Tag Archive for: ceo

SentinelOne, Inc. (S) CEO Tomer Weingarten on 24th Annual Needham Growth Conference (Transcript)


SentinelOne, Inc. (NYSE:S) 24th Annual Needham Growth Conference January 11, 2022 1:15 PM ET

Company Participants

Doug Clark – Head, Investor Relations

Tomer Weingarten – Chief Executive Officer

Dave Bernhardt – Chief Financial Officer

Conference Call Participants

Alex Henderson – Needham & Company.

Alex Henderson

Hi, my name is Alex Henderson. I’m the Needham, security and networking analyst. It’s a distinct pleasure to have SentinelOne at our conference this year. We have a couple of guys from the company to talk in a fireside chat. Before we jump into it, let me remind you that you have a question-and-answer dialog box. And if you have a question that you want to ask, please do not hesitate. The more interactive it is with the audience, the better. And, I’ll pass that along to management, as I see him come in. So welcome, guys.

Tomer Weingarten

Thanks Alex.

Question-and-Answer Session

Alex Henderson

So, you guys had an announcement this morning, right?

Tomer Weingarten

Yes.

Alex Henderson

And you want to tell us what it was?

Tomer Weingarten

Yes. We’re partnering more deeply with ServiceNow. To us, we’ve released quite a few modules in our platform that speak more and more to endpoint management. And really allowing folks to use our platform is a complete fleet control mechanism, something that allows them more capabilities, even beyond just classic security and protection. And ServiceNow, again, one of the biggest, I guess, IT management firms out there today, now, everybody that’s using them can natively integrate into the SentinelOne platform and use that for quick management, remediation, threat, credit alerts and resolution, so and all again, just a great extension to the platform.

Alex Henderson

What are the most interesting hacks that are vulnerabilities that’s happened in a long time? There’s another news item that’s out there, which is the log4J stuff. How have you guys been able to respond to that vulnerability and potential risk to keep to your customers? Have you been able to control it?

Tomer Weingarten

Yes, to the extent that vendor like us can I mean, log4J exists in different stacks than the one that we are typically in charge of. We are more around machine…

Source…

2022 Cybersecurity Predictions Saket Modi, CEO and Co-Founde…


(MENAFN– Mid-East.Info)

  • The First Phygital Catastrophe is Coming: A central mission-critical application will go down and create a ripple impact across businesses and for consumers around the world. For example, a hack on a major central system like an internet gateway, public cloud provider or a healthcare system like Epic will impact millions of people and we will see the physical ramifications in our everyday lives. Healthcare could be upended, businesses unable to provide digital services, flights cancelled, food and supplies not delivered and more.
  • The Consumerization of Cyberattacks Will Rise for Easier Wins: The attack perimeter is becoming more personal, and the consumerization of attacks will rapidly increase. For example, the last iOS update alone had 11 zero-day attacks. Hackers will amplify attacks on mobile apps and people. This issue will proliferate because as zero-day attacks are rising, consumer cyber awareness and the steps people need to take to protect themselves have not increased in tandem.
  • Cybersecurity and Data Science Fields Will Unite: Cybersecurity and data science have been disconnected fields that served two distinct purposes, but they will come together to help organizations better understand and proactively protect against increasing threats. The fields will collide and continue to grow together out of necessity, as application creation and enterprise data continue to explode and dramatically expand the attack surface.
  • Cyber Insurance Will be Mandated: In the next 12 months, the quantum of cyber insurance needed to protect against ransomware and other attacks will be mandated, at least in some geographic regions and industries. In a similar manner to requiring everyone to have auto liability insurance, high at-risk industries will be mandated to have a minimum level of cyber insurance. For example, companies may be required to have insurance to cover at least two percent of their annual turnover. In the next five years, almost all industries and geographic regions will mandate cyber insurance.
  • A Healthcare Cyber Regulator Will be Established: Healthcare continues to be the most targeted and…

Source…

360 CEO Zhou Hongyi: Safety Technologies Developed at Hozon Auto Will Be Extended to the Whole Industry


The 2021 World Intelligent Connected Vehicles Conference was held in Beijing on Saturday, the world’s largest professional exhibition on intelligent networked and new energy vehicles, with many first-class enterprises participating both from within China and from abroad.

Zhou Hongyi, founder and CEO of the internet security company Qihoo 360 Technology, said at the conference that mature safety technologies that developed on Hozon Auto will be extended the whole industry in the future.

On Saturday evening, Zhou wrote on Weibo, saying that “Qihoo 360 Technology is not only a promoter of smart car safety technology, but also a participant. This year, Qihoo 360 Technology invested in Hozon Auto, hoping to recombine our Internet technologies with automobile manufacturers. We hope to develop Hozon Auto as a test field for smart car safety technology, and will extend the mature technology researched at Hozon Auto to other automobile companies in the future. “

In May this year, Qihoo 360 Technology announced its cooperation with Hozon Auto to build their own smart vehicles. In July, Zhou said in an interview, “Smart electric vehicles can be built below 150,000 yuan ($23,196), and cars below this price account for about 70% of the total sales of all models in China. If this market is not fully developed, it means that smart electric vehicles will always be niche products.”

SEE ALSO: Blacklisted Chinese Cybersecurity Company Qihoo360 Criticizes US for “Irresponsible Action”

According to its official website, Qihoo 360 Technology Co., Ltd. was founded in 2005 and is headquartered in Beijing. It is the largest provider of Internet and mobile security products and services in China. The company listed on the New York Stock Exchange in 2011.

Source…

After ransomware attack, company finds 650+ breached credentials from NEW Cooperative CEO, employees


Digital identity management firm FYEO says it has discovered hundreds of instances of breached credentials from employees of NEW Cooperative, the Iowa-based farm service provider hit with a ransomware attack in recent days. 

Tammy Kahn, COO of FYEO, told ZDNet that when researchers searched through the company’s database, they found 653 instances of breached credentials connected to NEW Cooperative.

The password “chicken1” was common among the company’s 120 employees and was used over 10 times.

Kahn added that the firm’s CEO Brent Bunte appeared to have the second highest number of instances of breached credentials while other current executives also had passwords that had been leaked. 

NEW Cooperative did not respond to multiple requests for comment.

“The NewCoop ransomware situation is concerning for a number of reasons, the first being that hackers are still going after critical infrastructure and seeking to disrupt supply chains even when explicitly stating otherwise. Beyond that, it’s indicative of a larger problem: password management,” Kahn said. 

“We saw that the Colonial Pipeline breach was ultimately a result of a bad password, and it’s likely a similar case here. A majority of internet users and the companies they work for are likely sitting ducks for hackers as they have a limited number of stale passwords and believe someone else should take responsibility for cybersecurity.”

FYEO built an active domain intelligence database of over 20 billion leaked credentials and passwords, offering alerts any time email addresses and passwords resulting from third party breaches appear on the darknet. 

By running the newcoop.com domain through the database, they found the 653 instances of credentials that have previously been exposed.

Dozens of studies — and previous ransomware incidents or breaches — have shown that leaked passwords are one of the easiest ways cyberattackers routinely gain access to systems. The problem has gotten so bad that some companies, like Microsoft, are doing away with passwords altogether. 

“Until organizations find ways to empower their employees to…

Source…