Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/17/2014
01:33 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lookout Appoints New CEO Jim Dolce

Founder John Hering will become executive chairman and have a day-to-day role at Lookout

San Francisco CA – Lookout, the leader in mobile security, today announced that it appointed Jim Dolce as the CEO of Lookout. John Hering, Founder, will assume the role of Executive Chairman and have an active, day-to-day role at Lookout.

"I'm proud to welcome Jim to the Lookout team. Jim's complementary set of skills and experiences will take Lookout to the next level. He's been a long time leader in the enterprise and carrier worlds, and with the future of enterprise software being so tightly linked to mobile, Jim is well positioned to take Lookout into its next stage of growth," said John Hering, Executive Chairman and Founder of Lookout.

With over fifty million people worldwide using Lookout to protect their devices and key partnerships with some of the largest mobile operators in the world, these appointments build upon Lookout's market leadership. By adding Jim to the management team, a seasoned industry veteran who brings a strong track record for leading high-growth enterprise organizations, Lookout solidifies its position as the leader in the mobile security market. John will be assuming the role of Executive Chairman and work day-to-day on key strategic issues, with a particular focus on Lookout's market strategy, product, partnerships, and leadership in the security community.

"I'm extremely excited to join Lookout, a company at the forefront of transforming the security industry. With millions of users and partnerships with some of the largest mobile operators in the world, Lookout is well positioned to tackle the world's biggest security problems as we move into the post-PC era," said Jim Dolce, CEO of Lookout. "Lookout is at the convergence of four key trends: security, mobile, big data and cloud. It's rare to find a company touching on four of the most important technology trends of our time."

Jim is a four-time founder with both private and public company experience, as well as a former executive of Akamai Technologies and Juniper Networks. He has led teams from three to 3,000 and has repeatedly scaled companies successfully. He built Unisphere, which was sold to Juniper Networks, and played a key role in scaling Juniper to a multi billion-dollar revenue run rate from 2002-2006. Most recently, Jim was a senior executive at Akamai, bringing cloud services to mobile network operators. Jim currently serves on the boards of privately held Benu Networks (www.benunets.com) and RGB Networks (www.rgbnetworks.com), and is a Trustee of several nonprofit organizations. Jim has a Bachelors of Science in Computer Engineering from University of Rhode Island.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2002-0390
PUBLISHED: 2019-07-21
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0639. Reason: This candidate is a reservation duplicate of CVE-2002-0639. Notes: All CVE users should reference CVE-2002-0639 instead of this candidate. All references and descriptions in this candidate have been removed to prevent ...
CVE-2018-17210
PUBLISHED: 2019-07-20
An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. The core components that create and launch a print job do not perform complete verification of the session cookie that is supplied to them. As a result, an attacker with guest/pseudo-guest level permissions can bypass t...
CVE-2019-12934
PUBLISHED: 2019-07-20
An issue was discovered in the wp-code-highlightjs plugin through 0.6.2 for WordPress. wp-admin/options-general.php?page=wp-code-highlight-js allows CSRF, as demonstrated by an XSS payload in the hljs_additional_css parameter.
CVE-2019-9229
PUBLISHED: 2019-07-20
An issue was discovered on AudioCodes Mediant 500L-MSBR, 500-MBSR, M800B-MSBR and 800C-MSBR devices with firmware versions F7.20A to F7.20A.251. An internal interface exposed to the link-local address 169.254.254.253 allows attackers in the local network to access multiple quagga VTYs. Attackers can...
CVE-2019-12815
PUBLISHED: 2019-07-19
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.