Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Profile for JohnDeSantis

JohnDeSantis
Member Since: December 7, 2017
Author
Blog Posts: 5
Posts: 1

John De Santis is Chairman & CEO of HyTrust, an IT infrastructure security software company based in Mountain View, CA and backed by VMware, Cisco and Intel Corporation. John is a company builder with experience in the software, networking and information security domains. He has over thirty years of international and US based experience at venture-backed technology start-ups as well as large global public companies in the Telecom and IT fields. 

Prior to HyTrust, he was VP, Cloud Services for VMware. He was Chairman & CEO of TriCipher (acquired by VMware), and prior to that, he was an entrepreneur-in-residence at Trident Capital. John's first CEO role was at Sygate Technologies (acquired by Symantec), where they developed the technical foundation of Symantec's $1B Enterprise Endpoint Protection suite. During the rapid telecom deregulation in Europe in the 1990's, he led the European operations for various software, hardware and telecom networking companies. In the mid-80's, he had co-founded and led to exit a start-up that built the first optical fiber networking capability for IBM mainframes.

He is currently on the board of directors of Stealth Security (detection/mitigation against automated malicious web service attacks), ValiMail (anti-phishing/email authentication), Aetherpal (mobile app/device support software) and noHold (artificial intelligence applied to customer support). He was previously on the boards of NeoHapsis (IT security consulting - acquired by Cisco), Trace Security (GRC software as a service - exit to a management buy out), Arxan Technologies (application security software - private equity exit to TA Associates), Applied Identity (identity management networking software - acquired by Citrix), and Tablus (data leakage protection software - acquired by RSA Security). 

John is a graduate of Fairfield University with an AB in Philosophy (concentration: Mathematics). He completed the Stanford University/AEA Executive Institute program for Management of High Technology Companies.



COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10737
PUBLISHED: 2020-05-27
A race condition was found in the mkhomedir tool shipped with the oddjob package in versions before 0.34.5 and 0.34.6 wherein, during the home creation, mkhomedir copies the /etc/skel directory into the newly created home and changes its ownership to the home's user without properly checking the hom...
CVE-2020-13622
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
CVE-2020-13623
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation.
CVE-2020-13616
PUBLISHED: 2020-05-26
The boost ASIO wrapper in net/asio.cpp in Pichi before 1.3.0 lacks TLS hostname verification.
CVE-2020-13614
PUBLISHED: 2020-05-26
An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification.