Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Joe Payne
LinkedIn
RSS
E-Mail

Profile of Joe Payne

President and CEO at Code42
News & Commentary Posts: 2

Joe Payne brings to Code42 more than 20 years of leadership and a proven track record with high-growth software companies. He has a broad experience base in delivering software and software-as-a-service (SaaS) solutions to enterprises across numerous industries. As President and CEO of Code42, he drives the company's strategic direction and oversees all operations.

Prior to Code42, Joe was Chairman and CEO of Eloqua, a SaaS business, where he recruited and led the team that grew Eloqua's revenue from $11M to $125M in just six years. Joe led Eloqua's successful IPO in 2012 and subsequent sale to Oracle for $957M in 2013.

Prior to Eloqua, Joe was President and COO of iDefense, a VeriSign company, where he was responsible for all company operations. Before joining iDefense, he served as President and CEO of e-Security Inc. and President and CEO of eGrail. Joe began his career in brand management, where he worked on the Coca-Cola brand and the Mr. Clean brand at Procter & Gamble.

Joe currently serves on the Board of Directors of Cornerstone OnDemand (NASDAQ: CSOD), TrackMaven, and First Focus Campaign for Children, a non-partisan, not-for-profit advocacy organization.  Joe previously served on the boards of Dealertrack, Plex, Eloqua, e-Security, eGrail, and Ecutel.

Joe received his M.B.A. from the Fuqua School of Business at Duke University, where he was a Fuqua Scholar. He is a Magna Cum Laude graduate of Duke University. When not hard at work, you can find Joe cheering for the US National Soccer Team, his beloved Duke Blue Devils, or the hapless Washington Redskins. Joe is married with four children.

Articles by Joe Payne
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Botnet Infects Hundreds of Thousands of Websites
Robert Lemos, Contributing Writer,  10/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8260
PUBLISHED: 2020-10-28
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.
CVE-2020-8261
PUBLISHED: 2020-10-28
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.
CVE-2020-8262
PUBLISHED: 2020-10-28
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure below 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) and Open Redirection for authenticated user web interface.
CVE-2020-8263
PUBLISHED: 2020-10-28
A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) through the CGI file.
CVE-2020-8239
PUBLISHED: 2020-10-28
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.