Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

HD Moore Leaving Rapid7 to Launch Venture Firm

Rapid7’s HD Moore announced on Wednesday that he is leaving the Boston-based security company and joining a new venture capital firm.

HD Moore leaving Rapid7

Rapid7’s HD Moore announced on Wednesday that he is leaving the Boston-based security company and joining a new venture capital firm.

HD Moore leaving Rapid7

After more than six years of working at Rapid7, first as chief security officer and later as chief research officer, Moore has decided to accept a friend’s proposition to help build a new venture capital firm that focuses on helping early-stage security firms get to market faster. The expert has not named the company he is joining.

“Since the only thing more insane than working at one startup is working with multiple startups at the same time, this seemed like a perfect match and a way to contribute back to the security community,” Moore said in a blog post announcing his departure.

Moore is the creator of the open source penetration testing framework Metasploit, which Rapid7 acquired in 2009. The expert says he will continue to work on Metasploit and will remain active in the community even after he leaves Rapid7 on January 29.

“We have surpassed every goal that I set when I joined [Rapid7] in 2009,” Moore said. “Metasploit is thriving. Our research continues to shine light on exposures both wide and deep. Rapid7 is recognized as a champion of open source development. Rapid7 is a solid brand name in both enterprise security and the security community. We have helped shape vulnerability disclosure and the politics of security research. We scan the internet, legally, and share the data with the world. We help our customers improve their security while continuing to support the security community.”

Related Reading: DerbyCon: HD Moore On Mapping the Wild West Online

Related Reading: Rapid7 Launches Project Sonar to Crowdsource Security Research

Advertisement. Scroll to continue reading.
Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem