CompanyExecutive Team
Larry Hurtado

Larry Hurtado

President & CEO

Hurtado joined Digital Defense in August of 2002.  His significant international business experience and his engagement with multiple cultures has been instrumental in understanding the dynamics surrounding the information security industry and leading the organization’s strategy to help organizations bolster defenses against cyber attacks.

Prior to joining Digital Defense, Hurtado was Co-Founder and President of International Operations for Elastic Networks, Incorporated. During his tenure at Elastic Networks, he held several key leadership positions in support of the company's business growth objectives, three financial events-two private rounds of financing and an initial public offering, and the successful acquisition of the company by Paradyne Corporation in March 2002.

Hurtado introduced EtherLoop-based products to the market in 1999 as the company's VP of Research & Development. EtherLoop is an Ethernet-based digital subscriber line (DSL) technology. Serving as VP of Manufacturing Operations in 2000, he was responsible for ensuring that the company's business growth was effectively supported through the efficient manufacture of EtherLoop-based products.

Prior to Elastic Networks, Hurtado held senior management positions at Nortel Networks. His last assignment was VP of Business Line Management in Nortel Networks’ Access Networks Division. Hurtado’s experience encompasses international assignments in Hong Kong and Tokyo to lead organizations in the establishment or growth of their Asia Pacific businesses.

Hurtado holds a B.S.E.E. degree from the University of Tennessee at Knoxville.

Alert Center

08/04/2015 » CVE-2015-3963
Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before, 6.8.x before 6.8.3, 6.9.x before, and 7.x before 7 ipnet_coreip, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. [READ ME]

Visit DDI Alert Center