March 30, 2016
Herndon, VA - March 29, 2016 - Shevirah, Inc., a provider of mobile security testing solutions, today announced the completion of its leadership team by appointing Mark Longworth as Chief Executive Officer (CEO). Longworth joins the team at Shevirah, which includes founder Georgia Weidman, a longtime penetration tester and mobile security expert, and Charles Bobbish, Chief Operating Officer (COO).
“I’m thrilled that we have put together such a strong leadership team at Shevirah as we begin to roll out our mobile security offering to users worldwide,” said Georgia Weidman, founder of the company. “Now that we have a solid technology and business plan in place, I’m very much looking forward to this next chapter of growing and building our mobile security business.”
Shevirah is a graduate of the MACH37 cybersecurity accelerator and participated in the Spring 2015 cohort. Weidman founded Shevirah to commercialize the Smartphone Pentest Framework she invented under a DARPA grant. Shevirah’s software is designed to equip internal and outsourced penetration test teams with the tools to test the new endpoints of corporate networks: smartphones, tablets, wearables, and the Internet of Things. As more of these devices infiltrate the enterprise, the threats they represent will require continuous monitoring in a manner unobtainable through existing vulnerability assessment and penetration testing tools.
In his role as CEO of Shevirah, Longworth will focus on building the company’s go-to-market strategy, increasing the sales pipeline and developing a channel strategy. Longworth met Weidman in June 2015, after joining the MACH37 Cyber Accelerator as a mentor in January 2015 to help a new generation of inventors and aspiring entrepreneurs.
Longworth, entrepreneur and inventor of NetWitness, the market’s first network forensics analysis tool, has spent 25-years in the cybersecurity market. He founded and grew the NetWitness business unit to $4M in revenue prior to its sale, along with parent company CTX Corporation, to ManTech International in 2002. After further growing the business unit to $6M, he left ManTech which subsequently spun out the business into NetWitness Inc., which went on to sell to EMC Corporation in 2011. Longworth spent the next nine years helping grow Tenacity Solutions to $35M in revenue until its sale to CSC in 2014.
A renowned expert on penetration testing, Weidman trained scores of cyber professionals at banner conferences such as BlackHat, Hack in the Box, and local ShmooCon. She is the author of Penetration Testing: A Hands-on Introduction to Hacking which reached number one on Amazon’s Computer Security category. Weidman is one of Virginia’s growing concentration of cyber security entrepreneurs MACH37 was chartered to attract. Although she had managed her own one-person company for three years, she joined MACH37 to learn the skills to accelerate the growth of her new company.
“MACH37’s true value is in equipping cybersecurity experts like Georgia with business training and pairing them with mentors to ensure they succeed,” said Rick Gordon, MACH37 Managing Partner. “I’m confident this winning leadership team at Shevirah will propel this company toward great success.”
Bobbish and Longworth were early mentors involved in the MACH37 program to help Weidman manage the business dimensions of Shevirah. Bobbish was the founder and CEO of CMX Technologies which he built to $10 million in revenue before the sale to Xator in 2014. Weidman, Bobbish, and Longworth are excited about the potential of Shevirah’s technology as a solution to address the growing risks of mobility. Shevirah is seeking pilot users of its software.
About Shevirah Inc., http://www.shevirah.com
For internal or outsourced penetration test teams, Shevirah offers solutions to extend testing to mobile devices and Internet of Things. With the shift of corporate endpoints from traditional desktops and laptops to smartphones, tablets, and wearables, penetration test teams need new tools to assess the vulnerabilities and security postures of these new threats to the enterprise. Unlike Enterprise Mobility Management solutions which focus on provisioning over security, or on-device mobile security software, Shevirah can test the entire mobility system given just a phone number: the user, device, and infrastructure. Shevirah is actively seeking pilot users for its mobility penetration testing software solutions.
About MACH37™, http://www.mach37.com
MACH37™ is the premier accelerator for information security entrepreneurs and startups. We go beyond the traditional model of typical business accelerators by bringing our innovators focused mentorship and support from our extensive network of visionaries, practitioners, and successful entrepreneurs in security. Our Spring and Fall sessions are designed to propel graduating companies into the marketplace, equipped with the skills to grow and compete for funding and market share. MACH37™ was launched in 2013 by the Center for Innovative Technology, in Herndon, Virginia. To learn more, please visit http://www.mach37.com and follow @MACH37cyber on Twitter.
About the Center for Innovative Technology, http://www.cit.org
Since 1985, CIT, a nonprofit corporation, has been Virginia’s primary driver of innovation and entrepreneurship. CIT accelerates the next generation of technology and technology companies through commercialization, capital formation, market development and revenue generation services. To facilitate national innovation leadership and accelerate the rate of technology adoption, CIT creates partnerships between innovative technology startup companies and advanced technology consumers. CIT’s CAGE Code is 1UP71. To learn more, please visit http://www.cit.org. Follow CIT on Twitter @CITorg and add the Center for Innovative Technology on LinkedIn and Facebook.
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Everything You Need to Know About DNS Attacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment