Cloud

6/26/2018
10:20 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

First Women-Led Cybersecurity Venture Capital Firm Launches

Chenxi Wang, former Forrester VP of research and Twistlock executive, heads up Rain Capital, with the intent to also help build new startups.

While consulting for venture capital firms in Silicon Valley over the past year, security expert Chenxi Wang regularly found herself the only woman at the meetings.

"Very rarely did they have a woman partner sitting at the table," says Wang, the former strategy officer at Twistlock and vice president of research at Forrester. "I felt that was a very strange thing. ... If you go to Google, Facebook ... there are a lot of women engineers. But in VC, it's very hard to find women."

Wang decided to channel her security expertise, as well as her interest in investing in early-stage startups, into creating her own VC firm, Rain Capital, which she launched today. "We are the first cyber investment firm with an all-female partner team," she says, noting that the firm's venture partners include both women and men.

So far Rain Capital has closed the first $10 million of its $20 million goal, with investments in Altitude Networks, a stealth-mode cloud security firm founded by the former CISO of Twitter and lead data scientist of Capital One; Capsule8, which provides security for containerized, virtual, and traditional systems; and ICS security vendor Claroty.

Wang – who is the managing general partner of Rain Capital – has teamed with VC expert Amena Zhang, who serves as operating partner. Zhang brings to Rain Capital her veteran experience as an investor in startups in Asia.

One of the firm's goals is to promote and support women and minority startups, Wang says. "We want to create a space for women and minority entrepreneurs to collaborate," she says. While she traditionally hasn't received many cybersecurity pitches from women, her firm is actively reaching out to them to pave the way for more diverse entrepreneur representationin the industry, Wang adds.

Rain Capital won't operate purely as a VC investment firm. It also plans to help build new startups to solve stubborn or new security problems. "We are hoping to seek out founding teams for interesting [security] problems and make companies with entrepreneurs," Wang explains. "If I see a [security] problem that really needs a different approach and can identify folks who will be really good at doing this, we'll ask them, 'How about [starting] a company?'"

Among the areas in which Rain Capital is interested in investing is security awareness and culture, Wang says, as well as new ways to solve fraud detection and other nagging security problems. Though the firm initially will invest in early-stage cybersecurity firms, it also might join in later-stage funding rounds as well.

Rain Capital's venture partners include Jamie Lewis, founder of the Burton Group and former president of Gartner, and Charisse Castagnoli, who is the general counsel of the new firm. 

Its advisory board includes Renee Guttmann, chief information security/IT executive/board member of Fortune 50 companies and board member at NETSHEILD; Jim Routh, CSO of Aetna and board chair at National Health ISAC; Richard Seiersen, senior vice president and CISO at Lending Club; Scott Howitt, senior vice president and CISO at MGM Resorts International and a board member at the Retail ISAC; Jay Leek, managing director at ClearSky Security and board member at Capsule8, BigID, and Demisto; and Joe Horowitz, managing general partner at Icon Venture and board member at Area 1 Security, National Venture Capital Association, and Thanx.

Related Content:

Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go here for more information on this free event.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NathanDavidson
50%
50%
NathanDavidson,
User Rank: Apprentice
7/2/2018 | 4:41:21 AM
hi
Women are smart about where the industry is going too, I am pretty sure that it's just a matter of time before there are an equal amount of ladies running the show in IT or Telco companies in the future. At the end of the day, as long as the company is able to provide good and reliable services, it's not like people would penalise them for the gender they are. What matters most is that we are able to get a quality product out of these companies right?
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8354
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
CVE-2019-8355
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
CVE-2019-8356
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
CVE-2019-8357
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.
CVE-2013-2516
PUBLISHED: 2019-02-15
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.