IoT and OT security firm Nozomi Networks has introduced that enterprise security chief Barmak Meftah has joined its board of administrators.
Meftah delivers much more than 25 decades of experience in making current market-leading business SaaS and cybersecurity organizations to Nozomi Networks and most lately served as president of AT&T Cybersecurity the place he proven its cybersecurity division and grew profits by double digits.
Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
In addition to his independent board position with Nozomi Networks, Meftah also serves on several other boards of directors, is an advisor and coach to several CEOs and is an independent trader as effectively as a constrained husband or wife to a number of VC funds.
Commenting on the announcement, Nozomi Networks CEO Edgard Capdevielle, claimed: “Barmak’s remarkable track document of achievement in Silicon Valley has obtained him international regard as a pillar in enterprise security. His eager organization instincts and depth of information in security software and SaaS will be a must have as we include cloud-primarily based solutions to our solution portfolio and accelerate marketplace expansion and advancement. We are ecstatic to welcome him to the board.”
Meftah additional: “Nozomi Networks is primary the demand to ensure a protected foreseeable future for critical infrastructure and industrial networks. IT/OT convergence and a escalating reliance on AI-driven processes and IoT devices has established a flaming scorching market place for advanced security remedies that can assist CISOs proficiently span combined networks, bodily units and IoT equipment.
“I glimpse forward to encouraging Nozomi Networks take its small business to the upcoming level.”
Some areas of this short article are sourced from:
www.infosecurity-journal.com