Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

12:30 PM
Dark Reading
Dark Reading
Products and Releases

WhiteHat Founder Jeremiah Grossman Joins SentinelOne as Chief of Security Strategy

Industry Visionary Brings History of 
Innovation and Leadership to Accelerate Company Growth

PALO ALTO, CA, June 6, 2016SentinelOne, the company that’s transforming endpoint security by delivering real-time protection powered by a Dynamic Behavior Tracking engine coupled with automated mitigation and remediation, today announced that Jeremiah Grossman, founder of WhiteHat Security, has joined the company as its chief of security strategy.

In his new role at SentinelOne, Grossman will collaborate with a seasoned leadership team dedicated to changing the face of endpoint security. His mission will be to possess a deep understanding of the rapidly evolving threat landscape, understand the particular needs of the customer, and shape the design of technological and business defense strategies to help solve their most pressing issues.

Grossman comes to SentinelOne after 15 years of leading WhiteHat Security, the company he founded in 2001 that changed the face of web application security. During his time at WhiteHat, Jeremiah held various executive titles, leading the development of a number of application security products and building one of the industry’s largest professional hacker teams. Prior to founding WhiteHat, he was Chief Information Security Officer at Yahoo!.

“Throughout my career, I’ve looked to solve the most critical security issues that are challenging organizations across the world,” said Jeremiah Grossman, chief of security strategy, SentinelOne. “I’m thrilled to be joining SentinelOne to help them protect customers against today’s threats posed by all forms of malware, especially ransomware, as it has surged in 2016 and become increasingly popular among attackers . The company’s leadership team has done a tremendous job of developing an innovative technology that I look forward to helping build upon.”

“At SentinelOne, our mission is to replace the ‘Old Guard’ of legacy antivirus software and provide organizations with a unique, standalone approach to endpoint security,” said Tomer Weingarten, co-founder and chief executive officer, SentinelOne. “Jeremiah brings decades of deep expertise to the team that will help us strengthen our technology to deliver innovations that truly meet the needs of today’s connected organizations.”

SentinelOne’s Next-Generation Endpoint Protection technology has earned praise from multiple directions for its ability to autonomously detect and mitigate threats without any network access; with industry analyst firm Gartner recently nominating them as a ‘Visionary’ vendor in the latest Endpoint Protection Platform Magic Quadrant. Their technology and vision has already earned them $40 million of VC funding and ringing endorsements from Fortune 500 customers who have replaced their entire installed base of legacy endpoints with SentinelOne solutions.  


About SentinelOne

SentinelOne is shaping the future of endpoint security with an integrated platform that unifies the detection, prevention and remediation of threats initiated by nation states, terrorists, and organised crime. SentinelOne’s unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviors, protecting devices against advanced, targeted threats in real time. SentinelOne was formed by an elite team of cyber security and defense experts from IBM, Intel, Check Point Software Technologies, McAfee, Palo Alto Networks and the Israel Defense Forces. To learn more visit sentinelone.com or follow us at @SentinelSec.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I can't find the back door.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-25
The MediaWiki "Report" extension has a Cross-Site Request Forgery (CSRF) vulnerability. Before fixed version, there was no protection against CSRF checks on Special:Report, so requests to report a revision could be forged. The problem has been fixed in commit f828dc6 by making use of Medi...
PUBLISHED: 2021-01-25
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the ...
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting