Veracode Expands Senior Management Team

Veracode Inc., provider of an independent, cloud-based application risk management platform, has expanded its senior management team with the appointments of Pam Cyr as the company’s senior vice president of business development and strategic alliances, and Jim Cuff as senior vice president of technology and operations. Cyr and Cuff each bring more than 20 years of experience in the software industry to their new roles and will be responsible for continuing to raise awareness of the business risks associated with insecure software, as well as developing new solutions and go-to-market strategies to help more organizations protect their core software infrastructure.

“Pam and Jim are tremendous additions to the Veracode team as we execute against our strategic vision to provide our customers with a simple and cost-effective means of securing their software infrastructure,” said Maria Cirino, chairperson, Veracode Board of Directors, and managing director, .406 Ventures. “These two new hires immediately bolster an executive leadership team at Veracode who are laser-focused on eliminating organizations’ insecure software risks and extending Veracode’s leadership in cloud-based application security assessments.”

Cyr brings business, corporate, security software and product development expertise to Veracode where she will be responsible for all elements of Veracode’s partnering strategy, ecosystem development, programs and execution. She previously served as vice president of business development for Aveksa. Prior to that, she spent 10 years with RSA, the security division of EMC, after beginning her career at Raytheon Co. where she held various engineering leadership positions in the communications and radar systems divisions.

“Having been involved in building, defining and selling security solutions my entire career, joining Veracode represented an exciting new opportunity for me,” said Cyr. “Veracode provides an advanced solution to one of the greatest security risks in the cyber threat landscape today—insecure software – and is poised for tremendous growth. I’m looking forward to helping bolster the company’s visibility within the channel and further expanding important partnerships to take advantage of new demand, especially in the realm of mobile app security.”

Previously with Iron Mountain, Cuff brings corporate development and engineering experience to Veracode where he will be responsible for engineering, research and development, as well as advancing corporate development activities. At Iron Mountain, Cuff served in various capacities including the role of senior vice president of enterprise architecture. Prior to Iron Mountain, Cuff worked in IT in the financial services industry, including MFS Investment Management and Massachusetts Housing Finance Agency, with responsibility for networks, open systems and desktop computing.

“I am thrilled to join an innovative company like Veracode—especially at this stage when it has only scratched of its growth potential,” said Cuff. “Veracode is unrivaled when it comes to providing reliable, accurate application security verification services, and I look forward to working with this pioneering company to extend its market leadership.”


  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity


New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3