<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cyber Why: Deep Thoughts]]></title><description><![CDATA[Cybersecurity and general business - thought leadership, deep thoughts, and interesting analysis pieces.]]></description><link>https://www.thecyberwhy.com/s/the-cyber-why-deep-thoughts</link><image><url>https://substackcdn.com/image/fetch/$s_!7SG5!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3351f39-31c6-44dd-a9b6-9113808d9fef_500x500.png</url><title>The Cyber Why: Deep Thoughts</title><link>https://www.thecyberwhy.com/s/the-cyber-why-deep-thoughts</link></image><generator>Substack</generator><lastBuildDate>Wed, 20 May 2026 20:32:03 GMT</lastBuildDate><atom:link href="https://www.thecyberwhy.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Tyler Shields]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thecyberwhy@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thecyberwhy@substack.com]]></itunes:email><itunes:name><![CDATA[Tyler Shields]]></itunes:name></itunes:owner><itunes:author><![CDATA[Tyler Shields]]></itunes:author><googleplay:owner><![CDATA[thecyberwhy@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thecyberwhy@substack.com]]></googleplay:email><googleplay:author><![CDATA[Tyler Shields]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Crowdstrike Update Causes Blue Screen of Death]]></title><description><![CDATA[The Importance of Understanding Your IT Dependencies]]></description><link>https://www.thecyberwhy.com/p/crowdstrike-update-causes-blue-screen</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/crowdstrike-update-causes-blue-screen</guid><dc:creator><![CDATA[Katie Teitler-Santullo]]></dc:creator><pubDate>Fri, 19 Jul 2024 14:43:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!e5lU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>The below is a post written by The Cyber Why author <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Katie Teitler-Santullo&quot;,&quot;id&quot;:97046843,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdfed7-e091-46a7-8607-aac6ce2f7346_250x250.png&quot;,&quot;uuid&quot;:&quot;0d37998b-b485-4015-bae9-00943cdab1d6&quot;}" data-component-name="MentionToDOM"></span> and first posted on the Ox Security blog.</em></p><p>Happy almost weekend, everybody&#8230; or not, if you&#8217;re in IT&#8230; trying to travel&#8230; or get medical attention... or just get your work done and start the weekend off with a bang.</p><p>Many of us have woken up to the news of a massive global outage caused by a Crowdstrike Falcon endpoint sensor update for Windows hosts. From airlines to banking systems, emergency services to media outlets, businesses around the world are dealing with the dreaded Blue Screen of Death (BSOD) to kick their weekend into high gear.</p><p><strong>NOTABLY&#8230; this is not a cyber attack.</strong> As far as we know, malintent is not an issue.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e5lU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e5lU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp 424w, https://substackcdn.com/image/fetch/$s_!e5lU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp 848w, https://substackcdn.com/image/fetch/$s_!e5lU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp 1272w, https://substackcdn.com/image/fetch/$s_!e5lU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e5lU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp" width="458" height="257.2328767123288" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:738,&quot;width&quot;:1314,&quot;resizeWidth&quot;:458,&quot;bytes&quot;:79128,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e5lU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp 424w, https://substackcdn.com/image/fetch/$s_!e5lU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp 848w, https://substackcdn.com/image/fetch/$s_!e5lU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp 1272w, https://substackcdn.com/image/fetch/$s_!e5lU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63493235-9612-438d-8d4f-d4c5da3a9fb9_1314x738.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">This image was added by TCW Editors - Not in the original post</figcaption></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to TCW for more free cyber and business-related content!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>According to the <a href="https://www.crowdstrike.com/blog/statement-on-windows-sensor-update/">company&#8217;s website</a>, the outage was caused by &#8220;a defect in a single content update for Windows hosts. Mac and Linux hosts are not affected.&#8221; Further, the company says that the issue was &#8220;identified, isolated and a fix has been deployed.&#8221;&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eCdT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eCdT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png 424w, https://substackcdn.com/image/fetch/$s_!eCdT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png 848w, https://substackcdn.com/image/fetch/$s_!eCdT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png 1272w, https://substackcdn.com/image/fetch/$s_!eCdT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eCdT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png" width="1120" height="526" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:526,&quot;width&quot;:1120,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eCdT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png 424w, https://substackcdn.com/image/fetch/$s_!eCdT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png 848w, https://substackcdn.com/image/fetch/$s_!eCdT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png 1272w, https://substackcdn.com/image/fetch/$s_!eCdT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d1d71e-ef61-4042-9a10-87d10034ad20_1120x526.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Good news! Except, according to sources, this isn&#8217;t the simple fix it&#8217;s being positioned as.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SBru!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SBru!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png 424w, https://substackcdn.com/image/fetch/$s_!SBru!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png 848w, https://substackcdn.com/image/fetch/$s_!SBru!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png 1272w, https://substackcdn.com/image/fetch/$s_!SBru!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SBru!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png" width="1254" height="456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:456,&quot;width&quot;:1254,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SBru!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png 424w, https://substackcdn.com/image/fetch/$s_!SBru!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png 848w, https://substackcdn.com/image/fetch/$s_!SBru!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png 1272w, https://substackcdn.com/image/fetch/$s_!SBru!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f24ee5f-11cc-492b-89fd-134fe414ccdc_1254x456.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Source: Reddit: <a href="https://www.reddit.com/r/crowdstrike/comments/1e6vmkf/bsod_error_in_latest_crowdstrike_update/">https://www.reddit.com/r/crowdstrike/comments/1e6vmkf/bsod_error_in_latest_crowdstrike_update/</a>&nbsp;</p><p>While attempting to triage the fix, many customers are reporting that they&#8217;re stuck in a boot loop and being forced to manually reset impacted servers, which could result in hours &#8212; or possibly days &#8212;&nbsp;of downtime and uncountable amounts of lost productivity and revenue.&nbsp;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/crowdstrike-update-causes-blue-screen/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/crowdstrike-update-causes-blue-screen/comments"><span>Leave a comment</span></a></p><p><strong>Dependency issue, not a cyber issue</strong></p><p>If this is not a cybersecurity issue &#8212; and it does not seem to be &#8212; why is a company like OX commenting? Quite simply: because it highlights the criticality of understanding the longtail of dependencies within IT infrastructures.&nbsp;</p><p>Neatsun Ziv, OX Security&#8217;s CEO and Co-founder, has said, &#8220;Incidents like the one we are seeing cause global chaos today, where an error in an update provided by a provider causes widespread outages, are not uncommon. What is unique about this incident is the scale at which it has taken place, likely wiping billions of dollars from the global economy due to global, widespread downtime.&#8221;</p><p>What&#8217;s become clear in the aftermath is that IT and operations teams are having to boot individual endpoints manually, which will take tons of time, especially for understaffed businesses. If the machine is Bitlockered, response teams will also have to enter a very long passcode, delete the file, and then restart. Remote-first companies will have to walk employees through these steps.&nbsp;</p><p><strong>Agent-based systems versus agentless</strong></p><p>While the world is recovering, we don&#8217;t want to cast stones. It&#8217;s easy to say, &#8220;An engineer messed up!!&#8221; But in reality, sometimes things happen. What we will say is that agent-based tools have consistently caused issues, starting with performance issues and network bandwidth issues.</p><p>As illustrated here, deployment and management of agents are problematic at scale. Furthermore, ensuring consistent agent configurations and updates across the entire ecosystem &#8212; especially if we&#8217;re talking about 100s of thousands, is extremely challenging.&nbsp;</p><p>With the Crowdstrike issue, the remediation requires hands-on-keys to fix. In today&#8217;s hybrid and highly mobile work environment, ensuring the right updates in this scenario is nearly impossible.&nbsp;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/crowdstrike-update-causes-blue-screen?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/crowdstrike-update-causes-blue-screen?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>In contrast, agentless deployments offer numerous advantages, especially when it comes to updates. Automated agentless updates facilitate:</p><ul><li><p><strong>Centralized Control:</strong> Without the need for agents on individual devices, updates can be managed centrally, ensuring consistency and efficiency.</p></li><li><p><strong>Rapid Deployment:</strong> New patches or software versions can be pushed out to all endpoints simultaneously, accelerating the update process.</p></li><li><p><strong>Reduced Error Rate:</strong> Centralized control minimizes the risk of human error during the update process.</p></li><li><p><strong>Improved Security:</strong> By eliminating the need for agents, which can be potential attack vectors, agentless technology enhances security.</p></li><li><p><strong>Scalability:</strong> Handles large-scale deployments with ease, as there's no need to manage agents on countless devices.</p></li></ul><p>This is an extremely unfortunate incident, and we wish every affected IT team good luck! What&#8217;s important here is to remember that incidents will happen &#8212; whether they&#8217;re cyber incidents or IT incidents. The best way to mitigate both the likelihood and severity of incidents is careful planning, including threat modeling, testing, backups, and practicing rapid response &#8212; and perhaps a future agentless approach.&nbsp;</p>]]></content:encoded></item><item><title><![CDATA["DR" Word Soup: A Long and Winding Road]]></title><description><![CDATA[Are All These Detection and Response Tools Necessary?]]></description><link>https://www.thecyberwhy.com/p/dr-word-soup-a-long-and-winding-road</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/dr-word-soup-a-long-and-winding-road</guid><dc:creator><![CDATA[Katie Teitler-Santullo]]></dc:creator><pubDate>Wed, 10 Jul 2024 14:02:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eUSj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The acronym word soup game is strong in cybersecurity. It&#8217;s easy for practitioners to forget how confusing it can be. We spit out these character combos as if they&#8217;re brand names and expect others in the organization to understand exactly what we mean. We also anticipate that business leaders and boards will buy into the fact that no security program can exist without the latest XYZ technology. Looking at security from the inside, it makes perfect sense to have 301 different letter-based categories; they align with analysts&#8217; definitions and ranking systems, and (of course) vendors jump on these acronyms to remain relevant and attract attention in a very crowded marketplace.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eUSj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eUSj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png 424w, https://substackcdn.com/image/fetch/$s_!eUSj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png 848w, https://substackcdn.com/image/fetch/$s_!eUSj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png 1272w, https://substackcdn.com/image/fetch/$s_!eUSj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eUSj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png" width="397" height="263.2736842105263" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:441,&quot;width&quot;:665,&quot;resizeWidth&quot;:397,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Acronym Soup United States, 44% OFF&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Acronym Soup United States, 44% OFF" title="Acronym Soup United States, 44% OFF" srcset="https://substackcdn.com/image/fetch/$s_!eUSj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png 424w, https://substackcdn.com/image/fetch/$s_!eUSj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png 848w, https://substackcdn.com/image/fetch/$s_!eUSj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png 1272w, https://substackcdn.com/image/fetch/$s_!eUSj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14931669-1dc6-4a83-9a41-27afb35a60f4_665x441.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>Acronym SOUP - Specifically DR Soup is holding back cybersecurity efficacy</strong></figcaption></figure></div><p>Over the years, &#8220;new&#8221; categories &#8212; and thus their acronyms &#8212;&nbsp;have emerged from perfectly descriptive former terms. For example, &#8220;data security&#8221; morphed into &#8220;data loss prevention&#8221;/&#8221;data protection&#8221; morphed into &#8220;data security posture management,&#8221; a term we use today to basically describe &#8220;data security&#8221; as it exists in 2024 versus how it existed in 1994.</p><p>Another trend that&#8217;s taken hold more recently is the tendency to add on to established terms. That is, take a category and chunk it into subcategories, thus allowing for disparate tools creation underneath the broader heading. The most current crazes I see are:</p><ul><li><p><strong>Security posture management</strong>: All the SPMs: CSPM, SSPM, DSPM, ASPM, I(A)SPM, and <a href="https://orca.security/resources/blog/source-code-management-systems/">Orca&#8217;s latest</a> addition: SCM-PM, &#8220;source code management posture management&#8221;&nbsp;</p></li><li><p><strong>Detection and response</strong>: All the DRs: EDR, NDR, XDR, ITDR, DDR, MDR, ADR, MLDR, TDR</p></li></ul><p>The rest of this post will focus on the &#8220;DR&#8221;s. There&#8217;s plenty to say about the posture management category, but I&#8217;ll save that for later.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you hate cybersecurity acronyms subscribe here. Maybe we can do away with them all!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>The evolution of cybersecurity detection and response</h3><p>Presumably, most of you reading this post work in security and know the history. But just in case you&#8217;re not a security pro or need a refresher &#8212; Cybersecurity emerged from more general IT in the late 1980s. At that time, and for about ten years, cyber threat detection and response (DR) primarily focused on signature-based analysis and provided the birth of antivirus (AV). If you&#8217;re old enough to have lived through or near those days, you might remember that identifying known malware patterns via signatures was tedious, highly manual, and not hugely effective. I mean, if you were a cybercriminal and knew that some newfangled software was looking for known patterns, wouldn&#8217;t you simply change the patterns? Yes, exactly.