Evolution of The Press

|
Below is a working theory on the evolution of The Press in the United States as it relates to their relationship with the government and the people. I expect to continue refining the theory as new perspectives and competing ideas are discussed.Phase 1) TL/DR; The press’s primary value in the ... Read More

The evolutionary waves of the penetration-testing / vulnerability assessment market

|
Over the last two decades the penetration-testing / vulnerability assessment market went through a series of evolutionary waves that went like this…1st Wave: “You think we have vulnerabilities and want to hire an employee to find them? You’re out of your mind!"The business got over it and InfoSec people were ... Read More

All these vulnerabilities, rarely matter.

|
There is a serious misalignment of interests between Application Security vulnerability assessment vendors and their customers. Vendors are incentivized to report everything they possible can, even issues that rarely matter. On the other hand, customers just want the vulnerability reports that are likely to get them hacked. Every finding beyond ... Read More
My next start-up, Bit Discovery

My next start-up, Bit Discovery

The biggest and most important unsolved problem in Information Security, arguably all of IT, is asset inventory. Rather, the lack of an up-to-date asset inventory that includes all websites, servers, databases, desktops, laptops, data, and so on. Strange as it sounds, the vast majority of organizations with more than even ... Read More
SentinelOne and My New Role

SentinelOne and My New Role

Two years ago, I joined SentinelOne as Chief of Security Strategy to help in the fight against malware and ransomware. I’d been following the evolution of ransomware for several years prior, and like a few others, saw that all the ingredients were in place for this area of cyber-crime to ... Read More