Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/3/2021
08:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Anomali Appoints New CEO

REDWOOD CITY, Calif. — March 1, 2021 — Anomali, the leader in intelligence-driven cybersecurity solutions, today announced that its board of directors has appointed industry leader Ahmed Rubaie as the company’s new Chief Executive Officer and as a board member, effective March 1, 2021. He will succeed Hugh Njemanze, who worked closely with the board to help drive this change. Njemanze will remain with the company as its President and as a member of the board of directors.

Njemanze became CEO of Anomali in June of 2014, since then, he has led the company to rise as a leader in the market through the introduction of new cyber threat intelligence and threat detection innovations. Njemanze successfully guided the company through the extraordinary circumstances and challenges of the past year and will now begin the new CEO onboarding process with the company well-positioned to continue to grow and drive value. He will continue to drive the company’s leadership position as an innovator in the cyber-security market.

Rubaie, a highly-respected CEO and industry veteran, has more than three decades of global technology leadership experience. In his prior roles, Rubaie has driven strategic expansion and diversification of businesses across markets, industries and customers, steering delivery of leading and differentiated solutions. Rubaie has overseen the successful execution of growth transformation, including at Ariba (NASDAQ: ARBA) where he helped the company emerge from the 2008 recession to become the second most valuable Software-as-a-Service company by 2012. At Sitecore, a global leader in context marketing management software, Rubaie helped the Company succeed in a rapid growth transformation while getting it ready for the public markets. He has been active in the cybersecurity space, including private investments and board work. Rubaie holds a B.A. in Economics from Albion College and a J.D. from the University of Detroit Mercy Law School. He also serves as an Adjunct Professor at the Santa Clara University Leavey School of Business, where he teaches Contemporary Business Issues.

“Together with Hugh, the board worked to bring in a new CEO to drive the next phase of growth for the company. Ahmed is a proven technology leader with a distinguished track record of innovation, talent development, and a deep knowledge of operational execution. He is very customer centric and quite passionate about our space. He will continue a values-based cultural leadership approach with a focus on growing the Anomali threat intelligence and detection portfolio,” said Anomali board member Dr. Steve Herrod, Managing Director of General Catalyst. “After thoughtful consideration, the board, together with Njemanze, concluded that now is the right time to make this leadership change and draw on Ahmed’s strategic and operational expertise to lead Anomali through this critical period of transformative growth. The board is confident that Ahmed, together with the rest of the leadership team, will ensure execution of Anomali’s strategy to extend its product leadership position and to deliver on new innovations that will make intelligence-driven threat detection an effective part of every organization’s security strategy.”

“I am thrilled to join and lead Anomali forward at this important time for the company, and our industry,” said Rubaie. “Anomali has been at the forefront of threat intelligence, and I look forward to extending this position going forward. I have tremendous admiration for the company’s recent contributions to the global cyber security effort and am particularly excited about our differentiated innovation in the extended detection and response solution space. I believe Anomali has significant potential to continue to reshape the future of threat intelligence and detection and look forward to working with the incredibly talented global team to accelerate innovation and create value for our global customers and partners.”

“The board and I deeply appreciate Hugh Njemanze for his leadership and significant contributions,” continued Anomali independent board member Tom Reilly, former CEO of ArcSight and Cloudera. “Under his leadership, Anomali grew from a single product vendor into a robust threat intelligence platform company. Hugh has been instrumental in energizing the company’s culture to drive better execution of our product roadmap, placing Anomali in a strong strategic and financial position. We thank him for his ongoing guidance as he works with Ahmed and the leadership team to extend our innovative product offerings and market leadership.”

“I am excited to welcome Ahmed to the Anomali team. We are at a scale and period of growth where his operational skills will bring tremendous value to the company,” said Njemanze. “I am excited to focus on my passion of industry direction, product strategy, and engaging with our valuable customers and partners. We will make a great team.”

About Anomali

Anomali is the leader in intelligence-driven cybersecurity. More than 1,500 public and private sector organizations rely on Anomali to see and detect threats more quickly, reduce the risk of security breaches, and improve security operations productivity. Anomali solutions serve customers around the world in nearly every major industry vertical, including many of the Global 2000. As an early threat intelligence innovator, Anomali was founded in 2013 and is backed by leading venture firms including GV, Paladin Capital Group, In-Q-Tel, Institutional Venture Partners, and General Catalyst. Learn more at www.anomali.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
CVE-2020-24119
PUBLISHED: 2021-05-14
A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect.
CVE-2020-27833
PUBLISHED: 2021-05-14
A Zip Slip vulnerability was found in the oc binary in openshift-clients where an arbitrary file write is achieved by using a specially crafted raw container image (.tar file) which contains symbolic links. The vulnerability is limited to the command `oc image extract`. If a symbolic link is first c...