</p><p>AV software evolved to account for polymorphic viruses and became slightly more effective.</p><p>By the mid-1990s, no one in their right mind would have based their DR program on AV. It was a nice complement to other tools, one that would catch the &#8220;low-hanging fruit,&#8221; but not enough to be successful. What came next was intrusion detection and intrusion prevention systems (IDS/IPS). While IDS/IPS provided broader detection capabilities than AV, they were still based on patterns and were hamstrung by limited response actions.</p><p>The next decade brought SIEM, enhanced IDS/IPS, broader use of VPNs, heuristic detection capabilities, email filtering and spam detection, stateful firewalls, and more. These were (and continue to be) DR mechanisms in some form or another. As time passed, advanced persistent threats grew in popularity (both as a buzzword and a real-life potential attack) and tools developers needed to move toward greater detection and response efficacy. It became obvious that automation was needed and that reactivity wouldn&#8217;t cut it.</p><p>That&#8217;s when we first started hearing terms like &#8220;network detection and response,&#8221; &#8220;endpoint detection and response,&#8221; and the catch-all, &#8220;extended detection and response.&#8221; All these technologies emerged as a response to the evolving threat landscape. They were not completely new technologies but rather extensions of previous tools that existed, and they were built to fit modern-day computing requirements.</p><h3>The exploding cyber tools ecosystem?</h3><p>Of course, DR solutions cannot stand on their own; there are many other categories of tools &#8212; and related acronyms &#8212; deployed throughout organizations&#8217; digital estates. As a result, the ecosystem of cybersecurity tools has exploded, and what we have today is a giant pool of tools to aid security teams in their quests to conquer the entire attack surface.&nbsp;</p><p>While detection and response is a well-understood category, the hyper segmentation of terms and acronyms has muddied the space. Many DR tools now don&#8217;t only focus on detection and response, as their name implies; they&#8217;ve added identification components that, presumably, can help security teams pinpoint problems before they turn into active compromise. What we&#8217;re left with is an accumulation of acronyms that don&#8217;t mean the same thing to everyone. On top of that, if you stop and drill into the various subcategories, it feels like we&#8217;ve got some duplicative efforts&#8212;or, at least, the ability to consolidate, as is the stated desire of many practitioners.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pCLx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pCLx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png 424w, https://substackcdn.com/image/fetch/$s_!pCLx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png 848w, https://substackcdn.com/image/fetch/$s_!pCLx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png 1272w, https://substackcdn.com/image/fetch/$s_!pCLx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pCLx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png" width="300" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:320,&quot;width&quot;:320,&quot;resizeWidth&quot;:300,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;So Confused GIFs | Tenor&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="So Confused GIFs | Tenor" title="So Confused GIFs | Tenor" srcset="https://substackcdn.com/image/fetch/$s_!pCLx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png 424w, https://substackcdn.com/image/fetch/$s_!pCLx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png 848w, https://substackcdn.com/image/fetch/$s_!pCLx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png 1272w, https://substackcdn.com/image/fetch/$s_!pCLx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd879e23-e321-49ed-bb36-c130e3e68c59_320x320.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>What do I mean?&nbsp;&nbsp;&nbsp;</h3><p>Theoretically, XDR was developed to encompass NDR and EDR &#8212;&nbsp;the first iterations of DR tools. MDR offers the managed services version. Shouldn&#8217;t XDR cover everything, including managed DR? Logically, &#8220;extended&#8221; could mean coverage of identity threat detection and response (ITDR), data detection and response (DDR), application detection and response (ADR), &#8220;cloud detection and response,&#8221; and whatever comes next. It would be much simpler, wouldn&#8217;t it? The catch-all acronym &#8220;XDR&#8221; would clarify the soup.&nbsp;</p><p>But since security pros are so fond of acronyms, the creation of micro categories allows us to continue the trend and develop more siloed tools that will likely all converge &#8220;n&#8221; years from now. In the meantime, though, we have to have a place for each distinct subsection of DR. ITDR, for instance, is an approach for managing identities &#8212; both user and system. Cloud detection and response (CDR) clearly focuses on monitoring and managing cloud activity. Not necessarily identities of cloud-based systems and users (because that&#8217;s ITDR, at least to some vendors), but it could, couldn&#8217;t it? Wouldn&#8217;t that equate to &#8220;extended detection and response&#8221;? Gosh, this is getting confusing.</p><p>DDR is focused on protecting sensitive data (the artist formerly known as &#8220;data security&#8221;) for data in on-prem networks, cloud environments, applications&#8230;but then we have a separate category of ADR; ADR is much more specific to application runtime behavior, but it also analyzes things like user interactions (&#8220;identity&#8221;?), data flows (&#8220;data&#8221;?), and network calls (&#8220;network&#8221;?).&nbsp;</p><h3>So What?</h3><p>At the heart of the matter, the real question is: Are all these DR technologies necessary? The answer, <em>I think</em>, is yes. But are they necessary as <em>standalone categories</em>? If my crystal ball worked, it might say that many or even most of these acronymic categories will converge into one larger category, much like how SASE converged complementary categories into one integrated engine. </p><p>What&#8217;s amusing to me, though, is that, at least from this vantage point, the category they would roll into is&#8230;detection and response, which is the top-level umbrella category from which they emerged. In all likelihood, some analyst at one of the top two firms will concoct a creative term that can easily be turned into a catchy acronym that will be splashed across RSA and Black Hat conference booths. Two years later, the tides will turn again, and there will be another attention-grabbing category. For now, &#8220;DR&#8221; is all the rage. There are plenty of effective products to choose from if you want to swim in the DR soup. Sometime in the near future, though, expect your XDR vendor to buy your ITDR or ADR vendor &#8212; so negotiate your contracts well.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DYih!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DYih!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DYih!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DYih!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DYih!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DYih!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg" width="338" height="279.41333333333336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:496,&quot;width&quot;:600,&quot;resizeWidth&quot;:338,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Clear as mud - Rainbow SpongeBob Meme Generator&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Clear as mud - Rainbow SpongeBob Meme Generator" title="Clear as mud - Rainbow SpongeBob Meme Generator" srcset="https://substackcdn.com/image/fetch/$s_!DYih!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DYih!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DYih!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DYih!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27521917-a15b-4def-a60e-386f8eb9e68b_600x496.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[Fortinet Acquires Lacework in Surprising Move]]></title><description><![CDATA[Is this a Firesale or Fortification - Only Time Will Tell]]></description><link>https://www.thecyberwhy.com/p/fortinet-acquires-lacework-in-surprising</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/fortinet-acquires-lacework-in-surprising</guid><dc:creator><![CDATA[Katie Teitler-Santullo]]></dc:creator><pubDate>Wed, 12 Jun 2024 20:26:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2df7e1a3-a7a8-4596-93f0-730ad4b14ac2_1000x538.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s been a tumultuous ride for Lacework, the former Super Heavyweight of cloud security. The nine-year-old company started its meteoric rise almost immediately out of the gate, taking advantage of enterprise companies&#8217; mass migrations to the cloud. The company closed its $8 million USD Series A almost immediately after emerging from stealth; five rounds and $1.9 billion of investment later, the company was backed by some impressive firms, including Snowflake, Google Ventures, Altimeter Capital, General Catalyst, and Sutter Hill Ventures.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KkdO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KkdO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png 424w, https://substackcdn.com/image/fetch/$s_!KkdO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png 848w, https://substackcdn.com/image/fetch/$s_!KkdO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png 1272w, https://substackcdn.com/image/fetch/$s_!KkdO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KkdO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png" width="320" height="128" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b85823c2-41e3-4682-a50b-8b790c178a45_320x128.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:128,&quot;width&quot;:320,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Lacework Polygraph Data Platform for Red Hat on Red Hat Marketplace -  United States&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Lacework Polygraph Data Platform for Red Hat on Red Hat Marketplace -  United States" title="Lacework Polygraph Data Platform for Red Hat on Red Hat Marketplace -  United States" srcset="https://substackcdn.com/image/fetch/$s_!KkdO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png 424w, https://substackcdn.com/image/fetch/$s_!KkdO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png 848w, https://substackcdn.com/image/fetch/$s_!KkdO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png 1272w, https://substackcdn.com/image/fetch/$s_!KkdO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb85823c2-41e3-4682-a50b-8b790c178a45_320x128.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><p>As of late 2021, Lacework was valued at $8.3 billion, yep, that&#8217;s &#8220;billion&#8221; with a &#8220;B,&#8221; making it &#8212;&nbsp;at least on paper &#8212;one of the biggest cybersecurity players on the market.</p><p>And then came the fall. While many companies &#8212; in and out of cybersecurity &#8212;&nbsp;floundered during and in the wake of the pandemic, cloud companies thrived. Businesses needed a way to get people working from home, quickly and securely, and the cloud security market capitalized on this momentum.</p><p>Lacework was one of the companies leading this effort. Bolstered by all the cash it could possibly need to advance and enhance its products, acquire companies/products to expand its portfolio and hire top talent, there should have been no stopping the company. They even jumped into the artificial intelligence (AI) fray before the term was splashed across every RSA vendor&#8217;s booth and sprinkled into sales and marketing collateral. The way Lacework was using AI (read: advanced math, a.k.a., algorithms) was by using anomaly-based detection in ever-shifting cloud environments. Great idea&#8230;but it fell short when it was realized that, uh oh! The training data didn&#8217;t exist. For any machine learning (ML) or AI algorithm to work, enormous amounts of data must be available for the model to learn. And it must be reliable and <em>trustworthy</em> data. But because of how cloud environments work &#8212; how busy they are, and the fact that many cloud-focused attacks are based on API calls (not the data in the cloud itself) &#8212; the technology started to falter.&nbsp;</p><h1><strong>From the cloud to the ground</strong></h1><p>A whole lot of technological issues later, the company&#8217;s valuation started to drop. Lacework laid off 20% of its workforce. Key executives (like the co-CEO) started running for the hills. The remaining team management seemingly <a href="https://www.theinformation.com/articles/how-lacework-went-from-cybersecurity-stardom-to-fire-sale-talks">used questionable tactics</a> to lure companies into buying the product. Employees&#8212;current and past&#8212;started complaining about the toxic and overly political culture. Customers started reporting the product&#8217;s lack of efficacy. And the list goes on and on.</p><p>Lacework&#8217;s fall from grace was highly recognized in security circles. As both its valuation and revenue plummeted, and the cloud security sector continued to boom, competitors took notice. Wiz, the 800-pound gorilla of the cloud, decided to approach Lacework for an acquisition &#8212; theoretically to buy the company in a firesale, retain the good parts, and remove one noisy would-be competitor.&nbsp;</p><p>But that acquisition fell through. Not much detail was given, and the security community was left to speculate that Wiz found something&#8212;or a whole lot of somethings&#8212;it didn&#8217;t like during the due diligence process. The toxic culture could have been a sticking point, or Wiz could have discovered some &#8220;smoke and mirrors&#8221; in the product. We&#8217;ll likely never know. However, the covers were off&#8212;everyone seemed to be talking about Lacework as a case study of how <em><strong>not</strong></em> to operate.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DzUZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DzUZ!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif 424w, https://substackcdn.com/image/fetch/$s_!DzUZ!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif 848w, https://substackcdn.com/image/fetch/$s_!DzUZ!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif 1272w, https://substackcdn.com/image/fetch/$s_!DzUZ!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DzUZ!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif" width="480" height="270" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:270,&quot;width&quot;:480,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;burning plane crash GIF by South Park&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="burning plane crash GIF by South Park" title="burning plane crash GIF by South Park" srcset="https://substackcdn.com/image/fetch/$s_!DzUZ!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif 424w, https://substackcdn.com/image/fetch/$s_!DzUZ!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif 848w, https://substackcdn.com/image/fetch/$s_!DzUZ!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif 1272w, https://substackcdn.com/image/fetch/$s_!DzUZ!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65af09db-207c-48bc-a049-986d969e6ea0_480x270.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/fortinet-acquires-lacework-in-surprising?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/fortinet-acquires-lacework-in-surprising?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h1><strong>A fresh start, or tearing apart?