Skip to main content
Home
Our ContributorsAbout
 
  • App Dev & Testing

    Get up to speed fast on the techniques behind successful enterprise application development, QA testing and software delivery from leading practitioners.

    View all   
    Car engine bay
    Performance tuning?

    Data engines: What's under your hood?

    Long exposure nightime photograph of burning steel wool swung in an infinity pattern
    Close the infinite loop

    How to move beyond shift left, to shift 360

    Ariel photograph of high rise building pushing through clouds
    Lofty intent

    Building secure and compliant cloud-first infrastructure

    View of London with  old, derelict buildings in foreground and tall, modern, shiny skyscraper behind.
    Old to new

    Securing your application modernization process

    Snearing white and brown short coated small dog
    Work together

    How to embrace secure software development practices

  • Enterprise IT

    Trends and best practices for provisioning, deploying, monitoring and managing enterprise IT systems. Understand challenges and best practices for ITOM, hybrid IT, ITSM and more.

    View all   
    Red and white sign displayed at Snowmass, near Aspen, Colorado, warning of potentailly deadly concequences of going further.
    Decision point

    6 data-driven diagnoses for the digital dilemma

    Trendy grandmother with skateboard
    Admiral Hopper probably wouldn’t be shocked

    It’s not your grandmother’s COBOL

    Hand reaching for the clouds
    Reach for the cloud

    5 tips for tackling cloud migration

    White sail boat, tacking into the headwind, on a body of water.
    Keep out of the doldrums

    Tacking into business headwinds with digital transformation

    Male dancer in arieal spin, demonstrating flexibility
    In praise of flexibility

    What extensibility means to business efficiency and innovation

  • Security

    All things security for software engineering, DevOps, and IT Ops teams. Stay out front on application security, information security and data security.

    View all   
    A rolled and banded copy of The New York Times with President Joe Biden on the front page
    Strategies for success

    How to meet US federal guidelines for application security

    Grey storm clouds
    Stormy, with a chance of breach

    Privacy, AI, and automation in the multi-cloud era

    Shop's come in we're open sign on a blue door
    Come in, we're open

    How to close OSS attack vectors in your supply chain

    Akin to policing street art...

    Open-source regulation—good idea?

    Group of students, studying, over coffee with technology
    There's much to learn

    A holistic approach to students' digital safety

  • GUIDES

    TechBeacon Guides are collections of stories on topics relevant to technology practitioners.

    View all   
    The future is security as code. Find...

    TechBeacon Guide: DevSecOps and Security as Code

    It can be challenging to operate and...

    TechBeacon Guide: SecOps Tooling

    Software quality is a top priority,...

    TechBeacon Guide: World Quality Report 2021-22

    Based on responses from over 500...

    TechBeacon Guide: The State of SecOps 2021

    Modern app design and DevSecOps...

    TechBeacon Guide: Application Security Testing

  • CONFERENCES

    Discover and register for the best 2021 tech conferences and webinars for app dev & testing, DevOps, enterprise IT and security.

    View all   
    Managing your IT assets in hybrid,...

    Webinar: Maximizing Your IT Assets

    Do you want the freedom that...

    Webinar: Get a Fast Pass to Full-Stack AIOps

    As organizations migrate to the cloud...

    Webinar: Access Mainframes Securely from the Cloud

    In the wake of the pandemic,...

    Webinar: Best Practices to Protect Data in the Cloud

    Fireside chatAs indicated in the most...

    Webinar: Threat Hunting—Stories from the Trenches

Subscribe
Home
  • Our Contributors
  • About
Subscribe
  • App Dev & Testing
  • Enterprise IT
  • Security
  • Guides
  • Conferences
  • Our Contributors
  • About
Subscribe
Guides
Conferences

About Chenxi Wang

Chenxi Wang
Founder & General Partner
Rain Capital
5 articles

Dr. Chenxi Wang is Founder & General Partner of Rain Capital, which provides capital, strategy, critical resources and unique insights to early-stage cybersecurity companies in Silicon Valley. She is also the co-founder of the Jane Bond Project, a cybersecurity strategy consulting firm. A well known strategist, speaker, and writer in the cybersecurity industry, Dr. Wang also serves as investment advisor to ClearSky security and 630 Cyber, as well as strategic advisory roles to five security startups and IT Security Planet. Previously, Chenxi was Chief Strategy Officer at Twistlock, responsible for building Twistlock’s brand and business from zero to the leader in the container security market. Chenxi was named by SC Magazine as a 2016 Women of Influence, and she is currently the program chair (Security & Privacy) for the 2017 Grace Hopper Conference.

Chenxi built an illustrious career in the cybersecurity industry, including several executive positions at Forrester Research, Intel Security, and CipherCloud. At Forrester, Chenxi covered mobile, cloud, and enterprise security, and wrote many hard hitting research papers. At Intel Security, she led the ubiquity strategy that spans both hardware and software platforms. Chenxi started her career as a faculty member of Computer Engineering at Carnegie Mellon University. Chenxi is a sought after public speaker and has been featured in top media outlets and events worldwide. 

  • Recent
  • Popular
Traditional pen testing has hidden costs. Pen Testing as a Service (PTaaS) is one way to get more from your security spend. Here's why.
Chenxi Wang
Dec 8, 2017
4 hidden costs of pen testing
PTaaS delivers better ROI
Shipping container door locked
How to eliminate container vulnerabilities: Critical steps to more secure enterprise apps
Chenxi Wang
Oct 25, 2016
How to secure containers: Actions every enterprise should take
Risky business

Subscribe to TechBeacon

Get the best of TechBeacon, from App Dev & Testing to Security, delivered weekly.

SUBSCRIBE
While working with developers to bring containers to production, Security Operations (SecOps) are often faced with conflicting requirements:...
Chenxi Wang
Aug 25, 2016
7 best practices for securing enterprise container environments
SecOps cheat sheet
Chenxi Wang notes that the declarative and immutable properties of containers allow powerful security capabilities in runtime.
Chenxi Wang
Jun 21, 2016
How containers enable innovative security approaches
Security at scale
Adobe leveraged DevOps, microservices, and containers to tighten security during the company's digital transformation, moving its software...
Chenxi Wang
May 17, 2016
Adobe's digital transformation: How microservices, containers bolster security
The big shift
Show More

Home

Brought to you by
HP

Topics

  • App Dev & Testing
  • Enterprise IT
  • Security
  • GUIDES
  • CONFERENCES

TechBeacon

  • About
  • Our Contributors
  • Terms of Use
  • Privacy
Cookie Privacy Manager

Subscribe to TechBeacon

Get the latest delivered straight to your inbox.

What topics interest you?

I'd like to receive emails from TechBeacon and Micro Focus to stay up-to-date on products, services, education, research, news, events, and promotions.

Sign up

Thanks for subscribing!

Check your email for the latest from TechBeacon.

© Copyright 2015 – 2022 Micro Focus or one of its affiliates
Back to top