Ron Gula

Ron Gula's picture

Frequently sought out by media publications and outlets such as the New York Times, Bloomberg and Forbes, Ron is a leading cybersecurity thinker, innovator, and visionary in the information security industry. Since co-founding Tenable Network Security in 2002, Ron serves as Chief Executive Officer and focuses on product strategy and R&D to keep Tenable at the forefront of network security innovation. Ron pioneered Tenable’s continuous network monitoring platform, SecurityCenter Continuous View™, champions the benefits of continuous monitoring for both commercial and government organizations, and is passionate about promoting enterprise-wide security policy to C-level executives.

Ron began his career as a penetration tester at the National Security Agency. He is the original author of the Dragon IDS and former CTO of Network Security Wizards, which was acquired by Enterasys Networks. While at BBN and GTE Internetworking, Ron helped develop one of the first commercial network honeypots and oversaw security policies for large carrier-class networks. Ron was also the Director of Risk Mitigation for US Internetworking, which was one of the first cloud application hosting companies.

Ron has earned three patents, serves on the Advisory Board for the University of Maryland Cybersecurity Center, and has an unceasing passion for education and scientific research. He has also received numerous awards for both his technological leadership and entrepreneurship.

Cybersecurity is a C-Level Activity

The information security field is a challenging place these days. With new and increasing threats every day, staying ahead of risks can feel like treading water.

Identifying the Weakest Links in Cyber Kill Chains®

In today’s security environment, with highly motivated cyber attackers employing increasingly sophisticated techniques to break through commonly deployed defenses, just one skillful intruder can infiltrate your systems with one carefully crafted attack path to a relat

Bashing Big Data

Big data is everywhere. So is Bash, a command line interface found on most Linux and Unix machines. New Bash bugs are still being uncovered, with new patches coming out regularly. But hackers in the wild continue to look for and find ways to exploit Bash weaknesses.

Threat and Vulnerability Management: The Podcast

In this October 13, 2014 podcast with Down the Security Rabbithole, Tenable CEO Ron Gula is interviewed by cohosts Rafal Los, James Jardine and Michael Santarcangelo on the subject of Threat and Vulnerability Management.

The Weakest Link – Cloud Application Users and Administrators

Privileged users are a fact of life, but they pose an expanding opportunity to adversaries in the new IT landscape. There are two classes of privileged users on your network today: the users of your cloud-based applications such as SalesForce and NetSuite, and your system administrators.