{"id":28163,"date":"2019-07-31T17:15:00","date_gmt":"2019-07-31T17:15:00","guid":{"rendered":"https:\/\/www.darkreading.com\/cloud\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/d\/d-id\/1335399"},"modified":"2019-07-31T17:15:00","modified_gmt":"2019-07-31T17:15:00","slug":"former-twitter-ciso-launches-startup-to-secure-cloud-collaboration","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/","title":{"rendered":"Former Twitter CISO Launches Startup to Secure Cloud Collaboration"},"content":{"rendered":"<header>\n<\/header>\n<p><span class=\"strong black\">Altitude Networks, led by Michael Coates and Amir Kavousian, aims to prevent accidental and malicious file sharing.<\/span> <\/p>\n<p class>Cloud applications have enabled employees to send data across all corners of the Internet, to any number of third parties. It&#8217;s a growing challenge for security and IT admins to keep track of which corporate data is shared, who is sharing the data, and where they might be sending it.<\/p>\n<p>The problem is evolving as businesses adopt a growing number of cloud products: On average, companies use 27 <a href=\"https:\/\/safenet.gemalto.com\/resources\/data-protection\/2018-cloud-data-security-ponemon-study-infographic\/\" target=\"_blank\" rel=\"noopener noreferrer\">different<\/a> cloud apps and services. Nearly half of IT and security pros <a href=\"https:\/\/www2.gemalto.com\/cloud-security-research\/\" target=\"_blank\" rel=\"noopener noreferrer\">surveyed<\/a> say cloud services make it tougher to protect confidential or sensitive data; 57% don&#8217;t think their organization is careful about sharing sensitive information with third parties in the cloud.<\/p>\n<p>Altitude Networks, a new startup from former Twitter CISO Michael Coates and former Capital One lead data scientist Amir Kavousian, today officially launched with $9 million in Series A funding to address this issue. The round was led by Felicis Ventures with participation from Slack Fund, Accomplice, and a personal investment from former Facebook CSO Alex Stamos.<\/p>\n<p>Coates and Kavousian want to tackle the problem of data security in the cloud and in doing so, protect businesses from unauthorized data access, data theft, and accidental and malicious sharing to unintended recipients. Altitude&#8217;s platform monitors for personally identifiable information, payment data, and other files that may cause potential damage if shared: legal documents, internal financial data, product road maps shared with unauthorized accounts.<\/p>\n<p>&#8220;I needed this as a CISO, I wanted to buy it, it didn&#8217;t exist,&#8221; says Coates, who also previously led security at Mozilla and served as chairman of OWASP. In his role at Twitter, Coates sought to find a platform that would protect data from unauthorized sharing. What he found were several cloud access security broker and data loss prevention tools, many of which promised to alert when files were publicly shared.<\/p>\n<p>&#8220;It&#8217;s far deeper of a problem than is shared publicly,&#8221; he adds. Even when they&#8217;re not made public, sensitive files can still do damage if shared with the wrong people. Coates spoke with CISO peers and learned many want to prevent this risk but hadn&#8217;t found an answer: They have plenty of collaboration apps but no way to know how files move in and out of the company.<\/p>\n<p>&#8220;Cloud collaboration makes it easy for an employee to make a mistake and share documents they shouldn&#8217;t,&#8221; he explains. Someone leaving a company may decide to send files to a personal account; if the account is compromised, the attacker now has strategic data. &#8220;All of these issues are happening regularly inside of companies due to the doubling down of collaboration.&#8221;<\/p>\n<p>Altitude&#8217;s platform integrates into cloud environments to give businesses a view of where sensitive files are so they can remove access and protect them. By understanding the context and provenance of a file, it can determine a &#8220;risk rating&#8221; that dictates whether sharing is dangerous. It categorizes these risks so administrators can filter files that have been leaked outside the company, or specifically look at sensitive files that have leaked outside the company, Coates explains. They can also view files that were downloaded and shared.<\/p>\n<p>Right now, the tool is designed to support software-as-a-service applications G Suite and Box, with plans to expand to Office 365, Slack, and Salesforce, among others.<\/p>\n<p>&#8220;Part of the challenge in tackling the problem is the massive amount of collaboration and sharing that&#8217;s happening,&#8221; says Coates. Some file-sharing actions are egregious; for example, publicly sharing financial earnings. Others might be more of a gray area, such as sharing a strategic road map with a third party. Altitude&#8217;s platform lets security managers question a file and ask an employee whether they meant to perform an action, then lock the file if needed.<\/p>\n<p>&#8220;When you have a security problem, what you need is context,&#8221; he explains, citing his experience in incident response and addressing malicious insiders. Admins don&#8217;t just need to know a file was dangerously shared but whether it was sensitive and who shared it. Coates says Altitude&#8217;s platform has detected when financial reports are shared with personal accounts.