Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

1/17/2013
07:36 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Former PwC Consulting CEO Takes Reins At Anti-malware Startup TaaSERA

C. Scott Hartz has joined as CEO

CUPERTINO, CA – January 15, 2013 – TaaSERA, Inc., a security startup focused on advanced behavioral malware detection, today announced that C. Scott Hartz, former Chief Executive Officer of PricewaterhouseCoopers Consulting, has joined as its new CEO, effective November 2012. Similar to his previous executive leadership positions, Hartz will accelerate TaaSERA's business development and increase customer adoption among Fortune 500 enterprise companies. Hartz, who is a founding shareholder in TaaSERA, will also remain on the company's Board of Directors.

In addition to building the business and working to finalize the company's current fundraising round, Hartz will lead efforts to attract additional members for TaaSERA's Advisory Board. This includes the recent appointment of The Honorable Tom Ridge as the Chairman of the company's Advisory Board. Hartz will also play a role in the product development plans for the company, including the TAAS NetAnalyzerTM launch later this month.

TaaSERA was established in February 2012 through the acquisition of cloud and endpoint security provider Taasware, Inc. and licensed R&D technology for network malware detection from SRI International, formerly the Stanford Research Institute. TaaSERA was awarded its first foundational patent in December 2012. To date, the company has made six additional non-provisional patent filings. TaaSERA's six patents contain a total of 156 claims.

"TaaSERA brings a very innovative approach to the market to solve the evolving malware problem that businesses and government agencies are grappling with," said Hartz. "TaaSERA's approach of continuously monitoring real time network and endpoint environments for malicious behaviors, instead of monitoring for malicious code, is transformational for this industry and will better equip organizations to protect against advanced cyber threats. Because our technology identifies known malware behaviors, we can ultimately stop cyber criminals from attacking your enterprise, no matter which attack vector they take."

Hartz brings more than 40 years of strategy and technology consulting experience to TaaSERA and is widely recognized as a pioneer in leading transformational business solutions for Fortune 500 global enterprises. Hartz began his career in management consulting at Price Waterhouse and PricewaterhouseCoopers, eventually leading an organization that served more than 50% of the Fortune 500 enterprises on a worldwide basis. From 1995 to 2002, Hartz served as CEO of PwC Consulting and led the company's growth from under $500 million to more than $6 billion. Under his management, PwC Consulting gained a global leadership position serving multi-national companies in corporate transformation, e-business and e-markets, supply chain services, CRM, and enterprise resource planning. Since 2002, Hartz has served as CEO of The Hartz Group, an IT and technology consulting firm.

"Scott is one of the most successful businessmen I have met and brings over four decades of strategy and information technology experience to TaaSERA," said Kurt F. Buseck, Chairman and Chief Financial Officer at TaaSERA. "His proven leadership will be beneficial as we launch our products that serve major vertical markets including financial services, government, healthcare, retail, and critical infrastructure."

About TaaSERA

TaaSERA's malware behavior detection solutions have been built upon core technology used by a number of leading government agencies that identify previously unseen attacks as they happen. Unlike technologies that review signatures or other historical data, or assess potential vulnerabilities and analyze the impact of malware programs in non-production environments, TaaSERA's software solutions leverage patented behavior detection capabilities to highlight the emergence of previously unseen attacks as they are being carried out -- providing organizations with the specific information necessary to adjust defenses and mitigate vulnerabilities targeted by today's sophisticated threats.

Available in Q1 2013, TaaSERA products will provide an embedded source of strategic intelligence within a broad range of third party solutions and services. The TaaSERA Attack Warning and Response Engine (AWARE) improves the effectiveness of nearly every element in today's layered IT security defenses to boost protection of underlying business systems and information, and to prevent costly data breach incidents.

For more information, please visit us at www.taasera.com or follow us on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22677
PUBLISHED: 2021-05-07
An integer overflow exists in the APIs of the host MCU while trying to connect to a WIFI network may lead to issues such as a denial-of-service condition or code execution on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4....
CVE-2021-29495
PUBLISHED: 2021-05-07
Nim is a statically typed compiled systems programming language. In Nim standard library before 1.4.2, httpClient SSL/TLS certificate verification was disabled by default. Users can upgrade to version 1.4.2 to receive a patch or, as a workaround, set "verifyMode = CVerifyPeer" as documente...
CVE-2020-4901
PUBLISHED: 2021-05-07
IBM Robotic Process Automation with Automation Anywhere 11.0 could allow an attacker on the network to obtain sensitive information or cause a denial of service through username enumeration. IBM X-Force ID: 190992.
CVE-2021-21419
PUBLISHED: 2021-05-07
Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reas...
CVE-2021-27437
PUBLISHED: 2021-05-07
The affected product allows attackers to obtain sensitive information from the WISE-PaaS dashboard. The system contains a hard-coded administrator username and password that can be used to query Grafana APIs. Authentication is not required for exploitation on the WISE-PaaS/RMM (versions prior to 9.0...