Feeds

Intel exec hired as top VC spook

In-Q-Tel funds another CEO

Eight steps to building an HP BladeSystem

A former Intel executive has been slotted into the revolving door that is CIA-backed In-Q-Tel's CEO post.

The spooky venture capital firm this week announced that Intel VP Chris Darby will become its CEO in late September. Darby will replace interim CEO Scott Yancey and former CEO Amit Yoran.

Yoran only stayed at In-Q-Tel for a few months after having arrived in January from the Department of Homeland Security where he was head of cyber security. The exec apparently departed for personal reasons, saying he didn't like to travel all that much.

Travel, however, is the name of the game when you're a venture capital firm based in Washington D.C. The In-Q-Tel staff try to find start-ups that will boost the US's national security mission or at least help the CIA spy on citizens with some really, really flash gear.

In-Q-Tel also has a Silicon Valley office but refuses to reveal its exact location. Google, however, pegs the office at 2500 Sand Hill Road - Suite 113.

At Intel, Darby headed up the middleware division, which is the first proof we've seen that Intel has a middleware division. More importantly for the snooping at hand, Darby used to run security and XML networking firm Sarvega and internet security consulting outfit @stake.

"As an energetic and experienced entrepreneur with a deep understanding of technology, Chris brings to In-Q-Tel the qualities we were seeking in a leader to build on In-Q-Tel's large and growing base of portfolio companies and our top priority: delivering leading-edge solutions to pressing challenges confronting the CIA and other members of the Intelligence Community," said In-Q-Tel's chairman Lee Ault.

For the curious, In-Q-Tel does in fact derive its name from James Bond's crafty technology helper. ®

Boost IT visibility and business value

More from The Register

next story
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.