theDocumentId => 1139994 Patricia Titus Joins CyberUnited's Board

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

6/24/2013
07:27 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Patricia Titus Joins CyberUnited's Board

Most recently, she served as vice president and chief information security officer at Symantec

SAN DIEGO, Calif.--June 18, 2013--CyberUnited, a leading insider threat security informatics company, today announced that former Symantec Vice President and CISO Patricia Titus has joined CyberUnited's board of directors. As a board member, Titus will draw on her more than 20 years of security experience, 10 years in high tech management, to help drive forward CyberUnited's innovative neural network technology and position the company for continued significant growth.

Titus has a stellar reputation and extensive experience in the security industry. Most recently, she served as vice president and chief information security officer at Symantec, where she played a strategic role in protecting the company's IT resources, infrastructure and information assets, while driving internal security initiatives. Prior to Symantec, Titus was vice president and global chief information security officer at Unisys Corp. In that role, she was responsible for enhancing the existing network security and policies supporting Unisys worldwide employees, while ensuring the continued protection of sensitive corporate and customer data. Titus also served as chief information security officer at the Transportation Security Administration within the Department of Homeland Security. There, she created, implemented and maintained a robust IT security program. She has also worked overseas in various positions within the U.S. Department of Defense, the U.S. State Department and private-sector firms.

Titus joins CyberUnited's four other distinguished board members: Malcolm Bohm, an industry luminary; Dr. Todd Peterson, vice president of Synthetic Biology R&D at Life Technologies; and Brent Wrisley, CEO of PUNCHCyber.

"I was pleased to accept the invitation to join the board of such an innovative company," said Titus. "There is a nexus coming of predictive analytics, big data and security informatics that CyberUnited has the opportunity to nurture and expand. It represents products and services that could bring about significant change in the way organizations handle threats from within."

"Patricia's addition to our board of directors underscores our huge potential in cybersecurity," said Darin Andersen, CEO of CyberUnited. "For more than two decades, she has been entrenched in the security industry, having been tasked with implementing security programs for some of the world's largest organizations. Patricia's expertise will certainly be an asset to us as we continue to develop innovative technologies to help in the fight against cyber crime."

About CyberUnited

CyberUnited prevents sensitive data loss from your organization by revealing the identity of determined insiders.

CyberUnited's cloud based solution, Pit Viper&trade, reveals insiders engaged in digital fraud, IT sabotage or IP theft. It integrates big data analytics and predictive analysis software to sift through multiple data sets, isolating employee anomalies that could indicate potential malicious activity inside a network.

Pit Viper utilizes CyberUnited's proprietary self-learning neural network known as Bandito&trade to detect, analyze and classify every byte pattern in a network to understand and learn specific threat indicators and precursors in real time.

The platform differs from other cyber threat technologies because it is transparent, adjusts dynamically and provides alerts in real time. It is highly sensitive, accurate and integrates easily with existing security technologies.

Our solution predicts malicious behavior before they occur so that insider threats can be completely neutralized, saving data, money and reputations. For more information go to: www.cyberunited.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...
CVE-2021-3169
PUBLISHED: 2021-07-23
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
CVE-2020-20741
PUBLISHED: 2021-07-23
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if t...
CVE-2021-25808
PUBLISHED: 2021-07-23
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.