Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/26/2018
10:20 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

First Women-Led Cybersecurity Venture Capital Firm Launches

Chenxi Wang, former Forrester VP of research and Twistlock executive, heads up Rain Capital, with the intent to also help build new startups.

While consulting for venture capital firms in Silicon Valley over the past year, security expert Chenxi Wang regularly found herself the only woman at the meetings.

"Very rarely did they have a woman partner sitting at the table," says Wang, the former strategy officer at Twistlock and vice president of research at Forrester. "I felt that was a very strange thing. ... If you go to Google, Facebook ... there are a lot of women engineers. But in VC, it's very hard to find women."

Wang decided to channel her security expertise, as well as her interest in investing in early-stage startups, into creating her own VC firm, Rain Capital, which she launched today. "We are the first cyber investment firm with an all-female partner team," she says, noting that the firm's venture partners include both women and men.

So far Rain Capital has closed the first $10 million of its $20 million goal, with investments in Altitude Networks, a stealth-mode cloud security firm founded by the former CISO of Twitter and lead data scientist of Capital One; Capsule8, which provides security for containerized, virtual, and traditional systems; and ICS security vendor Claroty.

Wang – who is the managing general partner of Rain Capital – has teamed with VC expert Amena Zhang, who serves as operating partner. Zhang brings to Rain Capital her veteran experience as an investor in startups in Asia.

One of the firm's goals is to promote and support women and minority startups, Wang says. "We want to create a space for women and minority entrepreneurs to collaborate," she says. While she traditionally hasn't received many cybersecurity pitches from women, her firm is actively reaching out to them to pave the way for more diverse entrepreneur representationin the industry, Wang adds.

Rain Capital won't operate purely as a VC investment firm. It also plans to help build new startups to solve stubborn or new security problems. "We are hoping to seek out founding teams for interesting [security] problems and make companies with entrepreneurs," Wang explains. "If I see a [security] problem that really needs a different approach and can identify folks who will be really good at doing this, we'll ask them, 'How about [starting] a company?'"

Among the areas in which Rain Capital is interested in investing is security awareness and culture, Wang says, as well as new ways to solve fraud detection and other nagging security problems. Though the firm initially will invest in early-stage cybersecurity firms, it also might join in later-stage funding rounds as well.

Rain Capital's venture partners include Jamie Lewis, founder of the Burton Group and former president of Gartner, and Charisse Castagnoli, who is the general counsel of the new firm. 

Its advisory board includes Renee Guttmann, chief information security/IT executive/board member of Fortune 50 companies and board member at NETSHEILD; Jim Routh, CSO of Aetna and board chair at National Health ISAC; Richard Seiersen, senior vice president and CISO at Lending Club; Scott Howitt, senior vice president and CISO at MGM Resorts International and a board member at the Retail ISAC; Jay Leek, managing director at ClearSky Security and board member at Capsule8, BigID, and Demisto; and Joe Horowitz, managing general partner at Icon Venture and board member at Area 1 Security, National Venture Capital Association, and Thanx.

Related Content:

Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go here for more information on this free event.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NathanDavidson
50%
50%
NathanDavidson,
User Rank: Apprentice
7/2/2018 | 4:41:21 AM
hi
Women are smart about where the industry is going too, I am pretty sure that it's just a matter of time before there are an equal amount of ladies running the show in IT or Telco companies in the future. At the end of the day, as long as the company is able to provide good and reliable services, it's not like people would penalise them for the gender they are. What matters most is that we are able to get a quality product out of these companies right?
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
CVE-2013-2092
PUBLISHED: 2019-11-20
Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
CVE-2013-2093
PUBLISHED: 2019-11-20
Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands.
CVE-2015-3166
PUBLISHED: 2019-11-20
The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as d...