Desiree Lee
Desiree Lee is the Chief Technology Officer (CTO) for Data at Armis, where she has partnered with Fortune 100 companies across a wide variety of industries, as well as national and state-level governments.
Lee’s expertise spans network security, vulnerability management, and threat intelligence for 14 years at notable tech firms like Broadcom, Guardicore, and Hitachi Data Systems. Her approach to cybersecurity is as much about protecting digital assets as it is about crafting a secure future in which technology empowers society without compromising safety.
Blogs by Desiree Lee
Armis Named a Leader in the 2025 GigaOm Radar for Attack Surface Management for 2nd Consecutive Year
Armis’ placement in the GigaOm Radar as a Leader and Fast Mover reflects strong capabilities for internal attack surface management, third-party risk identification, and dark web monitoring.
Transformative Initiatives for Cyber Asset Intelligence
This blog explores the transformative initiatives that will shape cyber asset intelligence in 2025, offering insights and strategies to fortify your organization against potential cybersecurity threats.
Armis Centrix™ Named a Leader in the 2024 GigaOm Radar for Continuous Vulnerability Management
Learn why Armis achieved the highest overall score in the report’s Key Features Comparison and highest overall placement in the Innovation and Platform Play quadrant.
Introducing Armis Centrix™ for VIPR Pro – Prioritization and Remediation
Learn about how Armis Centrix™, VIPR Pro – Prioritization and Remediation closes the traditional gap between security findings, asset ownership and actionable remediation, offering a holistic and prioritized approach to exposure management.
The Future Roadmap to Vulnerability Management Intelligence
In this blog, we will delve into four key predictions that shed light on the changing dynamics of vulnerability teams.
Armis Enters a New Era of Vulnerability Exposure Management
Armis Centrix™ for Vulnerability Prioritization and Remediation (ViPR) introduces a major shift to go beyond vulnerability scanning and address the full cyber risk management lifecycle.