PinnedThe Top 6 Mistakes Killing Your SaaS CompanyFounders & entrepreneurs are passionate, driven and thrive on the possibility of building something great. Most entrepreneurs I meet — especially at earlier-stage companies — happily trade family time and vacations for seemingly nonstop work, and a chance at meaningful success. Intense efforts to build a category-creating, market-leading product may…CEO8 min readCEO8 min read
PinnedMember-onlyWhy Your Marketing Plan SucksIf you are bullish on your company’s growth this year, you need to carefully assess your overall go-to-market strategy. Are you still reliant on traditional marketing approaches for lead generation and sales? If so, your strategy is dated and growth will likely be an uphill slog with low conversion and…Product Led Growth9 min readProduct Led Growth9 min read
Apr 17Insights into the Team Cymru State of Attack Surface Management Survey8 Reasons to reassess your ASM strategy In our recent survey: The State of Attack Surface Management , we surveyed 440 security practitioners in the US and Europe who work on their company’s security team. …Attack Surface Management7 min readAttack Surface Management7 min read
Apr 5Threat Intelligence: A CISO ROI Guide — Prevent Data BreachesThreat Reconnaissance that Saves Your Butt and the Budget Threat hunting and reconnaissance often seem like another hard-to-explain cybersecurity budget item, especially when talking to business counterparts. As a CISO, you know that having an elite team of threat hunters focused on your external attack surface saves the company from a compromise or attack. External threat hunters have the…Data Breach5 min readData Breach5 min read
Apr 5Attack Surface Management: Why Maturity Models MatterThe challenges of asset discovery, the unknown, and ad-hoc vulnerability scans Attack surface management gets adopted because security leaders have the mandate to know their attack surface, measure and manage digital risks, and improve defense against persistent threat actors. …Cybersecurity7 min readCybersecurity7 min read
Nov 28, 2022Member-onlyThe Average SIEM Deployment Costs $18M Annually…Clearly, Its time for a change!A decade ago, log management was commonly used to capture and retain events for compliance and security use cases. As adversaries and their TTP’s grew more sophisticated, simple logging evolved into security information and event management (SIEM) and the power of rule-driven correlation made it possible to turn raw event…Soc7 min readSoc7 min read
Oct 25, 2022A CEO’s Playbook To Supercharge Your Next OffsiteNow that the risks of Covid-19 are largely manageable, it’s a great opportunity to bring your team back together for the ever-critical team offsite. For the past several years, this essential activity has been largely relegated to less effective, Zoom-based events. …Offsite8 min readOffsite8 min read
Jul 10, 2021Member-only5 Reasons You Should Rethink Your SIEM StrategyThe Future of Security Operations and Analytics could include a data lake..and a Snowflake… Defining SIEM Technology The term SIEM was coined in 2005 by Mark Nicolett and Amrit Williams, in Gartner’s SIEM report, ‘Improve IT Security with Vulnerability Management. SIEM technology supports threat detection, compliance, and security incident management through the collection…Ciso15 min readCiso15 min read
May 16, 2021Member-onlyAre Industry Analysts Important To Your Go-To-Market?Throughout my career as a CEO and earlier, when I was in Product Management, and Mergers & Acquisitions (M&A), I managed to gain significant value and also greatly amplify our company success by working closely with industry analysts. …Go To Market9 min readGo To Market9 min read
Published inTowards Data Science·Nov 12, 2020Member-onlyThe Demise of the SIEM Fuels The Rise of Security Data LakeA decade ago, log management was commonly used to capture and retain events for compliance and security use cases. As adversaries and their TTP’s grew more sophisticated, simple logging evolved into security information and event management (SIEM) and the power of rule-driven correlation made it possible to turn raw event…Data Science7 min readData Science7 min read