Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/27/2019
11:15 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cygilant Appoints Top Technology Executive Rob Scott as CEO

BOSTON-- March 26, 2019 — Cygilant, leading provider of Cybersecurity-as-a-Service to mid-sized organizations, today announced that it has appointed Rob Scott as president and CEO. Scott, a proven leader of successful technology organizations, will lead the company through its next phase of rapid growth, providing mid-sized organizations with innovative cybersecurity services that detect and remediate today’s most advanced threats. 

According to Ostermann Research, mid-market companies suffer greater losses when hit with a cyberattack than smaller or larger firms . These organizations face a similar, high rate of attacks like larger organizations, but do not have the IT and security resources or infrastructure to mitigate attacks. This is a leading reason why market experts indicate the global cybersecurity as a service market is expected to reach $87 Billion by 20252.

For organizations with limited security budgets, Cygilant provides the industry’s most cost-effective method for filling in cybersecurity and compliance gaps. Customers are assigned their own Cybersecurity Advisor who provides cybersecurity best practices and two main services:

“Cybersecurity and compliance represent a significant challenge for small and medium size companies. They simply don’t have the budget or resources to buy lots of technology and hire teams of security professionals to ensure they’re secure and compliant,” said Scott, CEO and president, Cygilant. “Cygliant’s unique approach has proven to dramatically reduce a customer’s security vulnerabilities. Our Cybersecurity Analysts and SOC become an extension of a customer’s IT team. We work around the clock for our customers, hunting for threats and investigating incidents. I’m excited to join the company as it prepares for its next phase of tremendous growth.”

[1] Aug. 2018, “White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of Cybercrime

[2] Feb. 2018:  Transparency Market Research

Scott has more than 30 years of experience in building high-value organizations and was recognized by Ernst & Young as its “Entrepreneur of the Year” in 2002. Most recently, Scott was president and CEO of Bradford Networks, leading the company through its acquisition by Fortinet in June 2018. Previously, he served as CEO of Clique Intelligence (an HPE and DreamWorks funded company) and was CEO of Colubris Networks, guiding the company through its acquisition by Hewlett-Packard. Scott was also VP and worldwide general manager for Hewlett Packard's energy and sustainability business unit, with full responsibility for the growth of the unit. He has served on the board of directors for numerous technology and financial services companies, including Avidbank, Hexadite (acquired by Microsoft), Hotshot Mobile and Trilio Data. 

Scott started his career as a Formula 1 test car driver for the European Sports Car Le Mans, which inspired his passion for building high potential companies at a rapid pace. He also donates his time to service missions that help some of the neediest areas of the country.

About Cygilant
Cygilant Inc. delivers Cybersecurity-as-a-Service to mid-sized organizations that have limited IT resources, yet require 24x7x365 protection. Through its SOC and dedicated Cybersecurity Advisors that extend a customer’s IT team, Cygilant provides affordable cloud-based security monitoring that hunts for threats, responds to incidents, patches systems and supplies audit artifacts for compliance mandates. For more information, please visit www.cygilant.com, read the company blog and follow on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13640
PUBLISHED: 2019-07-17
In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
CVE-2019-5222
PUBLISHED: 2019-07-17
There is an information disclosure vulnerability on Secure Input of certain Huawei smartphones in Versions earlier than Tony-AL00B 9.1.0.216(C00E214R2P1). The Secure Input does not properly limit certain system privilege. An attacker tricks the user to install a malicious application and successful ...
CVE-2019-1919
PUBLISHED: 2019-07-17
A vulnerability in the Cisco FindIT Network Management Software virtual machine (VM) images could allow an unauthenticated, local attacker who has access to the VM console to log in to the device with a static account that has root privileges. The vulnerability is due to the presence of an account w...
CVE-2019-1920
PUBLISHED: 2019-07-17
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling conditi...
CVE-2019-1923
PUBLISHED: 2019-07-17
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by access...