Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/26/2018
10:20 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

First Women-Led Cybersecurity Venture Capital Firm Launches

Chenxi Wang, former Forrester VP of research and Twistlock executive, heads up Rain Capital, with the intent to also help build new startups.

While consulting for venture capital firms in Silicon Valley over the past year, security expert Chenxi Wang regularly found herself the only woman at the meetings.

"Very rarely did they have a woman partner sitting at the table," says Wang, the former strategy officer at Twistlock and vice president of research at Forrester. "I felt that was a very strange thing. ... If you go to Google, Facebook ... there are a lot of women engineers. But in VC, it's very hard to find women."

Wang decided to channel her security expertise, as well as her interest in investing in early-stage startups, into creating her own VC firm, Rain Capital, which she launched today. "We are the first cyber investment firm with an all-female partner team," she says, noting that the firm's venture partners include both women and men.

So far Rain Capital has closed the first $10 million of its $20 million goal, with investments in Altitude Networks, a stealth-mode cloud security firm founded by the former CISO of Twitter and lead data scientist of Capital One; Capsule8, which provides security for containerized, virtual, and traditional systems; and ICS security vendor Claroty.

Wang – who is the managing general partner of Rain Capital – has teamed with VC expert Amena Zhang, who serves as operating partner. Zhang brings to Rain Capital her veteran experience as an investor in startups in Asia.

One of the firm's goals is to promote and support women and minority startups, Wang says. "We want to create a space for women and minority entrepreneurs to collaborate," she says. While she traditionally hasn't received many cybersecurity pitches from women, her firm is actively reaching out to them to pave the way for more diverse entrepreneur representationin the industry, Wang adds.

Rain Capital won't operate purely as a VC investment firm. It also plans to help build new startups to solve stubborn or new security problems. "We are hoping to seek out founding teams for interesting [security] problems and make companies with entrepreneurs," Wang explains. "If I see a [security] problem that really needs a different approach and can identify folks who will be really good at doing this, we'll ask them, 'How about [starting] a company?'"

Among the areas in which Rain Capital is interested in investing is security awareness and culture, Wang says, as well as new ways to solve fraud detection and other nagging security problems. Though the firm initially will invest in early-stage cybersecurity firms, it also might join in later-stage funding rounds as well.

Rain Capital's venture partners include Jamie Lewis, founder of the Burton Group and former president of Gartner, and Charisse Castagnoli, who is the general counsel of the new firm. 

Its advisory board includes Renee Guttmann, chief information security/IT executive/board member of Fortune 50 companies and board member at NETSHEILD; Jim Routh, CSO of Aetna and board chair at National Health ISAC; Richard Seiersen, senior vice president and CISO at Lending Club; Scott Howitt, senior vice president and CISO at MGM Resorts International and a board member at the Retail ISAC; Jay Leek, managing director at ClearSky Security and board member at Capsule8, BigID, and Demisto; and Joe Horowitz, managing general partner at Icon Venture and board member at Area 1 Security, National Venture Capital Association, and Thanx.

Related Content:

Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go here for more information on this free event.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NathanDavidson
50%
50%
NathanDavidson,
User Rank: Moderator
7/2/2018 | 4:41:21 AM
hi
Women are smart about where the industry is going too, I am pretty sure that it's just a matter of time before there are an equal amount of ladies running the show in IT or Telco companies in the future. At the end of the day, as long as the company is able to provide good and reliable services, it's not like people would penalise them for the gender they are. What matters most is that we are able to get a quality product out of these companies right?
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...