Elizabeth Holmes found guilty of fraud and conspiracy in blockbuster Silicon Valley trial

It took more than 50 hours of deliberations over seven days, but yesterday a jury found Theranos founder Elizabeth Holmes guilty on four charges of criminal fraud. Basically, they concluded that Holmes intentionally lied to investors to raise gobs of money for her company, a blood testing startup that promised to revolutionize health care.

Spoiler alert: It didn’t. And according to the jury, Holmes knew that it wouldn’t work out even as she touted the company’s tech capabilities to raise nearly $1 billion from the likes of Rupert Murdoch, the DeVos family, and the Waltons of Walmart fame.

The details: Holmes was convicted of three counts of wire fraud and one count of conspiracy to commit wire fraud. She was found not guilty on four other charges and the jury couldn’t agree on a verdict for three charges. So Holmes went 4/11.

How long will Holmes be behind bars? Each of those guilty counts could carry a sentence of 20 years in prison, but legal experts say she’ll probably serve less time than that, given typical sentences in white-collar fraud cases like hers.

How we got here

When she was 19, Holmes dropped out of Stanford to build a device that could perform hundreds of diagnostic tests more cheaply and more accurately than anything on the market. She was labeled the youngest female self-made billionaire by Forbes and drew comparisons to Steve Jobs.

But things unraveled when WSJ investigations in 2015 and 2016 exposed Theranos’s vaunted technology for not actually working. Then came a slew of lawsuits and an indictment, and in 2018 the company dissolved in a thundercloud of disgrace.

Big picture: To many, Holmes’s story reflects the excesses of a venture capital industry that will plug any charismatic founder with a geyser of cash despite their ideas being untested. But Silicon Valley insiders told Bloomberg that, despite Holmes’s conviction, that faucet won’t be turned off anytime soon. The lure of exponential returns is that powerful.

Hot this week

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

Topics

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

The Hidden Costs of Security Compliance

Compliance frameworks often create security blind spots by prioritizing checkbox exercises over real threat mitigation, leading to breaches despite passing audits.

The Illusion of AI in Cybersecurity

AI security tools often create alert fatigue instead of protection, but focusing on human oversight and measured deployment can turn them into effective assets.

The Overlooked Risk of Shadow IT

Shadow IT poses a greater risk than many external threats by bypassing security controls, and managing it effectively requires understanding employee needs rather than simply blocking unauthorized tools.
spot_img

Related Articles

Popular Categories