Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/11/2019
12:00 PM
Dark Reading
Dark Reading
Products and Releases
100%
0%

Dragos Appoints CrowdStrike Cofounder and CTO Dmitri Alperovitch to Board of Directors

HANOVER, MD, July11, 2019 -- Dragos, Inc.,provider of the industry’s most trusted asset identification, threat detection and response platformand services for industrial systems,today announced that Dmitri Alperovitch, co-founder and CTO of CrowdStrike Inc., the leader in cloud-delivered endpoint protection, has joined the Dragos Board of Directors. With more than two decades of experience in the field of information security in leadership positions at world’s leading cybersecurity companies, Alperovitch brings a wealth of experience on technology and business growth strategy, and will bring added depth and breadth to Dragos’ already impressive body of knowledge.

“Dmitri is a celebrated cybersecurity leader who's long been on the forefront of cyber threat intelligence and protection work as well as business leadership,” said Robert M. Lee, CEO, Dragos. “As co-founder and CTO of CrowdStrike, which had the largest initial public offering of any cybersecurity company in history and is known for its technical  leadership and focus on customer success, he brings a unique perspective and insight to our existing, robust roster of experts from across the private sector and U.S. intelligence community as we continue our commitment to safeguarding civilization.”

“From my initial interactions with Dragos, I was immediately drawn to Rob and the teams’ mission of ‘safeguarding civilization’, a worthy cause if there ever was one,” said Dmitri Alperovitch. “As I have gotten to know their technology and world-class and unmatched industrial control system expertise, I believe they stand the best chance of any company to dominate this important area of cybersecurity market.”

Dmitri Alperovitchis a Senior Fellow at Harvard Kennedy School’s Belfer Center’s Defending Digital Democracy Project, Senior Fellow at the Atlantic Council, and Fellow at George Mason University’s National Security Institute. He currently serves on the Advisory Boards for NATO’s Cooperative Cyber Defence Centre of Excellence (CCDCOE) and RSA Conference.

Among his honors and accomplishments:

  • Fortune Magazine’s “40 Under 40” most influential young people in business in 2017.
  • Politico Magazine’s “Politico 50” influential thinkers, doers and visionaries transforming American politics in 2016.
  • MIT Technology Review’s prestigious “Young Innovators under 35” in 2013.
  • Foreign Policy Magazine named him a Leading Global Thinker for 2013.
  • Recognized in 2013 and 2015 as one of Washingtonian’s Tech Titans.
  • Recipient of the prestigious Federal 100 Award in 2011.

Alperovitch is an inventor of 36 patented technologies. Prior to founding CrowdStrike, he held executive positions at McAfee and Secure Computing. He holds a master's degree in Information Security and a bachelor's degree in Computer Science, both from the Georgia Institute of Technology.

In 2017, Dragos and CrowdStrike® Inc., announced a joint-services, go-to market partnershipthat has enabled both companies to offer comprehensive security services—including assessment and preparedness solutions—as well as incident response capabilities in a streamlined and efficient way to benefit current and future customers.

Read Dmitri Alperovitch’s full bio.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13991
PUBLISHED: 2020-09-24
vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register.
CVE-2020-15160
PUBLISHED: 2020-09-24
PrestaShop from version 1.7.5.0 and before version 1.7.6.8 is vulnerable to a blind SQL Injection attack in the Catalog Product edition page with location parameter. The problem is fixed in 1.7.6.8
CVE-2020-15162
PUBLISHED: 2020-09-24
In PrestaShop from version 1.5.0.0 and before version 1.7.6.8, users are allowed to send compromised files. These attachments allowed people to input malicious JavaScript which triggered an XSS payload. The problem is fixed in version 1.7.6.8.
CVE-2020-15843
PUBLISHED: 2020-09-24
ActFax Version 7.10 Build 0335 (2020-05-25) is susceptible to a privilege escalation vulnerability due to insecure folder permissions on %PROGRAMFILES%\ActiveFax\Client\, %PROGRAMFILES%\ActiveFax\Install\ and %PROGRAMFILES%\ActiveFax\Terminal\. The folder permissions allow "Full Control" t...
CVE-2020-17365
PUBLISHED: 2020-09-24
Improper directory permissions in the Hotspot Shield VPN client software for Windows 10.3.0 and earlier may allow an authorized user to potentially enable escalation of privilege via local access. The vulnerability allows a local user to corrupt system files: a local user can create a specially craf...