Twitter hires new cyber chief after devastating breach

After a major security breach in July, Twitter has made moves to improve its cyber security

Blue Twitter banner

Twitter’s platform lead Nick Tornow tweeted out the news that the social media company has hired Rinki Sethi to be its new chief information security officer (CISO).

Tornow’s tweet read, “Today, I’m thrilled to welcome @rinkisethi as the new CISO of @twitter. An inspiring and experienced leader, Rinki comes to us via Rubrik, IBM, and Palo Alto Networks. At Twitter, she will lead our growing InfoSec team, protecting our customers and our company to earn trust.”

In mid-July, a 17-year-old Florida boy hacked Twitter and hijacked a number of high-profile accounts, including Barack Obama, Elon Musk and Bill Gates. He then used those accounts to post a Bitcoin scam. The hack exposed some serious issues in Twitter’s security, prompting the company to announce it would ramp up security on high-profile accounts

Mike Convertino, Twitter’s former security chief, left the company in December 2019, and the role has remained vacant since.

As CISO, Sethi will lead the company’s information security policies and practices. As Tornow stated, Sethi has worked with Rubrik, IBM and Palo Alto Networks. She also helps out as an advisor for many startup companies, including Authomize and LevelOps. 

Featured Resources

The definitive guide to warehouse efficiency

Get your free guide to creating efficiencies in the warehouse

Free download

The total economic impact™ of Datto

Cost savings and business benefits of using Datto Integrated Solutions

Download now

Three-step guide to modern customer experience

Support the critical role CX plays in your business

Free download

Ransomware report

The global state of the channel

Download now

Recommended

What is a web filter?
cyber security

What is a web filter?

24 Sep 2021
100 million IoT devices affected by zero-day flaw
Internet of Things (IoT)

100 million IoT devices affected by zero-day flaw

24 Sep 2021
Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
HP Wolf Security: Threat insights report
Whitepaper

HP Wolf Security: Threat insights report

24 Sep 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

17 Sep 2021