</strong></h1><p>It seemed like the end of the road for Lacework until yesterday. On June 10, 2024, Fortinet announced it would acquire Lacework for an undisclosed amount. According to the Fortinet press release, &#8220;Fortinet intends to integrate Lacework&#8217;s CNAPP solution into its existing portfolio, forming one of the most comprehensive, full-stack AI-driven cloud security platforms available from a single vendor. This will help customers identify, prioritize, and remediate risks and threats in complex cloud-native infrastructure from code to cloud.&#8221;</p><p>The reality is that time will shake out a few of the reasons why this seemingly failing company is being thrown a lifeline. Is it an acqui-hire? An acquisition &#8220;for-parts&#8221;? Were the financials just so in Fortinet&#8217;s favor &#8212;&nbsp;the firesale of a lifetime &#8212;resulting in Fortinet engineers having a tiny leg up on building CNAPP rather than starting from scratch?</p><p>One thing is for sure: the announcement has captivated many in the cybersecurity community, and it&#8217;s bound to be a topic of conversation for a long time.&nbsp;If you have thoughts or opinions on this story, leave them in the comments below!</p>]]></content:encoded></item><item><title><![CDATA[Can You Land Your Next Job Without Your Network?]]></title><description><![CDATA[Why are cybersecurity positions so human network based?]]></description><link>https://www.thecyberwhy.com/p/can-you-land-your-next-job-without</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/can-you-land-your-next-job-without</guid><dc:creator><![CDATA[Katie Teitler-Santullo]]></dc:creator><pubDate>Tue, 11 Jun 2024 22:40:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xGmR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong>This article was written on June 4, 2024, by The Cyber Why author Katie Teitler-Santullo.</strong></em></p><p>Hi &#8212; I&#8217;ve been gone for a while, recalibrating and job hunting. Maybe you&#8217;ve noticed, maybe you haven&#8217;t. In either case, I had about two months away from work and even though I was much busier than I wanted to be, I had time to reflect and think about cybersecurity as a career. Not just <em>my</em> career, but cybersecurity as a career, in general.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><h3>Flashback to April</h3><p>My former job was on shaky ground. Over the last year (plus) there were a number of major changes to my department as well as other organizational changes that directly and indirectly impacted my and my team&#8217;s work. As a result, I&#8217;d been thinking about making a move. But I&#8217;m usually not a quitter; I prefer to be shoved out the door for some sadistic reason.&nbsp;</p><p>During the first week in April, it became readily apparent to me that I&#8217;d need to start looking for a new job ASAP. I was out of town, getting ready to speak at a conference. What I should have been doing that morning was prepping my talk. Instead, I had a bad gut feeling and started messaging trusted friends and colleagues. The gist of my messages: &#8220;I think I need to look for a new job. If you know anyone who is hiring, I&#8217;d appreciate an introduction.&#8221;</p><p>Within minutes, the first reply came back: &#8220;Call me. I might know someone.&#8221; Over the course of the day, I received several other responses with a similar tone. That was a Wednesday. On Friday, I had my first conversation with the person who would ultimately facilitate my new job (at an amazing company!!). The following Monday, I had three more conversations with companies that were hiring for my role. Several of those conversations turned into opportunities, meaning they weren&#8217;t fluff conversations scheduled simply because a friend of a friend of a friend asked for a favor. I was being ushered down the hiring pipeline solely because of the industry connections I&#8217;ve made. I have been <em><strong>incredibly</strong></em> fortunate throughout my career to work with some really good people who (for some odd reason) appreciate my work and me as a person. And, in this situation, they were willing to dedicate time and effort to help me find my next job.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/can-you-land-your-next-job-without?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/can-you-land-your-next-job-without?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3><strong>Work your network</strong></h3><p>You might think this is luck; where I&#8217;ve worked, and the positions in which I&#8217;ve worked have given me certain &#8220;advantages.&#8221; While there might be some truth in that, I also work really hard at cultivating and maintaining my network of security friends and colleagues. I check in with people &#8220;just because.&#8221; I send birthday texts (if I know their birthday). I reach out when I see/hear that someone is job searching. I make introductions whenever I can.&nbsp;</p><p>(Importantly, though, I am not a pest; I won&#8217;t continue to communicate with someone if they indicate in any way that my touchpoints are unwelcome. I&#8217;m not <em>that</em> LinkedIn connection.)&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UsKZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UsKZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UsKZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UsKZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UsKZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UsKZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg" width="224" height="225" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:225,&quot;width&quot;:224,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The HR Capitalist: The Increasing Tinder (For Vendors) Vibe of LinkedIn...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The HR Capitalist: The Increasing Tinder (For Vendors) Vibe of LinkedIn..." title="The HR Capitalist: The Increasing Tinder (For Vendors) Vibe of LinkedIn..." srcset="https://substackcdn.com/image/fetch/$s_!UsKZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UsKZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UsKZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UsKZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3033a6-466e-42ef-9ca8-7fe1f2eba6a8_224x225.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>I know many of you readers also work hard at the community aspect of cybersecurity. Mostly, though, when we&#8217;re networking, the goal is less about &#8220;what can you do for me&#8221; than shared interests or, more simply, a connection with someone fun, friendly, interesting, etc. Personally, I don&#8217;t keep in touch with people because I&#8217;m thinking, &#8220;One day, I might need their help.&#8221; However, it&#8217;s hard to ignore the fact that I got my current job, had the plethora of interviews I did, and was offered jobs only at companies &#8212;&nbsp;not just now, but over the last 20 years &#8212; that began with a personal introduction. <em><strong>Every single job</strong></em><strong> I&#8217;ve had in cybersecurity, going back to 2004, has started with an introduction.</strong> And I&#8217;ve never had more than a two-month gap between jobs. (If you&#8217;re now checking my LinkedIn, you&#8217;ll see a few gaps that are greater than two months. There were times I left a job, dabbled outside of security, then returned. Those positions appear only on my resume.)&nbsp;&nbsp;&nbsp;&nbsp;</p><p>My network has had a significant and profound impact on my ability to find employment. Again &#8212;&nbsp;I am incredibly grateful. I am even more grateful when I look at the state of the industry and my friends and colleagues who have been job-seeking for longer periods of time. Over the last few years, I&#8217;ve spoken with several people who want or need a new job and have to rely on the old-fashioned method of job hunting: applying through companies&#8217; websites or job boards. These people send out hundreds and hundreds of resumes and fill out countless forms because they don&#8217;t have an inside track.&nbsp;</p><p>And they&#8217;re not getting great or rapid responses. I know a lot of very skilled people who have a hard time scheduling interviews because they are applying &#8220;blind.&#8221; I have two friends who, after applying for cybersecurity jobs for months on end (and have job history in the field), decided to send resumes to non-security tech companies. Guess what happened. They got positive responses right away.</p><p>In only one instance during this last round of job seeking did I land an interview with a company at which I knew no one. And even though the conversation went well, the HR person never followed up, even after saying I was a &#8220;great fit for the role.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xGmR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xGmR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xGmR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xGmR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xGmR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xGmR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg" width="271" height="211.28046744574291" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:467,&quot;width&quot;:599,&quot;resizeWidth&quot;:271,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;30 Painfully Relatable Memes For Anyone Searching For A Job Right Now&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="30 Painfully Relatable Memes For Anyone Searching For A Job Right Now" title="30 Painfully Relatable Memes For Anyone Searching For A Job Right Now" srcset="https://substackcdn.com/image/fetch/$s_!xGmR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xGmR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xGmR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xGmR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32d0ce8-ef69-4483-81dd-b2f21e7a777c_599x467.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>It&#8217;s a miserable situation. I&#8217;ve felt it. Even though my latest job search was fast-tracked due to connections, I built a backup plan in case something went awry. I applied to a dozen or so positions &#8212; which were exactly the same as the one I have and another for which I was offered a job &#8212; at which I didn&#8217;t have a personal connection. I either never got responses from those &#8220;blind&#8221; applications or received responses claiming there were &#8220;other candidates better suited.&#8221;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/can-you-land-your-next-job-without?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/can-you-land-your-next-job-without?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3><strong>Stranded without a network</strong></h3><p>Thinking about this &#8212;&nbsp;and watching several of my friends and former colleagues struggle with the state of hiring in security &#8212; I have to wonder: when did we become so insular that only a connection &#8212;&nbsp;tenuous as it might be &#8212; will do? Is cybersecurity the type of community that refuses to welcome unknowns, even when the person&#8217;s skills, background, and temperament are a perfect fit for a position? Is a person imminently more qualified when referred by a friend, or a friend of a friend (or more)?&nbsp;</p><p>I saw this happening during my search, so I asked one of the people interviewing me why she was only talking to people to whom she&#8217;d be introduced by a mutual connection. &#8220;These positions are too risky to hire just anybody.&#8221;</p><p>Is that actually true? And isn&#8217;t that what the interview process is for? Aren&#8217;t recruiters supposed to help establish a connection? Do people honestly think that only the people they already know are the only good workers in the industry? Is keeping the circle tight helping advance security? Shouldn&#8217;t we be more impressed with what someone brings to the table than whom they bring to the table?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nB-7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nB-7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nB-7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nB-7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nB-7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nB-7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg" width="372" height="288.765" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:621,&quot;width&quot;:800,&quot;resizeWidth&quot;:372,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&#128293; Jax S. on LinkedIn: #cyberjobhunt #careerresource #salarynegotiation |  58 comments&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&#128293; Jax S. on LinkedIn: #cyberjobhunt #careerresource #salarynegotiation |  58 comments" title="&#128293; Jax S. on LinkedIn: #cyberjobhunt #careerresource #salarynegotiation |  58 comments" srcset="https://substackcdn.com/image/fetch/$s_!nB-7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nB-7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nB-7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nB-7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8181906c-c03a-431a-b860-28a0e0bcfe60_800x621.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Expand your periphery</strong></h3><p>In my opinion, it&#8217;s extremely limiting to shrug off candidates purely because there&#8217;s no direct or dotted line to the hiring manager or company. While every job I&#8217;ve had in the last two decades started with an introduction by a mutual connection, I have met a number of amazingly impressive people at those jobs who are now colleagues I would recommend to any hiring manager. My professional life is richer for meeting these new people. My network has grown because I had the opportunity to work with people I didn&#8217;t previously know anything about. Some of these &#8220;outsiders&#8221; are now personal friends with whom I regularly communicate and/or spend my non-work time.</p><p>On the flip side, some of the people in my network who were once very close colleagues have significantly drifted outside my periphery (and vice versa). I have no idea what they&#8217;re up to now. If they are as committed as they once were. If they&#8217;ve kept up their skills. Sure, if someone in my network were to reach out and ask me to vouch for one of these people, I likely would. But I&#8217;d have to caveat it and say we haven&#8217;t been in contact for X while. Knowing the industry, I&#8217;d guess that even a latent relationship counts for more than no relationship.&nbsp;</p><p>Even though I benefit from wonderful professional relationships, I think it&#8217;s a disservice to the industry to rely solely on introductions when hiring for open positions. It might take more effort to vet an &#8220;unknown,&#8221; but it can pay off multifold. You never know how someone will act or react inside a new company, even if you&#8217;ve worked with them for years under different circumstances. When faced with a toxic environment or bad team composition, a previously amazing worker can sour or develop apathy. Stressful situations can breed bad &#8212; or anomalous &#8212; behavior. Someone you already know isn&#8217;t necessarily a &#8220;sure thing.&#8221;&nbsp;&nbsp;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><h3><strong>A different perspective on hiring</strong></h3><p>Personally, I will continue to grow my network and connect with past and current colleagues. I will also continue to try to help people in my network when I can. But I will also be mindful that the next best candidate for a job I might be hiring is someone completely disconnected from me or my network. From my point of view, the industry is in too much need of skilled workers to write people off purely because they were heads down at their jobs or too shy to attend RSA parties. I know some HR pros and hiring managers will say it&#8217;s too much work to wade through pages and pages of blindly submitted resumes or, worse yet, that their &#8220;AI-based resume scanner&#8221; didn&#8217;t identify the &#8220;correct&#8221; buzzwords.&nbsp;</p><p>If we want talented people to work for and with our teams, we have to expand our perception of who is the &#8220;right&#8221; fit. A tenuous LinkedIn, user group, online forum, or social media &#8220;connection&#8221; does not a known quantity make. Let&#8217;s be honest: <a href="https://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you%27re_a_dog">on the internet, nobody knows you&#8217;re a dog</a>.