Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Joe Payne
LinkedIn
RSS
E-Mail

Profile of Joe Payne

President and CEO at Code42
News & Commentary Posts: 2

Joe Payne brings to Code42 more than 20 years of leadership and a proven track record with high-growth software companies. He has a broad experience base in delivering software and software-as-a-service (SaaS) solutions to enterprises across numerous industries. As President and CEO of Code42, he drives the company's strategic direction and oversees all operations.

Prior to Code42, Joe was Chairman and CEO of Eloqua, a SaaS business, where he recruited and led the team that grew Eloqua's revenue from $11M to $125M in just six years. Joe led Eloqua's successful IPO in 2012 and subsequent sale to Oracle for $957M in 2013.

Prior to Eloqua, Joe was President and COO of iDefense, a VeriSign company, where he was responsible for all company operations. Before joining iDefense, he served as President and CEO of e-Security Inc. and President and CEO of eGrail. Joe began his career in brand management, where he worked on the Coca-Cola brand and the Mr. Clean brand at Procter & Gamble.

Joe currently serves on the Board of Directors of Cornerstone OnDemand (NASDAQ: CSOD), TrackMaven, and First Focus Campaign for Children, a non-partisan, not-for-profit advocacy organization.  Joe previously served on the boards of Dealertrack, Plex, Eloqua, e-Security, eGrail, and Ecutel.

Joe received his M.B.A. from the Fuqua School of Business at Duke University, where he was a Fuqua Scholar. He is a Magna Cum Laude graduate of Duke University. When not hard at work, you can find Joe cheering for the US National Soccer Team, his beloved Duke Blue Devils, or the hapless Washington Redskins. Joe is married with four children.

Articles by Joe Payne
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15138
PUBLISHED: 2020-08-07
Prism is vulnerable to Cross-Site Scripting. The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin...
CVE-2020-9490
PUBLISHED: 2020-08-07
Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerab...
CVE-2020-11852
PUBLISHED: 2020-08-07
DKIM key management page vulnerability on Micro Focus Secure Messaging Gateway (SMG). Affecting all SMG Appliance running releases prior to July 2020. The vulnerability could allow a logged in user with rights to generate DKIM key information to inject system commands into the call to the DKIM syste...
CVE-2020-11984
PUBLISHED: 2020-08-07
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CVE-2020-11985
PUBLISHED: 2020-08-07
IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively...