Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 4 July, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Searchlight Security appoints Cylance and Blackberry’s Eric Milam to lead its dark web intelligence product strategy

Searchlight Security, a mission-proven dark web intelligence company, appointed Eric Milam as their new Executive Vice President of Product.

by Guru Writer
June 16, 2022
in Cyber Bites, Featured, Press Releases, Uncategorized
Headshot of Eric Milam
Share on FacebookShare on Twitter

Searchlight Security appointed Eric Milam as their new Executive Vice President of Product. Milam is a renowned cybersecurity expert who brings deep expertise in threat intelligence and research, a decisive leadership style, and a creative approach to cyber-security problem-solving and solution design. Milam has worked previously as a VP of Research & Intelligence at Blackberry and, before that, as VP of Research Operations at Cylance. Searchlight Security, a mission-proven dark web intelligence company, is bringing Milam on to address critical gaps in their intelligence and cyber defense strategies as well as to expand their international customer base.

“Eric brings a wealth of experience, credibility, and vision to the Searchlight Security leadership team as we take the next big steps in the company’s expansion,” said Ben Jones, CEO of Searchlight Security. “His role in setting out the strategy for Searchlight’s products will be critical to our success in the market, whether that’s working with law enforcement agencies, enterprises, making technology partnerships or augmenting MSSPs’ current threat intelligence capabilities. It’s going to be a big year for us.”

As the new head Executive Vice President of Searchlight Security’s products Milam will develop tools which are used by world government agencies and businesses to assess the potential risks from the dark web. Searchlight Security specializes in products which allow threat intelligence to be extended into the criminal underground of the dark web. One of these products, DarkIQ, is a software which allows organizations to build customizable threat profiles to identify and take action against potential threats from across the dark web. Searchlight Security also offers Cerberus to law enforcement and organizations for those instances when a deeper search and protection capability is needed. Cerberus is an investigation platform which identifies malicious activity and assists in bringing criminal actors to justice.

Eric Milam, Executive Vice President of Product at Searchlight Security commented on the need for a deep web intelligence company like Searchlight Security: “Deep and dark web monitoring provides vital intelligence that organizations can use to protect their business and law enforcement can use to bring perpetrators to justice. Searchlight already has the most comprehensive dark web intelligence products on the market and I look forward to the next chapter as we build out the functionality further to make this data ever more accessible and actionable for companies.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Poll Shows That More Than 40 Million UK Consumers Have Been Targeted by Digital Fraudsters So Far This Year

Next Post

New cybersecurity bill to require mandatory reporting of ransomware, other attacks

Recent News

TikTok Assures U.S. Lawmakers That They Are Working to Further Safeguard User Data From Chinese Staff

TikTok Assures U.S. Lawmakers That They Are Working to Further Safeguard User Data From Chinese Staff

July 4, 2022
UK Government Acquires Its First Quantum Computer

Threat Actor Group Claims Responsibility for High Profile University Hacks

July 4, 2022
Microsoft Office Building

Microsoft Issue Updated Warning Against Known Cloud Threat Actor Group

July 4, 2022
A Vulnerability Management Program is Nothing Without Identity Risk Protection

A Vulnerability Management Program is Nothing Without Identity Risk Protection

July 1, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information