&nbsp;</p><p>So, while it might be easier to take the path of least resistance, which includes personal introductions for open positions, it might be profitable in the future to invest in cultivating new colleagues along the way. After all, a stranger is just a friend we have not yet met, or something&#8230;&nbsp;</p><p>In the meantime, I will continue to thank the gracious colleagues and friends who helped me land my current role.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5IQG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5IQG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5IQG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5IQG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5IQG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5IQG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg" width="361" height="204.2262895174709" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:340,&quot;width&quot;:601,&quot;resizeWidth&quot;:361,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;8 Coworker Appreciation Memes (+7 Tips for Sending)&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="8 Coworker Appreciation Memes (+7 Tips for Sending)" title="8 Coworker Appreciation Memes (+7 Tips for Sending)" srcset="https://substackcdn.com/image/fetch/$s_!5IQG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5IQG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5IQG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5IQG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff580ad76-051d-4bed-9775-9d7f9a7aea02_601x340.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><em>FTR: I have recruiters connecting on LinkedIn all the time. They&#8217;re always willing to help when I don&#8217;t want or need a job. But when I reached out on this last hunt, ONLY the recruiters who personally knew at least one of my LinkedIn connections responded.</em>&nbsp;</p>]]></content:encoded></item><item><title><![CDATA[Winning In An AI Driven Contextual Security Paradigm ]]></title><description><![CDATA[Part ONE of a multiple part series.]]></description><link>https://www.thecyberwhy.com/p/winning-in-an-ai-driven-contextual</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/winning-in-an-ai-driven-contextual</guid><dc:creator><![CDATA[Tyler Shields]]></dc:creator><pubDate>Tue, 14 May 2024 15:49:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ejMm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In my previous deep-thought article entitled &#8220;<a href="https://thecyberwhy.substack.com/p/the-next-era-of-cyber-security-capabilities">The Next Era of Cyber Security Capabilities</a>,&#8221; I explored the evolution and requirement for &#8220;context&#8221; in modern cybersecurity products. The critical difference between traditional cybersecurity technologies and contemporary platforms is the use of context and artificial intelligence to make more intelligent and accurate decisions. The new era of cyber takes infinite data points and adds them together to create context, then feeds that context back into the training algorithms, thus gaining compounding value over time. AI is required to process these large data sets to derive context-based answers rapidly, suggesting a future where AI-driven cybersecurity technologies can observe and protect digital realms like never before.</p><p>Given this description of a &#8220;contextual&#8221; cybersecurity future, specific requirements exist for any vendor that wishes to become the dominant player in the emerging contextual security (AI cyber) space. Both technology and usability innovations are required in this new and exciting area of cybersecurity products. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ejMm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ejMm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!ejMm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!ejMm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!ejMm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ejMm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A futuristic scene in the style of the movie 'Minority Report' depicting a precog finding criminals in the future. The setting is a high-tech, sleek control room with holographic displays. The precog is standing and moving images around with his hands in real-time, surrounded by advanced technology. Holographic images of potential crimes and suspects float around, indicating the precog's visions. The atmosphere is intense and futuristic, with a focus on the advanced technology and the precog's unique abilities.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A futuristic scene in the style of the movie 'Minority Report' depicting a precog finding criminals in the future. The setting is a high-tech, sleek control room with holographic displays. The precog is standing and moving images around with his hands in real-time, surrounded by advanced technology. Holographic images of potential crimes and suspects float around, indicating the precog's visions. The atmosphere is intense and futuristic, with a focus on the advanced technology and the precog's unique abilities." title="A futuristic scene in the style of the movie 'Minority Report' depicting a precog finding criminals in the future. The setting is a high-tech, sleek control room with holographic displays. The precog is standing and moving images around with his hands in real-time, surrounded by advanced technology. Holographic images of potential crimes and suspects float around, indicating the precog's visions. The atmosphere is intense and futuristic, with a focus on the advanced technology and the precog's unique abilities." srcset="https://substackcdn.com/image/fetch/$s_!ejMm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!ejMm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!ejMm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!ejMm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc970ef6-6738-4d7b-9503-bbc264bef03a_1792x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A cybersecurity analyst of the future as he predicts and stops attacks as they occur in real-time. Image dreamed up by ChatGPT 4o. Doesn&#8217;t the future look RAD?</figcaption></figure></div><h3>Winners and Losers</h3><blockquote><p><strong>In the landscape of contextual cybersecurity, winners and losers among vendors will be determined by the amount of data they can collect, the strength of the context they build, how they integrate with other technologies to collect the data, and if they can innovate new technology capabilities on top of the context set in a way that provides rapid value. Look for these criteria in the vendor you invest in.</strong></p></blockquote><p><strong>Winners</strong>: Vendors that embrace AI and machine learning to enhance contextual analysis will come out ahead. Companies that effectively integrate their solutions with broader ecosystems, ensuring seamless data flow and contextual insights across different platforms, are poised to succeed. Those who invest in developing systems that can rapidly adapt to new threats and offer proactive security measures based on rich contextual data will be at the forefront.</p><p><strong>Losers</strong>: Vendors that fail to move beyond traditional, siloed approaches to cybersecurity will struggle. Companies that are slow to integrate AI and machine learning or do not effectively utilize the increasing availability of data for contextual analysis will fall behind. Vendors that resist evolving their products to work seamlessly in cloud-based, API-driven environments or cannot provide a holistic view of security threats will lose relevance.</p><h3>Criteria for Contextual Cybersecurity Success</h3><p>The future of cybersecurity hinges on a strategic blend of context creation and intelligent data handling. These criteria define the capabilities of cutting-edge cybersecurity solutions and shape how they integrate within the broader technology ecosystem. From harnessing advanced AI to ensuring comprehensive data collection, these principles form the cornerstone of a robust and future-proof cybersecurity platform. Specific criteria will determine success:</p><ol><li><p><strong>Breadth and depth of data collection: </strong>This refers to the comprehensive gathering of varied data types from multiple sources to create a rich data pool. The breadth refers to the range of data types and sources &#8211; encompassing everything from network traffic, user behavior, and application logs in both cloud and SaaS environments. The depth pertains to the level of detail and historical data accumulated, allowing for nuanced analysis. This extensive collection is crucial for AI systems to understand standard patterns and identify anomalies effectively. It enables the construction of a more detailed and accurate contextual landscape, which is crucial for predictive analytics and proactive threat mitigation.</p></li><li><p><strong>Integrations and data enrichment from external sources: </strong>Ensuring that cybersecurity solutions integrate smoothly with various platforms and ecosystems enhances the overall security posture. The additional data enrichment from external sources provides a more robust depth of data, resulting in more accurate and detailed context creation. The data could even come from sources beyond security, including business, human resources, financial, and sales and marketing output.</p></li><li><p><strong>Feedback loops of context for continuous learning: </strong>A network effect is formed when data is turned into context and then fed back into the training system as a new data piece. The compounding effect of this feedback loop creates a system where knowledge grows over time, and data analysis accuracy is self-improving. Whichever technologies understand this concept and can build a system that improves over time will have a distinct advantage in the market. Like compound interest, the sooner they start learning, the sooner they will hit acceptable levels of accuracy. Essentially, contextual cybersecurity is a race against time that must start sooner rather than later.</p></li><li><p><strong>Ease of use and seamless interoperability:</strong> Ensuring that cybersecurity solutions can integrate smoothly for the consumption and usability of results with various platforms and ecosystems enhances the overall security posture. Balancing advanced technology with user experience and usability of output creates a robust and user-friendly solution. Any vendor wanting to dominate in this emerging market must surface value quickly, in the appropriate formats, and make it easy to use for several different user personas. This is NOT going to be an easy task.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/winning-in-an-ai-driven-contextual?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/winning-in-an-ai-driven-contextual?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></li></ol><h3>The Enterprise Path To Glory - What This Means For The CISO!</h3><p>While the path to contextual cybersecurity glory seems clear, it is anything but. Vendors that understand the success criteria listed above and the vision of the future will undoubtedly have a leg up on the rest of the market. Still, like anything in business, execution is always more complex than ideation. The devil is indeed in the details.</p><p>We are still in the early days. Enterprise cybersecurity leaders must understand the requirements for future success but be careful not to over-index on this vision too quickly. It&#8217;s very easy to get out in front of the reality of what products are actually capable of, resulting in a situation where you are less secure than before you rallied behind the innovations. Don&#8217;t buy too much into the hype; instead, be pragmatic and pay attention to how solutions such as these can fit into your cybersecurity program today and augment what you are already achieving. As they say in comedy, timing is everything.</p><p><em>Coming soon: A new deep-thought piece on the cybersecurity vendors and platforms positioned well to succeed and the submarkets they will come to dominate. Stay tuned to The Cyber Why for more!</em></p><h3></h3>]]></content:encoded></item><item><title><![CDATA[A Meta-Review of the Summer 2023 Microsoft Exchange Online Intrusion]]></title><description><![CDATA[Yes, THAT Microsoft breach. These are my thoughts on the CSRB report.]]></description><link>https://www.thecyberwhy.com/p/a-meta-review-of-the-summer-2023</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/a-meta-review-of-the-summer-2023</guid><dc:creator><![CDATA[Adrian Sanabria]]></dc:creator><pubDate>Tue, 16 Apr 2024 18:14:16 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2e6cb42e-0c5c-41cd-aeab-b73cd429358a_654x645.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4><em>My Incident Transparency Soapbox</em></h4><p><em>It has been a while since I&#8217;ve written up a post-mortem analysis of a breach. Partially, this is because breach details rarely become available to the public. This is currently a huge issue for our industry, as learning from others&#8217; failures is one of the most ideal and effective ways for the industry as a whole to improve. Otherwise, we&#8217;re all just guessing at what moves the needle and what doesn&#8217;t.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you like deep analysis pieces like this, please subscribe to The Cyber Why!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Background</h2><p>A quick note: many folks make their living off Microsoft. It is one of the largest tech giants, and as the CSRB report points out, it has over <em>one billion </em>customers. It might seem like researchers and analysts are constantly picking on Microsoft and singling it out. They&#8217;re not wrong! </p><p>Microsoft, along with tech giants like Apple, Google, and Amazon, are often singled out for a good reason: due to their massive market share, when they make a mistake, it has a much larger impact on the general public and global economy than incidents at other businesses and tech companies would. Mistakes like these are easier to forgive when smaller, less experienced, and less impactful companies make them. Companies like Microsoft are held to higher, unique standards because mistakes at Microsoft scale can do so much more damage - like when Exchange vulnerabilities <a href="https://www.crn.com/news/security/rackspace-confirms-ransomware-attack-caused-massive-outage">destroyed part of Rackspace&#8217;s business nearly overnight</a>. Sorry, these are the breaks when your company achieves trillion-dollar valuations.</p><h3>What is the CSRB?</h3><p>In May 2021, Executive Order 14028 tasked Homeland Security with creating a Cyber Safety Review Board (CSRB from here out). This would be a group of private and public cybersecurity experts tasked with investigating only the most egregious and impactful incidents. To date, the CSRB has investigated three incidents:</p><ol><li><p>The Log4j Vulnerability</p></li><li><p>Lapsus$ and related threat groups</p></li><li><p>The Summer 2023 Microsoft breach - the focus of this analysis.</p></li></ol><h3>Why Read This?</h3><p>I read as many reports like this as possible, trying to discover the deeper root causes behind some of these events. I aim to answer questions like:</p><ol><li><p>why did detections fail?</p></li><li><p>why did security controls fail?</p></li><li><p>which controls failed and why?</p></li><li><p>were failures due to technology, processes, people, or some combination?</p></li></ol><p>While my review of the CSRB report will contain my personal bias and opinions, I should also point out that the CSRB report feels somewhat biased. It remains highly focused on facts, but to my eyes, at least, the tone could be characterized as complementary of the government and &#8220;sick of Microsoft&#8217;s screwups.&#8221; I personally think the CSRB&#8217;s reviews should be more unbiased - the members of the board have ample opportunity to share their individual personal opinions via their own blog posts or social media. With that said, the board isn&#8217;t alone - there has been a lot of sympathy with the report's tone (myself included).</p><h3>Why is Everyone Beating Up on MSFT so Much??