Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

05:06 AM

Foundstone Engineering Head Joins Rapid7

Rapid7 announced that Foundstone's director of engineering, Christopher Moore, has joined the company as the new vice president of engineering

BOSTON -- Rapid7, provider of the award-winning NeXpose enterprise vulnerability management solution, today announced that Foundstone’s director of engineering, Christopher Moore, has joined the company as the new vice president of engineering. A leading talent in the vulnerability assessment (VA) industry, Mr. Moore will be instrumental in developing Rapid7’s engineering team and creating more innovative techniques and methodologies to further its strong technical lead in the VA market.

As director of engineering at McAfee/Foundstone since 2001, Moore grew the Foundstone risk management development team from startup to a successful sale to McAfee and designed and developed the Foundstone vulnerability assessment product. His career spans 22 years in product development, including 15 years managing highly productive and motivated product groups at several leading technology companies.

“As the traditional VC-backed companies find it tough getting traction in this market and thus alter their focus, Rapid7 will gain an advantage by luring their core vulnerability assessment talent and customers” said Alan Matthews, president of Rapid7 LLC. “Chris is a gifted software architect with proven knowledge and expertise in evolving vulnerability assessment solutions, as well as broad experience building and leading strong, dynamic engineering organizations that drive product enhancements and provide first-class customer support. His contributions will be extremely valuable as we continue to enhance NeXpose to cover more systems and vulnerabilities, and increase our quality assurance and product planning to meet new customer demands.”

Rapid7 LLC

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.
PUBLISHED: 2019-10-17
WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.
PUBLISHED: 2019-10-17
app/system/admin/admin/index.class.php in MetInfo 7.0.0beta allows a CSRF attack to add a user account via a doSaveSetup action to admin/index.php, as demonstrated by an admin/?n=admin&c=index&a=doSaveSetup URI.