Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

12/15/2016
04:45 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Amit Yoran Leaves Dell RSA To Join Tenable As New CEO

Yoran says recent Dell acquisition of RSA parent company EMC did 'not really' impact his decision to leave.

Vulnerability management firm Tenable Network Security announced today that Dell RSA President Amit Yoran will take over as Tenable's new chairman and CEO, effective Jan. 3, 2017. The announcement comes three months after Dell closed on the acquisition of RSA's parent company, EMC. 

Yoran, 46, will succeed Ron Gula, who founded Tenable 14 years ago and resigned from his position as the company's CEO in June. Tenable co-founders Jack Huffard and Renaud Deraison, who have been leading the company during the CEO search, will continue in their roles as president and chief operating officer (COO), and chief technology officer, respectively.

Dell completed its $67 billion acquisition of EMC in September; rumors about the deal first surfaced the previous autumn. Asked if the Dell acquisition had any impact on his decision to leave, Yoran said in a discussion with Dark Reading today, "Not really."

Mergers and acquisitions, says Yoran, are a normal part of business. (He joined RSA in the first place when it acquired NetWitness, a company he co-founded.) Despite his decision to depart, Yoran says, "I firmly believe in the vision [at Dell RSA] and they have an excellent executive team in place to deliver on that vision."

The move to Tenable, he says, is because he's excited about what they do there.

Tenable's core capabilities are in monitoring and improving visibility. One critical aspect of any cybersecurity department, says Yoran, is "what is my level of vulnerability ... Having that mapped out and understood is a foundational capability."

This capability is Tenable's "DNA," he says.

"I think the key to success is knowing who you are and delivering best-of-breed capabilities," says Yoran. Tenable succeeds because it isn't "trying to do 482 things."

Nevertheless, Tenable does plan on growing, expanding into new markets, and releasing new products in the coming months. Yoran explains that this growth, however, will still be aligned with the company's core goal of helping CISOs answer the 'how vulnerable am I' question. As he explains, businesses regularly adopt new technology (IoT, containers, etc.), which exposes them to new vulnerabilities; Tenable will invest in ways to better help customers assess their degree of exposure to those vulnerabilities. 

Tenable raised $230 million late in 2015 to make new investments and completed an acquisition of small San Francisco-based container security firm FlawCheck in October.

Yoran is taking on another role as head business leader of a cybersecurity company - first NetWitness, then RSA, now Tenable - but he is a graduate of the US Military Academy, and was the director of the US Department of Homeland Security's National Cyber Security Division prior to joining NetWitness. Yoran does not seem keen to ever return to the public sector.  

Yoran says, "I appreciate the time I spent [in government]," and appreciates the people who continue to work there, but that he feels he himself can personally can have a better impact on security working in business. "There's more scale, greater agility in the private sector."

As for Tenable specifically, Yoran says the company has "an incredible future ahead of it."

Related Content:

 

 

 

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31769
PUBLISHED: 2021-06-21
MyQ Server in MyQ X Smart before 8.2 allows remote code execution by unprivileged users because administrative session data can be read in the %PROGRAMFILES%\MyQ\PHP\Sessions directory. The "Select server file" feature is only intended for administrators but actually does not require autho...
CVE-2020-20469
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 has a SQL injection vulnerability. The vulnerability stems from the log_edit.php files failing to filter the csa_to_user parameter, remote attackers can exploit the vulnerability to obtain database sensitive information.
CVE-2020-20470
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 has web site physical path leakage vulnerability.
CVE-2020-20471
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 has an unauthorized access vulnerability in default_user_edit.php, remote attackers can exploit this vulnerability to escalate to admin privileges.
CVE-2020-20472
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 has a sensitive information disclosure vulnerability. The if_get_addbook.php file does not have an authentication operation. Remote attackers can obtain username information for all users of the current site.