</h3><p>Microsoft has indeed had a rough time in the past few years. Companies like Wiz, Orca, and Lacework have discovered and <a href="https://www.cloudvulndb.org/results?tags=Azure">reported on dozens of security issues in the Azure cloud platform</a>. With access to so many of the world&#8217;s businesses and hosting a significant chunk of the world&#8217;s email, unsurprisingly, Microsoft is a constant target for nearly all types of attackers. </p><p>Microsoft isn&#8217;t alone in being targeted, but it does seem to get breached more often than any of its peers. In fact, two more significant incidents have occurred following the breach I&#8217;ll be discussing here. Adding to Microsoft&#8217;s woes, some of the incidents occurred due to its <a href="https://www.darkreading.com/cloud/microsoft-azure-data-leak-exposes-dangers-of-file-sharing-links">own employees failing to understand how to use Azure securely</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/a-meta-review-of-the-summer-2023?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/a-meta-review-of-the-summer-2023?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Let&#8217;s Dive Into The Analysis</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aXGw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aXGw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aXGw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aXGw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aXGw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aXGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aXGw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aXGw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aXGw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aXGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90f6a0d4-13ff-43b2-88a6-828ed45cccd6_3325x2494.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://www.cisa.gov/sites/default/files/2024-03/CSRB%20Review%20of%20the%20Summer%202023%20MEO%20Intrusion%20Final_508c.pdf">Grab a copy of the report</a> if you want to read it yourself, or check out some of the sections I&#8217;ll reference. At 34 pages, it doesn&#8217;t seem like a massive report, but don&#8217;t let that fool you. The report is quite dense and doesn&#8217;t contain a lot of fluff.</p><p>First, let&#8217;s talk about the overall sentiment of the report. Microsoft failed to detect a major intrusion into one of its most popular products, and this report doesn&#8217;t ever let you forget that fact. Sure, this attack was truly deserving of the oft-overused &#8220;advanced and sophisticated&#8221; description. It was carried out by the same Chinese-affiliated group (Storm-0558) that famously compromised Google (the Aurora attack that led to the creation of the company&#8217;s BeyondCorp zero trust principles and products) and RSA (targeting their SecurID MFA product) over a decade ago.</p><p>This attack campaign appears to have been successful: Storm-0558 went undetected for an unknown period of time. This threat actor accessed the email accounts of 22 organizations and over 500 individuals across both commercial (M365) and consumer (Hotmail/Outlook.com) products. Tens of thousands of emails were downloaded from just one of these targets (the State Department) before the attack was detected.</p><p>Microsoft has yet to conclude this investigation. They continue to explore 46 hypotheses they originally developed nine months ago.</p><h3>How did the attackers pull it off?</h3><p>The primary mechanism that allowed this attack to happen was a Microsoft Services Account key (MSA Key) that Storm-0558 used to generate the tokens needed to access all the aforementioned email accounts. </p><p>This MSA key is at the heart of this whole thing. It's such a mess &#8212; it's like a problem with superpowers, a super-godmode vulnerability.</p><p>This thing was the equivalent of a skeleton key for Microsoft's services.</p><ul><li><p>The MSA key wasn't supposed to be able to generate tokens for both consumer and enterprise Microsoft services, but thanks to some software bugs, it did.</p></li><li><p>The MSA key was originally generated in 2016, and this attack happened in 2023. Keys like this shouldn&#8217;t have a lifespan this long. They should have been revoked and rotated years prior, but Microsoft stopped rotating keys after an availability incident and never went back to rotating keys after that.</p></li><li><p>The idea of any MSA key having access across all of one of Microsoft's services is already bonkers. The review board talked to all of the other CSPs out there (Google, Amazon, even Oracle), and no one else does this. Everyone else compartmentalizes access controls and token generation. Microsoft didn't.</p></li><li><p>The CSRB report even cites <em>Oracle Cloud </em>as an example of correctly controlling access. Ouch.</p></li></ul><p>A total of 525 tokens were forged from this MSA key: 503 were for personal email accounts, and 22 were for enterprise M365 organizations.</p><p>The majority were for US-based accounts, but this was an international incident &#8212; UK organizations and personal accounts belonging to people worldwide were also affected.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share The Cyber Why&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share The Cyber Why</span></a></p><h3>Two Truths and a Lie</h3><p>You might recall that Microsoft reported last year that Storm-0558 got this key from a crash dump.</p><p>That was apparently a lie.</p><p>The CSRB report isn't calling it a lie because it's a formal, professional report, but I can't think of any more accurate language to use here. Microsoft stated it as fact. <a href="https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/">You can still go back and read it</a>.</p><blockquote><p>Our investigation found that a consumer signing system crash in April of 2021 resulted in a snapshot of the crashed process (&#8220;crash dump&#8221;). The crash dumps, which redact sensitive information, should not include the signing key. In this case, a race condition allowed the key to be present in the crash dump (this issue has been corrected). The key material&#8217;s presence in the crash dump was not detected by our systems (this issue has been corrected).</p></blockquote><p>Microsoft later admitted to the review board that there was no evidence to support this theory. Apparently, Microsoft came up with 46 hypotheses when investigating this attack, and this "key recovered from a crash dump" theory seemed plausible to them. Instead of saying, &#8220;We don&#8217;t know what happened, but here&#8217;s a theory&#8221;, they pitched their theory as fact. This is problematic not only for reasons of trust but also because it potentially impacts the incident response strategies of the targets of this attack. If Microsoft claims containment has occurred when it hasn&#8217;t&#8230; well.. that&#8217;s an issue!</p><p>After Microsoft revealed this lack of evidence to the CSRB, they chose not to correct the incorrect information. <a href="https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/">For over six months</a>, Microsoft allowed the public and their customers to believe they had discovered the incident's root cause.</p><p>The truth is that they still have no idea how Storm-0558 got their hands on this MSA key.</p><h3>Notification Troubles</h3><p>Another concerning issue was around notification. Microsoft users and customers are so used to seeing phishing scams using Microsoft designs, fonts, and CSS that many victims ignored Microsoft's messages about the compromise and had to be contacted directly by the FBI.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IqEg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IqEg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png 424w, https://substackcdn.com/image/fetch/$s_!IqEg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png 848w, https://substackcdn.com/image/fetch/$s_!IqEg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png 1272w, https://substackcdn.com/image/fetch/$s_!IqEg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IqEg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png" width="482" height="414" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:414,&quot;width&quot;:482,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IqEg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png 424w, https://substackcdn.com/image/fetch/$s_!IqEg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png 848w, https://substackcdn.com/image/fetch/$s_!IqEg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png 1272w, https://substackcdn.com/image/fetch/$s_!IqEg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb570b6b9-6def-48f6-942f-d14cba2b2d79_482x414.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Looks similar to 100% of the Microsoft phishing emails I&#8217;ve received &#129335;&#127997;</figcaption></figure></div><p>Perhaps security awareness training also has some culpability here? I'd be interested in hearing other folks' thoughts on this.</p><p>One of the report's recommendations is an &#8216;amber alert&#8217; style notification system. Hopefully, it will be more scammer-resistant than email.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/a-meta-review-of-the-summer-2023/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/a-meta-review-of-the-summer-2023/comments"><span>Leave a comment</span></a></p><h3>How was the attack detected?</h3><p>Microsoft often reminds us that it is the most prominent security vendor in terms of revenue (&gt;$20 billion today). They have an extensive line of security products designed to detect attacks. It is a bad look that they failed to spot this attack. </p><p>Instead, the US State Department detected this attack using a detection mechanism they call "Big Yellow Taxi" (someone&#8217;s a Joni Mitchell fan?). Big Yellow Taxi analyzes MailItemsAccessed logs for anything that looks weird or anomalous when compared to a baseline. For any detection engineers out there that just winced, yeah - this doesn&#8217;t seem like an easy detection rule to operationalize. It sounds like a ton of work, but it enabled the State Department to be the first and only one to detect this huge attack out of 503 individuals, 21 other organizations, and Microsoft themselves.</p><p>According to the CSRB report, they wouldn't have been able to create this detection rule if they hadn't paid extra for <a href="https://www.microsoft.com/en-us/security/business/risk-management/microsoft-purview-audit">Purview Audit Premium</a>. This sets the <a href="https://www.atlanticcouncil.org/content-series/buying-down-risk/cyber-poverty-line/">Security Poverty Line</a> at least another $144 per user per year above the standard M365 license.</p><p>It could be biased from the review board, but inter-agency cooperation seems <em>really</em> impressive here. The State Department, Commerce Department, FBI, and CISA provided a lot of sub-24-hour assistance and feedback. By comparison, Microsoft seems positively sloth-like.</p><h3>Microsoft&#8217;s detection and telemetry</h3><p>A recurring theme in the report is a focus on log retention. Most folks are aware of the log situation at Microsoft: logs are disabled by default, and when they are enabled, retention is often limited. This forces customers to ship them elsewhere or pay extra to store them for extended periods. Then there are the &#8216;advanced&#8217; logs that cost extra.</p><p>Microsoft apparently only had 30 days of logs to investigate after the State Department notified them.</p><p>A 30-day retention period for a free or basic-tier Microsoft 365 customer is unsurprising. However, Microsoft's decision to limit its own log retention so severely borders on bizarre. The irony is that the US State Department couldn&#8217;t have detected the attack Microsoft missed if it had not paid a premium for logs and made very effective use of them. Meanwhile, Microsoft&#8217;s log retention was so short that they didn&#8217;t know when the attack began.</p><p>Was Microsoft a victim of its own stinginess here? Does Microsoft seriously not indulge in longer retention times for its infrastructure&#8212;the infrastructure backing the second-largest cloud service provider in the world?</p><p>The implications are odd and don&#8217;t entirely add up. On the product side, the shortest amount of time that logs hang around for the most basic tiers of M365 is 30 days by default. Nearly any more premium option&#8212;E5, Purview Audit (standard or premium)&#8212;increases log retention to at least 180 days. Log retention can be increased to as long as ten years. Why would Microsoft choose only 30 days for their internal logging? </p><p>Furthermore, Microsoft believes the attack originated from a laptop belonging to an employee at a company they acquired in 2021. They think the employee's laptop was already compromised <em>before</em> the company was acquired. </p><p>That also, unfortunately, means that there could have been more stuff compromised that Microsoft doesn't know about. Storm-0558 could still have access to systems, individual assets/identities, or the ability to generate access keys we don't know about.</p><p>The M&amp;A employee could also be a scapegoat&#8212;everything Microsoft has published concerning root cause analysis is a theory. It has no evidence linking this compromised employee's laptop to the MSA key theft.</p><h3>How Far Should Shared Responsibility Extend?</h3><p>Another point the review board makes in this report, which has been echoed by the White House, is that far too much onus is put on the customer to secure their accounts and data&#8212;the providers and CSPs should shoulder more of the work here.</p><p>Just look at Microsoft's most recent breach (Jan 2024 by Russia's "Midnight Blizzard"). Microsoft insists there were no vulnerabilities here, it was just cred stuffing, but then <a href="https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/">look at everything they recommend customers do to detect and/or prevent an attack like this</a>. Imagine reading these recommendations as a 50-person organization. Madness.</p><p>Is this reasonable to expect of the average M365 customer? What about personal accounts? Is there nothing Microsoft can do to ease this burden?</p><p>Not only did the State Department need some serious Detection Engineering skills to discover this attack, but they also needed sharp SOC analysts AND the premium audit package to get access to the necessary logs to begin with!</p><p>Figuring out how Microsoft's licensing works, understanding their products, and securing them is a complex maze that makes the defender's job an <em>utter nightmare</em>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><h2>Recommendations</h2><p>From what I can tell, everything in this report is a recommendation. Microsoft isn't required to do any of it. The recommendations are very bold but mostly seem fair to my eyes. A potential silver lining here is that this report could be used by Microsoft and its employees as a permission slip of sorts&#8212;a permission slip to shift priorities back in the direction of security a bit.</p><p>Microsoft is incentivized to focus on profits and revenue at all levels, even for the CEO. A report like this can help them give security the priority it needs and push back on expectations for more profit and growth at all costs. I'm sure there are folks at Microsoft who have been advocating for better security at every step. For those still fighting that fight, this could be their most important weapon against years of poor risk prioritization.</p><p>I'm not going to get too deep into the details here, so <a href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">start on page 17 if you want to jump straight to the recommendations [www.cisa.gov]</a></p><h3>The List&#8230;</h3><p>This isn't an exhaustive list - just the ones I found most interesting. There are 25 in total. Here are the ones that apply to Microsoft:</p><ol><li><p>Microsoft&#8217;s security culture needs to improve.</p></li><li><p>Microsoft needs to modernize its key management (LOTS of specific recommendations here, including updates to NIST standards, FedRAMP, and other industry best practices.)</p></li><li><p>Transparency and reporting breach details were lacking and unacceptable, especially for a company as large and essential as Microsoft.