Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog Tagged

There have been several security bloggers "tagging" each other this new year and recently I got tagged. Normally, I try to keep this blog fairly technical and product centric. Since I don't have a personal blog and I don't want to be rude, I'm posting "5 things about Ron Gula" most folks may or may not know here and tagging 5 other folks who have not been tagged yet. We'll follow this post up with a technical one right away.

Five facts on Ron Gula you might not know

1. I originally went into the Air Force to be a pilot, but didn't do that well in flight school, had issues with G forces and eventually went back purely into computers. The experience really helped me focus much later on how important it is to know your audience and give them the right data at the right time. Experiences describing information security issues to the "war fighter" helped me prepare for building security products which were relevant to small and large enterprise customers.

2. I work with my wife, Cyndi Gula, voluntarily. A lot of folks who find this out seem to be quite surprised by this fact. This is the second company we've worked on together, the first being Network Security Wizards which did the Dragon IDS. Cyndi runs the internal operations for Tenable.

3. I'm also the CEO for Tenable Network Security. Most of the time, I use the CTO title, which tends to get more attention and less requirements for wearing a suit or a tie.

4. I like to run almost as much as I enjoy a good cigar. Fortunately for my lungs, I tend to run more than lite up a Macanudo.

5. I still feel very positive about my experience at Enterasys with Dragon. There were many people that benefited (and still do) from working with Dragon. This included a lot of technical, marketing and sales folks who went on to form new companies and new careers in the security space. This also includes a lot of customers who are still running Dragon today. I recently had the chance to do some incident response for a customer who had deployed Tenable products all over the world. In their SOC was also Dragon.

Five blog pings for people I respect

Related Posts

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.