Hugh Njemanze

Hugh Njemanze is the President of Anomali. Hugh has an illustrious 30-year career in the enterprise software industry. Hugh co-founded ArcSight in May 2000 and served as CTO as well as Executive Vice President of Research and Development. He led product development, information technology deployment, and product research at ArcSight, and expanded these responsibilities to lead all engineering and R&D efforts for HP’s Enterprise Security Products group, the organization that ArcSight became part of post-acquisition. Prior to joining ArcSight, Hugh worked as the CTO at Verity, where he led product development, and before that he was at Apple in software engineering, where he was one of the key architects behind the Data Access Language (DAL). Hugh is a CISSP and holds a B.S. in computer science from Purdue University.

More From This author

2023 Anomali Predictions: New Risks to Put Added Pressure on Enterprise Defenders
2023 Anomali Predictions: New Risks to Put Added Pressure on Enterprise Defenders
Published on:
December 20, 2022
Blog

2023 Anomali Predictions: New Risks to Put Added Pressure on Enterprise Defenders

Read More
Anomali Cybersecurity Insights Report 2022, Your First Step Towards Cyber Resilience
Anomali Cybersecurity Insights Report 2022, Your First Step Towards Cyber Resilience
Published on:
January 20, 2022
Blog

Anomali Cybersecurity Insights Report 2022, Your First Step Towards Cyber Resilience

Read More
An Intelligence-Driven Approach to Extended Detection and Response (XDR)
An Intelligence-Driven Approach to Extended Detection and Response (XDR)
Published on:
March 16, 2021
Blog

An Intelligence-Driven Approach to Extended Detection and Response (XDR)

Read More
Anomali: History in the Making
Anomali: History in the Making
Published on:
October 24, 2019
Blog

Anomali: History in the Making

Read More
Taking the Cyber No-Fly List to the Skies
Taking the Cyber No-Fly List to the Skies
Published on:
February 13, 2018
Blog

Taking the Cyber No-Fly List to the Skies

Read More
How the No-Fly List Approach Can Be Used to Improve Cybersecurity
How the No-Fly List Approach Can Be Used to Improve Cybersecurity
Published on:
February 6, 2018
Blog

How the No-Fly List Approach Can Be Used to Improve Cybersecurity

Read More
Explore More Resources