</p></li><li><p>Security must be prioritized, with incentives coming from the CEO and board on down. For a time, this priority needs to exceed that of innovation/new development until the worst of the security issues have been addressed.</p></li><li><p>Security must be a design requirement (wait, haven't I heard that from Microsoft itself???)</p></li><li><p>NO MORE CHARGING FOR LOGS, and provide customers a minimum of six months of logs.</p></li><li><p>More useful logging.</p></li><li><p>Rework IAM architecture to be more secure and compartmentalized - lots of pointing and hinting at Google's post-Aurora BeyondCorp transformation here.</p></li><li><p>Better M&amp;A due diligence.</p></li></ol><p>The recommendations continue with more CSP/Industry-specific ones, like:</p><ol><li><p>CISA becoming a CSP watchdog, doing annual reviews of CSPs.</p></li><li><p>NIST should update 800-53 to better account for cloud-based IAM risks.</p></li><li><p>Need for a minimum audit logging standard for cloud services.</p></li><li><p>CSPs should be early adopters of more secure identity standards and IAM/key mgmt processes.</p></li><li><p>US-based CSPs should report ALL incidents potentially involving a nation-state (and we should consider legally requiring them to do so.)</p></li><li><p>CSPs should be transparent about both what they DO know and what they DON'T know.</p></li><li><p>CSP vulnerabilities should go through CVEs and be handled like vulnerabilities (this has long not been the case, with an argument that customers don't patch CSP issues; they're patched once by the CSP for all customers - there is an argument to have here though, about other benefits of these vulns using CVE and having a presence in other vulnerability databases.)</p></li><li><p>CSPs and USGov should create an "amber alert" system for high-impact situations.</p></li><li><p>CSPs should verify victims received notifications, not just fire them off en masse.</p></li><li><p>US Gov should incentivize more data sharing between CSPs and those affected by security issues.</p></li></ol><h2>How should all this make us feel?</h2><p>We often hear about how fragile the Internet is and how common poor security practices are, even at security vendors. Every time we think, &#8220;This is it - buyers, consumers, and regulators are done with this BS,&#8221; nothing happens. Breaches keep happening, and we move on. Is the problem with us, the security professionals? Is security more important and precious to us than it is to the general public? Of course, it is - we&#8217;re focused on it and worried about it all day, every day - it&#8217;s our job.</p><p>Perhaps part of the problem is a perception of industry importance that doesn&#8217;t line up with reality.</p><p>We work in an industry that&#8217;s more than happy to publish <a href="https://www.youtube.com/watch?v=Bvps1JdYYlE">myths and lies</a>, like the indefensible fake statistic that cybercrime somehow did <a href="https://cybersecurityventures.com/cybercrime-to-cost-the-world-8-trillion-annually-in-2023/">$6 trillion in damages in 2021 and will top $10 trillion in 2025</a>. That&#8217;s difficult to reconcile, as ransomware payments recently crossed the $1 billion mark, and the FBI reported BEC scam losses in the US were $2.7 billion in 2022. Dozens of vendors happily repeat these fake stats, hoping they&#8217;ll help them sell more products.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ePtu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ePtu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png 424w, https://substackcdn.com/image/fetch/$s_!ePtu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png 848w, https://substackcdn.com/image/fetch/$s_!ePtu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png 1272w, https://substackcdn.com/image/fetch/$s_!ePtu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ePtu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png" width="427" height="422" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:422,&quot;width&quot;:427,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:75236,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ePtu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png 424w, https://substackcdn.com/image/fetch/$s_!ePtu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png 848w, https://substackcdn.com/image/fetch/$s_!ePtu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png 1272w, https://substackcdn.com/image/fetch/$s_!ePtu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3850a47b-9970-46c5-b6b2-66ec31993af9_427x422.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Not even close.</figcaption></figure></div><p>&#8220;The greatest transfer of economic wealth in history,&#8221; Steve Morgan says. Really? A <a href="https://bindinghook.com/articles-binding-edge/debunking-notpetyas-cyber-catastrophe-myth/">recent post</a> by Tom Johansmeyer, who has over 20 years of experience in the insurance industry, disagrees. Here&#8217;s his take on NotPetya, which is often pointed to as one of the most costly cyber incidents <em>ever</em>.</p><blockquote><p>NotPetya is often called the <a href="https://trumpwhitehouse.archives.gov/briefings-statements/statement-press-secretary-25/">most expensive</a> cyber catastrophe in history, having caused as much as $10 billion in economic losses at the time ($11.9 billion in 2024 at an annual inflation rate of 3%). That may seem monumental&#8212;-and by cyberattack standards it is&#8212;-but as catastrophes go, that&#8217;s a pretty small price tag.</p></blockquote><p>Spoiler - Tom concludes that NotPetya isn&#8217;t even the 2nd worst &#8220;cyber-catastrophe&#8221;. The greatest transfer of economic wealth in history probably has something to do with student loans.</p><p>The point here isn&#8217;t that cybersecurity isn&#8217;t important - it absolutely is! It&#8217;s just not <em>the most important thing ever</em>. Some companies and individuals in this industry desperately want it to be, and that&#8217;s causing problems. Daniel Miessler recently coined an interesting term that explains why it&#8217;s often difficult to move the cybersecurity baseline: the <a href="https://danielmiessler.com/p/efficient-security-principle">Efficient Security Principle</a>.</p><p>The Efficient Security Principle explains why, despite this incident, the US Government still uses Microsoft 365 and other Microsoft products. It explains why, despite dozens of vulnerabilities in Azure and incidents impacting Microsoft 365, it is still one of the most dominant collaboration, communication, and productivity platforms available. Customers' value from these products and services exceeds the actual or perceived risk related to Microsoft&#8217;s breaches and mistakes.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/a-meta-review-of-the-summer-2023?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/a-meta-review-of-the-summer-2023?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>Conclusion</h2><p>Hopefully, some of the points made in this report help remove some tech debt for not just Microsoft but the industry as a whole. It&#8217;s frustrating that it often takes incidents like this to justify improving security, but that&#8217;s nothing unique to our industry. Efforts to improve safety and security often look unnecessary or even paranoid until there&#8217;s an incident demonstrating the need for them.</p><p>It's a great reminder that there really is no such thing as "best practices," only "current practices" that we should always strive to improve.</p>]]></content:encoded></item><item><title><![CDATA[AI has Flown the Coop...]]></title><description><![CDATA[... But Not for the U.S. Government]]></description><link>https://www.thecyberwhy.com/p/ai-has-flown-the-coop</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/ai-has-flown-the-coop</guid><dc:creator><![CDATA[Katie Teitler-Santullo]]></dc:creator><pubDate>Tue, 09 Apr 2024 16:05:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kSSH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In a series of prohibition-based decisions, the U.S. House of Representatives has issued a ban on the use of Microsoft Copilot, Microsoft&#8217;s AI chatbot, on all House-issued devices. The generative AI tool will also be blocked on all managed Windows devices. The cited reason for this decision: Data privacy and national security concerns. The announcement was handed down by Catherine Szpinder, the House of Representatives&#8217; Chief Administrative Officer (CAO).</p><p>According to reports, the primary concern is that staffers&#8217; use of Copilot and similar large language model (LLM) services will result in leaks of sensitive information, particularly from classified documents. Considering current events, trying to keep classified information under wraps is not a bad idea.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you like tech and cyber news, SUBSCRIBE! You&#8217;d be a fool to ignore this free content.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>While the ban aims to safeguard against potential data breaches and ensure the protection of government-related data, information and document leaks have been a problem for the U.S. government since long before AI was anything but a fictional movie plot.&nbsp;</p><p>The ban, therefore, is simply a stopgap measure. For one thing, LLMs may facilitate data and information leakage, but they don&#8217;t precipitate it. Second, although I don&#8217;t have access to such data, I love to make inconsequential bets, and in that vein, I&#8217;d be willing to bet that 99+% of staffers own and operate non-work-issued devices. With their personal devices, staffers can take whatever information they are privy to and use it as inputs to Copilot, ChatGPT, Gemini, LLaMA, and the like.</p><p>So, even though the electronic transfer and storage of work documents and information should be relegated to approved and managed devices, information will be transferred/shared outside of protocols much in the same way other &#8220;workarounds&#8221; have occurred, and for many of the same reasons.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kSSH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kSSH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!kSSH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!kSSH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!kSSH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kSSH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp" width="374" height="374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/adff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:374,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Create a lifelike image featuring the letters 'AI', designed in a sleek, modern style, appearing to fly out of an old, rustic chicken coop. The scene is set in the countryside during the early morning, with the first rays of sunlight casting a warm glow over the scene. The 'AI' letters are animated and personified, with tiny wings, giving them a lively character as they escape into the open air. The background is filled with a scenic landscape of rolling hills, a few trees, and a clear blue sky, providing a contrast between the old world charm of the coop and the futuristic implication of AI.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Create a lifelike image featuring the letters 'AI', designed in a sleek, modern style, appearing to fly out of an old, rustic chicken coop. The scene is set in the countryside during the early morning, with the first rays of sunlight casting a warm glow over the scene. The 'AI' letters are animated and personified, with tiny wings, giving them a lively character as they escape into the open air. The background is filled with a scenic landscape of rolling hills, a few trees, and a clear blue sky, providing a contrast between the old world charm of the coop and the futuristic implication of AI." title="Create a lifelike image featuring the letters 'AI', designed in a sleek, modern style, appearing to fly out of an old, rustic chicken coop. The scene is set in the countryside during the early morning, with the first rays of sunlight casting a warm glow over the scene. The 'AI' letters are animated and personified, with tiny wings, giving them a lively character as they escape into the open air. The background is filled with a scenic landscape of rolling hills, a few trees, and a clear blue sky, providing a contrast between the old world charm of the coop and the futuristic implication of AI." srcset="https://substackcdn.com/image/fetch/$s_!kSSH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!kSSH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!kSSH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!kSSH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadff900f-2dbb-450b-b6a9-5b4e2e50bde6_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">AI has &#8220;flown the coop&#8221; - rendering from ChatGPT.</figcaption></figure></div><h2><strong>Governing AI</strong></h2><p>For the record, many private companies are also attempting to ban or apply stricter governance to using LLMs and AI. At a minimum, smart companies are issuing acceptable use policies for the technology. No one wants their data leaked. Many companies don&#8217;t want their data used for training purposes either. Regarding government and national secrets, the stakes are even higher; data protection is paramount. Given the history of government data leaks &#8212; and the fact that state information is so highly coveted &#8212; it's no wonder Congress is wary.</p><p>All of this being said, government officials are aware that LLMs like Copilot have already achieved liftoff, meaning there&#8217;s no way they can completely stop it from propagating throughout their user base. What&#8217;s more, trying to do so would be both an exercise in futility and pure hypocrisy; in October 2023 the Biden Administration issued an executive order explicitly addressing the <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/">secure development and use of AI</a>. Congress must also be aware that adversarial governments and cyber criminals are taking full advantage of every technological advancement they can get their hands on. If the U.S. were to ignore the advantages AI and LLMs offer, it would be willful ignorance.&nbsp;</p><p>Vendors, too, have recognized that ignoring the needs and requests of the U.S. government is a mistake. In this case, Microsoft has acknowledged the government&#8217;s concerns and has announced that it will start to <a href="https://learn.microsoft.com/en-us/microsoft-copilot-studio/requirements-licensing-gcc">build a government-focused edition of Copilot</a> that incorporates enhanced security controls and compliance requirements (one wonders why the rest of us aren&#8217;t afforded such protections, but I digress). Szpindor&#8217;s office has not committed to the presumptive tool&#8217;s use when it becomes available, but it is a good strategic decision for Microsoft to head down that runway.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JF2l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JF2l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!JF2l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!JF2l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!JF2l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JF2l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp" width="394" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:394,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Create a lifelike image depicting a scene on the house floor of the US government, where a person is utilizing AI technology, symbolized by a sleek, modern device with a generic tech logo inspired by innovation. This device displays a glowing, abstract symbol that evokes the essence of AI, without depicting any specific real-world logos. The setting is formal, capturing the grandeur and solemnity of the legislative environment. The individual, dressed in professional attire, is focused and engaged, illustrating the integration of futuristic technology in the process of governance. The background includes the iconic elements of the house floor, such as desks, flags, and other governmental symbols, conveying a sense of authority and tradition.