1950 Mercury Christmas Present

1950 Mercury Christmas Present

|
As a gift, or sometimes more like a curse, my dad passed down his love of classic cars to his children. Each of us has our favorites, and one of mine is a 1950 Mercury. Not just any 1950 Mercury, but a particular highly customized “led sled” hot rod. Chopped, ... Read More
A 1951 Ford for Dad

A 1951 Ford for Dad

|
I wanted to get my dad a gift, but not just any gift. The perfect gift. For a diehard hot-rodder like my dad, there can only be one thing -- a car. Of course, not just any ol' thing with four wheels. He quite literally has 50 mostly junkers and ... Read More

Evolution of The Press

|
Below is a working theory on the evolution of The Press in the United States as it relates to their relationship with the government and the people. I expect to continue refining the theory as new perspectives and competing ideas are discussed.Phase 1) TL/DR; The press’s primary value in the ... Read More

The evolutionary waves of the penetration-testing / vulnerability assessment market

|
Over the last two decades the penetration-testing / vulnerability assessment market went through a series of evolutionary waves that went like this…1st Wave: “You think we have vulnerabilities and want to hire an employee to find them? You’re out of your mind!"The business got over it and InfoSec people were ... Read More

All these vulnerabilities, rarely matter.

|
There is a serious misalignment of interests between Application Security vulnerability assessment vendors and their customers. Vendors are incentivized to report everything they possible can, even issues that rarely matter. On the other hand, customers just want the vulnerability reports that are likely to get them hacked. Every finding beyond ... Read More
My next start-up, Bit Discovery

My next start-up, Bit Discovery

The biggest and most important unsolved problem in Information Security, arguably all of IT, is asset inventory. Rather, the lack of an up-to-date asset inventory that includes all websites, servers, databases, desktops, laptops, data, and so on. Strange as it sounds, the vast majority of organizations with more than even ... Read More
SentinelOne and My New Role

SentinelOne and My New Role

Two years ago, I joined SentinelOne as Chief of Security Strategy to help in the fight against malware and ransomware. I’d been following the evolution of ransomware for several years prior, and like a few others, saw that all the ingredients were in place for this area of cyber-crime to ... Read More
The Ad-Tech Industry Must Finally Admit That Their Product (Ads) is Dangerous

The Ad-Tech Industry Must Finally Admit That Their Product (Ads) is Dangerous

|
How would you react if I told you that computer security experts are six times more likely to run just an ad blocking software on their PCs, over just anti-malware? Would you be surprised? That was the result from a Twitter poll I conducted last year, in which more than ... Read More

InfoSec Start-up Advising and Product Recommendations

|
As a long-time InfoSec veteran and entrepreneur, I’m often asked by company founders to join their advisory board and lend a hand. Sometimes the founders need someone with experience they can trust to bounce ideas off of, provide guidance on how to scale their business, point out the many pitfalls ... Read More

What keeps me in the security industry

|
It’s common for long-time information experts like myself to be asked what keeps us in the security industry. Some say it’s a good stable job that nicely pays the bills. Others find the work interesting and enjoy the constant intellectual challenge. Some the like the people, the community, the culture, ... Read More
Loading...