Center that protected and defended the White House's network. Before that, she managed security analysis teams at the Department of Homeland Security's US-CERT and spearheaded the development of two cyber-threat intelligence platforms there. LinkedIn profile.

Utpal "U.J." Desai is a Group Product Manager at Bitdefender. He is responsible for developing the vision and road map of Bitdefender Endpoint Security products. U.J. has over 10 years of experience in the cybersecurity space, specializing in endpoint security. He is passionate about building strong products that address customer needs. Prior to joining Bitdefender, he held product management positions at both Symantec and McAfee. Mr. Desai earned a master's degree in computer science from West Illinois University, and attended executive education courses at University of California Berkeley, Haas School of Business. LinkedIn profile.

Articles by Roselle Safran & Utpal Desai

IT Security Administrators Aren't Invincible

3/11/2019
IT security administrators and their teams are responsible for evaluating an organization's security tools and technologies, but are they armed with the proper tools, considerations, and budget to do so? Fourth in a six-part series.

Post a Comment
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.