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Create a lifelike image depicting a scene on the house floor of the US government, where a person is utilizing AI technology, symbolized by a sleek, modern device with a generic tech logo inspired by innovation. This device displays a glowing, abstract symbol that evokes the essence of AI, without depicting any specific real-world logos. The setting is formal, capturing the grandeur and solemnity of the legislative environment. The individual, dressed in professional attire, is focused and engaged, illustrating the integration of futuristic technology in the process of governance. The background includes the iconic elements of the house floor, such as desks, flags, and other governmental symbols, conveying a sense of authority and tradition." title="Create a lifelike image depicting a scene on the house floor of the US government, where a person is utilizing AI technology, symbolized by a sleek, modern device with a generic tech logo inspired by innovation. This device displays a glowing, abstract symbol that evokes the essence of AI, without depicting any specific real-world logos. The setting is formal, capturing the grandeur and solemnity of the legislative environment. The individual, dressed in professional attire, is focused and engaged, illustrating the integration of futuristic technology in the process of governance. The background includes the iconic elements of the house floor, such as desks, flags, and other governmental symbols, conveying a sense of authority and tradition." srcset="https://substackcdn.com/image/fetch/$s_!JF2l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!JF2l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!JF2l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!JF2l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc00d65dd-c881-4fd7-9829-f034d7f53f2e_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">ChatGPT rendering of AI usage on the floor of the house of representatives</figcaption></figure></div><h2><strong>The Wrap Up</strong></h2><p>Whether or not the House allows Copilot &#8212; or any other generative AI tool &#8212; on government-owned devices or systems is almost irrelevant. Some of you might argue with me and say, &#8220;<em>But AI is the future of all technology!</em>&#8221; And you are probably right. But at the end of the day, most concerns about AI are really about <em><strong>data</strong></em> security and privacy; we&#8217;re just applying data security concepts to a different model. At the heart of AI (and all its subcategories) is data &#8212;&nbsp;data repositories, data algorithms, data access controls, etc. Historical principles apply. What this means is that developers do not have to reinvent the wheel when it comes to AI security. It might feel like they do, but really &#8212; they don&#8217;t. Developers can take years of lessons learned and mold them for AI-based tools. If you were to read <a href="https://thereformedanalyst.substack.com/p/is-ai-the-next-zero-trust">cybersecurity funding reports</a>, it would be easy to think this is a new category of security controls. It&#8217;s actually just an evolution (though, if you are a vendor trying to raise venture capital, sprinkling &#8220;AI&#8221; into your pitch materials isn&#8217;t a bad way to go).</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/ai-has-flown-the-coop?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/ai-has-flown-the-coop?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>The moral of the story may be this: The House of Representatives is banning a generative AI tool because of concerns about data security and privacy. Though the focus is on the &#8220;AI&#8221; part, it really comes down to the data: how it&#8217;s generated, how it&#8217;s used, how it&#8217;s processed, how it&#8217;s stored, where it&#8217;s stored, who has access to it... There is little new in this. AI is slightly different in that developers have to also consider the security of the algorithms used to generate results. But even this isn&#8217;t a totally new security concept. Which is all good news.&nbsp;&nbsp;</p><p>Except when a powerful entity, in this case, the House of Representatives, calls out a vendor for not developing to the highest security standards. If Microsoft can develop a hardened version of Copilot, it should. Perhaps that was the goal all along &#8212; to improve Copilot&#8217;s security as new versions are built. Or maybe the goal was always revenue first; freemium versions aren&#8217;t afforded the same level of security as paid versions. I get it. We live in a capitalist society.&nbsp;</p><p>However, when it comes to LLMs, there are implications beyond commercialization that builders and buyers have to think about. Kudos to the House for stepping forward and demanding better. Good luck to them, though, on keeping Copilot out of the hands of staffers entirely.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Don&#8217;t forget to subscribe. If you fail, many puppies may die! Don&#8217;t kill puppies.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What Most Companies Get Wrong About “Diversity, Equity & Inclusion”]]></title><description><![CDATA[Spoiler alert - it's in the wrong order!]]></description><link>https://www.thecyberwhy.com/p/what-most-companies-get-wrong-about</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/what-most-companies-get-wrong-about</guid><dc:creator><![CDATA[Katie Teitler-Santullo]]></dc:creator><pubDate>Tue, 19 Mar 2024 16:06:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Diversity, Equity, and Inclusion (DE&amp;I) programs have become controversial. On the surface, they shouldn&#8217;t be remotely controversial. Why would anyone want to surround themselves with an echo chamber, treat others unequally, or exclude individuals or groups of people? I can think of a million reasons. Only a few of them are not mean spirited, self-serving, or solipsistic.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>&nbsp;</em></p><p><em>For this article, I spoke with Lynn Dohm, Executive Director of <a href="https://www.wicys.org/">Women in CyberSecurity (WiCyS)</a> (pronounced &#8220;wee-sis&#8221;), to look at how organizations and individuals can turn DE&amp;I programs into a force for good.</em></p><p>A few weeks back, Adrian and Tyler were discussing the <a href="https://www.rezvanimotors.com/rezvani-vengeance">Rezvani Vengeance</a> supercar during the <a href="https://www.scmagazine.com/podcast-show/enterprise-security-weekly">Enterprise Security Weekly (ESW) podcast</a>. The manufacturer offers all kinds of crazy add-on features, including military and (physical) security packages. Not being a car fanatic,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> I didn&#8217;t have much to add. Until they started talking about gas masks, electrified door handles, and pepper spray defense. While Tyler and Adrian were musing on how drivers could use these features maliciously &#8212;&nbsp;like to spray jaywalking pedestrians &#8212;&nbsp;I was thinking, &#8220;Never gonna buy it, but this isn&#8217;t the worst idea for anti-assault scenarios.&#8221;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe now to get The Cyber Why content direct to your mailbox!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>I raised this point, and the two of them (uncharacteristically) were silent for a moment. It hadn&#8217;t occurred to them that the functionality could be for the protection of the <em>driver &#8212; </em>to help her defend off an attacker if one were to break into her car. They had their cyber hacker hats on and were thinking about it from a &#8220;how much ill-intentioned harm could be done to unsuspecting individuals&#8221; point of view. But as soon as I said it, they both realized that the use cases for pepper spray, gas masks, and glow-in-the-dark car door handles were diverse.</p><p>They might not have ever thought of it without the female perspective.</p><h2><strong>Case in point</strong></h2><p>Think of the new features and/or marketing opportunities of adding diverse points of view to business conversations! Diverse perspectives add potential, not limit it. And that&#8217;s what people in favor of DE&amp;I programs have been saying for years.</p><p>Individuals <em>not</em> in favor of DE&amp;I programs have been arguing that they can go too far &#8212; the programs end up being a checkbox activity that can exclude qualified people from positions solely because the person doesn&#8217;t tick off the &#8220;diversity&#8221; box. This is a no-less-valid argument.</p><p>I don&#8217;t want to get into social or political arguments here. Still, the numbers show that cybersecurity isn&#8217;t the most diverse industry on the planet. Just go to any cybersecurity conference &#8212; especially the more technical ones &#8212; and you&#8217;ll see what I mean.</p><p>Now, I&#8217;ve been an advocate for women in cyber for a long time, so my thoughts and feelings on this topic are no secret.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> However, anytime I&#8217;ve written or spoken about increasing the number of women in security, it&#8217;s been with a focus on women&#8217;s strengths and expertise rather than fulfilling a quota. And frankly, if we could take away the shoehorning of people (women or any other underrepresented group) into positions, I think more security practitioners might agree that diversity is a good thing. <em>Find qualified people who also have diverse attributes.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share The Cyber Why&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share The Cyber Why</span></a></p><h2><strong>Enter: A new voice</strong></h2><p>In my mind, I&#8217;ve been a positive advocate for DE&amp;I in the workplace. That is until I met <a href="https://www.linkedin.com/in/lynndohm/">Lynn Dohm</a>, Executive Director of Women in CyberSecurity (WiCyS). My friend <a href="https://www.linkedin.com/in/stevemoscarelli/">Steve Moscarelli</a> had invited me to speak at an ISSA event in Chicago, and Lynn was the first speaker. Her talk was amazing &#8212;&nbsp;I was a little nervous to get on stage after her &#8212; and she opened my eyes to a number of things. Mainly, that focusing on diversity before inclusion is a mistake. Yes, the acronym is ubiquitous so most people start at &#8220;diversity.&#8221; The problem is that they often also stop at &#8220;diversity.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iWDX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iWDX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png 424w, https://substackcdn.com/image/fetch/$s_!iWDX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png 848w, https://substackcdn.com/image/fetch/$s_!iWDX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png 1272w, https://substackcdn.com/image/fetch/$s_!iWDX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iWDX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png" width="323" height="322" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:322,&quot;width&quot;:323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Lynn Dohm | SecureWorld&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Lynn Dohm | SecureWorld" title="Lynn Dohm | SecureWorld" srcset="https://substackcdn.com/image/fetch/$s_!iWDX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png 424w, https://substackcdn.com/image/fetch/$s_!iWDX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png 848w, https://substackcdn.com/image/fetch/$s_!iWDX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png 1272w, https://substackcdn.com/image/fetch/$s_!iWDX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1dbe052-185e-4039-8aeb-d83da8bb0a53_323x322.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Lynn Dohm - Executive Director of Women in Cybersecurity (WiCyS)</figcaption></figure></div><p>To get back to my earlier anecdote about ESW, if Adrian and Tyler had heard my comments about the Vengeance and thought, &#8220;OK, fine. That&#8217;s not the point, though,&#8221; my differing point of view wouldn&#8217;t have mattered. At all. You can have plenty of diversity in the room, but if there&#8217;s no <em>inclusion</em>, none of it matters.&nbsp;</p><p>&#8220;Diversity&#8221; may be the focal point of hiring conversations, but it&#8217;s less common for people to leave workplaces because of a lack of diversity. Exclusion and absence of opportunity are the prevailing reasons for people &#8212; especially people in underrepresented groups &#8212; to change jobs or leave the industry altogether.&nbsp;</p><p>I wanted to explore the idea of inclusion with Lynn a bit more. She&#8217;s been a powerful force for change in the industry, so what could I learn from her?&nbsp;</p><p><em><strong>Katie</strong></em>: From your experience and research, what do people get wrong about DE&amp;I programs?</p><p><em><strong>Lynn</strong></em>: Everyone puts &#8220;diversity&#8221; in front of &#8220;inclusion.&#8221; And it&#8217;s understandable, but they&#8217;re very different. &#8220;Inclusion&#8221; is about wanting everyone to be active contributors; when you create inclusiveness, diversity comes. When you start putting the emphasis on inclusion, diversity will thrive. Because at that point, you&#8217;re empowering people. You&#8217;re giving them opportunities. But you have to follow through. You can&#8217;t just ask for ideas and opinions and then dismiss them. That will backfire, and people will feel more excluded than ever.</p><p>Inclusion is a feeling, and you only feel excluded when it&#8217;s happening. Tracking diversity is easier than inclusion &#8212; that&#8217;s why it&#8217;s used for measurement.&nbsp;</p><p>We have to get away from diversity as a &#8220;feel good&#8221; metric. So many people don&#8217;t understand what inclusion means, but in order to take responsibility, we have to define it. We have to explain what it looks like &#8212; without being confrontational or dismissive. The sad fact is that people who are being excluded from conversations and opportunities don&#8217;t speak up. It&#8217;s hard for them to address and easier to leave. And then we&#8217;re left with the echo chambers that have existed for years.</p><p><em><strong>Katie</strong></em>: All of that is good, but we&#8217;re only making slow progress, and now we have people who view DE&amp;I programs as negative. The initial intentions of these programs are getting buried because of poor execution. What do we do?</p><p><em><strong>Lynn</strong></em>: Allyship. We have to focus on allyship and helping others. Speak up for others when they&#8217;re being excluded. It is so hard to speak up for yourself when you&#8217;re the one who is being excluded, especially if it&#8217;s constant or consistent. Everyone wants someone to support them when they&#8217;re not being included or treated unfairly. When you see and hear exclusion in the workplace, be that advocate, be that educator. Offer time, effort, and help.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><p>Many of us have been in these situations, so it&#8217;s easy to spot. But only if you&#8217;re paying attention. It&#8217;s easy to look the other way. That's why allyship is so hard sometimes &#8212; it's less awkward to ignore a bad situation..&nbsp;</p><p>Some of the most well-intentioned people have exclusionary patterns and traditions ingrained in their behaviors. The best way to approach a conversation about inclusion is with empathy and understanding. Be active in the conversation, but without calling someone out. That will only lead to defensiveness and ultimately, inaction on that person&#8217;s part.</p><p><em><strong>Katie</strong></em>: How would you approach a conversation with someone who is excluding someone or a group of people in the workplace?</p><p><em><strong>Lynn</strong></em>: First and foremost, build your own awareness skills. If you don&#8217;t come at inclusion from a place of understanding, we&#8217;re going to end up with more aggressive individuals than when we started.