<\/p>\n<p>Altitude Networks plans to use its <a href=\"https:\/\/www.prnewswire.com\/news-releases\/altitude-networks-raises-9-million-in-series-a-funding-and-launches-industrys-first-cloud-collaboration-security-platform-300892959.html\" target=\"_blank\" rel=\"noopener noreferrer\">funding<\/a> to drive growth and customer acquisition strategies.<\/p>\n<p><strong>Related Content:<\/strong><\/p>\n<div readability=\"11.944649446494\">\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.blackhat.com\/images\/page-graphics-usa-19\/banners\/399219_BH_US19-Web-Banners_468x80-plain.png\" alt width=\"460\" height=\"70\"><\/p>\n<p><strong><em>&nbsp;<\/em><\/strong><\/p>\n<p><strong><em>Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall.&nbsp;Click for information on the&nbsp;<a href=\"https:\/\/www.blackhat.com\/us-19\/\" target=\"_blank\" rel=\"noopener noreferrer\">conference<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/blackhat.tech.ubm.com\/usa\/2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">to register.<\/a><\/em><\/strong><\/p>\n<\/div>\n<p><span class=\"italic\">Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance &amp; Technology, where she covered financial &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=837\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/d\/d-id\/1335399?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Altitude Networks, led by Michael Coates and Amir Kavousian, aims to prevent accidental and malicious file sharing. Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/d\/d-id\/1335399?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-28163","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Former Twitter CISO Launches Startup to Secure Cloud Collaboration 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Former Twitter CISO Launches Startup to Secure Cloud Collaboration 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-31T17:15:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.blackhat.com\/images\/page-graphics-usa-19\/banners\/399219_BH_US19-Web-Banners_468x80-plain.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Former Twitter CISO Launches Startup to Secure Cloud Collaboration\",\"datePublished\":\"2019-07-31T17:15:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/\"},\"wordCount\":815,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.blackhat.com\\\/images\\\/page-graphics-usa-19\\\/banners\\\/399219_BH_US19-Web-Banners_468x80-plain.png\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/\",\"name\":\"Former Twitter CISO Launches Startup to Secure Cloud Collaboration 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.blackhat.com\\\/images\\\/page-graphics-usa-19\\\/banners\\\/399219_BH_US19-Web-Banners_468x80-plain.png\",\"datePublished\":\"2019-07-31T17:15:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.blackhat.com\\\/images\\\/page-graphics-usa-19\\\/banners\\\/399219_BH_US19-Web-Banners_468x80-plain.png\",\"contentUrl\":\"https:\\\/\\\/www.blackhat.com\\\/images\\\/page-graphics-usa-19\\\/banners\\\/399219_BH_US19-Web-Banners_468x80-plain.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Former Twitter CISO Launches Startup to Secure Cloud Collaboration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Former Twitter CISO Launches Startup to Secure Cloud Collaboration 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/","og_locale":"en_US","og_type":"article","og_title":"Former Twitter CISO Launches Startup to Secure Cloud Collaboration 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-31T17:15:00+00:00","og_image":[{"url":"https:\/\/www.blackhat.com\/images\/page-graphics-usa-19\/banners\/399219_BH_US19-Web-Banners_468x80-plain.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Former Twitter CISO Launches Startup to Secure Cloud Collaboration","datePublished":"2019-07-31T17:15:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/"},"wordCount":815,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.blackhat.com\/images\/page-graphics-usa-19\/banners\/399219_BH_US19-Web-Banners_468x80-plain.png","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/","url":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/","name":"Former Twitter CISO Launches Startup to Secure Cloud Collaboration 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.blackhat.com\/images\/page-graphics-usa-19\/banners\/399219_BH_US19-Web-Banners_468x80-plain.png","datePublished":"2019-07-31T17:15:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/#primaryimage","url":"https:\/\/www.blackhat.com\/images\/page-graphics-usa-19\/banners\/399219_BH_US19-Web-Banners_468x80-plain.png","contentUrl":"https:\/\/www.blackhat.com\/images\/page-graphics-usa-19\/banners\/399219_BH_US19-Web-Banners_468x80-plain.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/former-twitter-ciso-launches-startup-to-secure-cloud-collaboration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Former Twitter CISO Launches Startup to Secure Cloud Collaboration"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28163"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28163\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}