&nbsp;</p><p>I&#8217;ve found that the most successful approach to conversations about exclusion starts by letting your natural curiosity be the driver. If you can stay calm and rational, it&#8217;s more likely the person you&#8217;re approaching will, too. Then, repeat back parts of a conversation to the person. For example, &#8220;I am trying to gain a better understanding of something that happened yesterday. In our team meeting, you put Tim, Bob, and Joe on a project but said that Sara won&#8217;t participate since she has to leave the office at 4 pm to pick up her kids. Can you help me understand why this excludes her from the project?&#8221; Initiate a conversation that has the person repeating back what they said so they can hear it in a different key.&nbsp; </p><p><em><strong>Katie</strong></em>: Changing people&#8217;s minds is <em>hard</em>! A lot of people won&#8217;t ever try.</p><p><em><strong>Lynn</strong></em>: True, but the only way to start a shift is by being an ally, by speaking up. It&#8217;s hard, but it will pay off.</p><p>If you&#8217;re not ready to start those hard conversations, there are some things you can do to limit your exposure to exclusionary behavior in your workplace. When looking for a new job, look at the composition of the executive team and the board of directors. If the &#8220;leadership&#8221; webpage is homogenous, it&#8217;s likely their thoughts and actions are, too. This is not a failsafe &#8212; it will only give you visual clues about diversity, not inclusion,&nbsp;but it&#8217;s a start.&nbsp;</p><p><em><strong>Katie</strong></em>: What is the most surprising thing about exclusion?</p><p><em><strong>Lynn</strong></em>: WiCyS partnered with <a href="https://www.aleria.tech/">Aleria</a> for the first-ever study on the state of inclusion for women in cybersecurity. From that work, we know that 57% of women in cyber say that the exclusion they experience shows itself in the form of a lack of career growth and advancement. Women hit the glass ceiling in <em><strong>year six </strong></em>of<em> </em>their careers! This is while men continue to have greater opportunities as they get older and gain more experience. Women feel they have to change jobs to advance, and that harms not only women but the entire industry.</p><p><em><strong>Katie</strong></em>: There are some researched benefits to building an inclusive workforce. Can you share a few?</p><p><em><strong>Lynn</strong></em>: Absolutely! Before you can get to benefits, you have to focus on trust, respect, and a sense of belonging. Now, if these seem like fuzzy measures, there is plenty of research to suggest that giving employees and coworkers trust, respect, and a sense of belonging results in increases in productivity and even <a href="https://www.accenture.com/content/dam/accenture/final/a-com-migration/thought-leadership-assets/accenture-getting-to-equal-2020-research-report.pdf">profits</a>. Practicing inclusion is the right thing to do. But if you&#8217;re in charge of a company or a business unit and your goals are more bottom-line-focused, the proof is there too.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/what-most-companies-get-wrong-about?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/what-most-companies-get-wrong-about?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Fun fact: One of The Reformed Analyst&#8217;s favorite words is &#8220;solipsistic.&#8221; Other faves include &#8220;ambiguity&#8221; and &#8220;pamplemousse.&#8221;</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>My level of interest in cars is a &#8220;1.&#8221; A car gets me places. Hopefully safely and without using a lot of gas.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p><a href="https://medium.com/code-like-a-girl/where-are-all-my-ladies-in-cybersecurity-e3ac51d8ac73">https://medium.com/code-like-a-girl/where-are-all-my-ladies-in-cybersecurity-e3ac51d8ac73</a></p><p><a href="https://www.threatq.com/what-four-women-cyber-security-executive-say-about-leadership/">https://www.threatq.com/what-four-women-cyber-security-executive-say-about-leadership/</a></p><p><a href="https://www.tripwire.com/state-of-security/women-information-security-katherine-teitler">https://www.tripwire.com/state-of-security/women-information-security-katherine-teitler</a></p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Water water everywhere, but not a drop to drink]]></title><description><![CDATA[How should we feel about the milestone of 10,000+ cybersecurity products?]]></description><link>https://www.thecyberwhy.com/p/water-water-everywhere-but-not-a</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/water-water-everywhere-but-not-a</guid><dc:creator><![CDATA[Adrian Sanabria]]></dc:creator><pubDate>Thu, 14 Mar 2024 16:29:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Richard Stiennon&quot;,&quot;id&quot;:6189296,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d5f22f67-2387-44cb-96d4-2d10e3e6823b_48x48.jpeg&quot;,&quot;uuid&quot;:&quot;4a010d17-f0e0-4f5f-9e96-8a720eadad0f&quot;}" data-component-name="MentionToDOM"></span> recently posted that his product database has surpassed <a href="https://stiennon.substack.com/p/10000-cybersecurity-products">10,000 Cybersecurity Products</a>.</p><p>Tracking and keeping up with all of the vendors and products in the cybersecurity market is a remarkable achievement, and I applaud Richard&#8217;s efforts here. It&#8217;s a very valuable thing that he&#8217;s built. It&#8217;s a good opportunity to dig into this milestone and what I think it means for the industry.</p><p>I <em>love</em> tracking cybersecurity market trends and talking to founders about what they&#8217;re building on the bleeding edge. I spend a lot of time on the <a href="https://www.scmagazine.com/podcast-show/enterprise-security-weekly">Enterprise Security Weekly podcast </a>and here on The Cyber Why discussing security startups. I talk and write about startups from the moment they come out of stealth through every funding round and finally exit to larger vendors and become part of a larger platform or suite of products. </p><p>It&#8217;s rare, however, that I see something that really moves the needle, so I try to highlight it when it happens.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!R36s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!R36s!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!R36s!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!R36s!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!R36s!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!R36s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp" width="476" height="476" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:476,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A line art cartoon featuring a cybersecurity professional humorously overwhelmed and buried under a massive, exaggerated pile of 10000 different cybersecurity products. The image should capture the professional's playful distress, with just the top of their head and eyes visible among the towering heap of gadgets, boxes, and screens, each labeled with technical and imaginative product names. The style should be light, funny, and engaging, emphasizing the absurdity of the situation.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A line art cartoon featuring a cybersecurity professional humorously overwhelmed and buried under a massive, exaggerated pile of 10000 different cybersecurity products. The image should capture the professional's playful distress, with just the top of their head and eyes visible among the towering heap of gadgets, boxes, and screens, each labeled with technical and imaginative product names. The style should be light, funny, and engaging, emphasizing the absurdity of the situation." title="A line art cartoon featuring a cybersecurity professional humorously overwhelmed and buried under a massive, exaggerated pile of 10000 different cybersecurity products. The image should capture the professional's playful distress, with just the top of their head and eyes visible among the towering heap of gadgets, boxes, and screens, each labeled with technical and imaginative product names. The style should be light, funny, and engaging, emphasizing the absurdity of the situation." srcset="https://substackcdn.com/image/fetch/$s_!R36s!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!R36s!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!R36s!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!R36s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0554b5bc-54d7-4121-ae73-76d7e621b6de_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><h1>Drowning in Solutions to Our Problems</h1><p>While the constant flow of new startups and funds through the cybersecurity market provides me with a never-ending source of news to write and podcast about, I think it provides less value to practitioners. Ten <em>thousand</em> products. Most practitioners have never heard of these vendors or products, and never will. It&#8217;s a mark of the age we live in, where defenders got all the funds they asked for, products they asked for, and people they asked for, but still get breached.</p><p>We&#8217;re positively <em>drowning</em> in resources but still struggling to get the job done. </p><p>I&#8217;ve devoted a large chunk of my career trying to understand this dilemma, and this research goes back to an epiphany I had in 2011, shortly before becoming an industry analyst. I was working for a mid-sized enterprise, building their security program. While going through their current tooling, I found that their vulnerability management product had identified 250,000 critical vulnerabilities.</p><p>How was this possible? How could a company with 2,000 employees and less than 3,000 assets have a <em>quarter million</em> critical vulnerabilities? The vulnerability management tool couldn&#8217;t answer this question, so I went in search of a tool that could. I discovered a company named Risk I/O (later rebranded as Kenna Security and acquired by Cisco), whose whole value proposition was to make sense of the mess that vulnerability management products produced.</p><p>It was already concerning that the state of patch management was so bad that we needed a tool to tell us when patches were missing (I know vuln mgmt is a lot more than just updating software, but that was the bulk of it in this scenario). It was much more concerning that we now needed a third tier of products to clean up the mess that the lower tier had produced. A few years later, we&#8217;d see &#8220;next-gen&#8221; anti-virus offerings create a similar dynamic, where most organizations resigned themselves to running two AV solutions on every endpoint, until the new technology caught up enough to replace the old.</p><h1>Everything Fatigue</h1><p>The term &#8220;fatigue&#8221; is now commonly used to describe the situation cybersecurity products have created. Early in my career, I was tasked with implementing my company&#8217;s first SIEM. We were one of the world&#8217;s largest payment processors, and the upcoming PCI 1.0 deadline made this an important project. My first instinct was a common one: shove as many events from as many possible sources into the SIEM. I wanted every bit of enterprise visibility I could get. </p><p>One month in, I had over 1700 devices pumping 100 million events into our SIEM daily. It was an absolute nightmare. Every day, sources would stop sending us events and we&#8217;d have to investigate. Managing storage was a daily struggle, as PCI had retention requirements we had to meet. I had built this SIEM from the perspective of &#8220;what COULD this SIEM do for us&#8221;, when the goal I should have set should have sounded more like, &#8220;what SHOULD this SIEM do for us&#8221;. We could barely keep the thing running - trying to do anything useful with it was challenging.</p><p>Once IT realized that we had built this massive system of record, the security team was tasked with determining root-cause analysis after <em>every</em> IT outage. Due to the SIEM&#8217;s architecture, database technology, and the amount of data we were constantly pumping into it, even the most basic queries could take hours to complete. Getting any cybersecurity value out of our SIEM seemed an impossible task, even with nearly 5 FTEs largely devoted to managing and using it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/water-water-everywhere-but-not-a?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/water-water-everywhere-but-not-a?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h1>Function, Not Innovation</h1><p>My SIEM story is 20 years old, and my vulnerability management story is 13 years old, but the cybersecurity industry is still struggling with similar problems today. Security teams are fatigued by the very products proposed to solve their problems. So we sell more products to solve the problems created by other security products. Meanwhile, breaches are at a record high, and most ransomware attacks resemble mediocre penetration tests.</p><p>Throughout my career, I&#8217;ve consistently encountered buggy, poorly designed security products that don&#8217;t come close to achieving their claims. I&#8217;ve encountered a shocking number of products that simply don&#8217;t work at all and only provide the <em>appearance</em> of function and value. Enough to fool practitioners juggling too many products, but not those with the time to evaluate a product properly. On the inaugural episode of<a href="https://www.thecyberwhy.com/podcast"> The Cyber Why podcast</a>, I mention that Palo Alto doesn&#8217;t need best-of-breed products to win with their platform approach - they just need products that <em>work</em>, and they&#8217;ll beat most of the competition by making purchasing painless.</p><p>So, that&#8217;s my take on the current state of a cybersecurity market peddling over 10,000 products. So many products, we need a tool like Richard&#8217;s to help alleviate <em><strong>shopping fatigue</strong></em>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!APBg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!APBg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!APBg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!APBg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!APBg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!APBg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp" width="464" height="464" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:464,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A line art cartoon depicting the same cybersecurity professional from before, now humorously using a large piece of construction machinery to dig themselves out from the overwhelming pile of cybersecurity products. The image should emphasize the absurdity of the situation, showing the professional in the driver's seat of an exaggeratedly large excavator or similar construction vehicle, with a big smile on their face. The machinery is scooping up gadgets, boxes, and screens, illustrating the professional's creative solution to manage the deluge of products. The style should remain light, funny, and engaging, capturing the playful spirit of overcoming challenges in a cybersecurity context.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A line art cartoon depicting the same cybersecurity professional from before, now humorously using a large piece of construction machinery to dig themselves out from the overwhelming pile of cybersecurity products. The image should emphasize the absurdity of the situation, showing the professional in the driver's seat of an exaggeratedly large excavator or similar construction vehicle, with a big smile on their face. The machinery is scooping up gadgets, boxes, and screens, illustrating the professional's creative solution to manage the deluge of products. The style should remain light, funny, and engaging, capturing the playful spirit of overcoming challenges in a cybersecurity context." title="A line art cartoon depicting the same cybersecurity professional from before, now humorously using a large piece of construction machinery to dig themselves out from the overwhelming pile of cybersecurity products. The image should emphasize the absurdity of the situation, showing the professional in the driver's seat of an exaggeratedly large excavator or similar construction vehicle, with a big smile on their face. The machinery is scooping up gadgets, boxes, and screens, illustrating the professional's creative solution to manage the deluge of products. The style should remain light, funny, and engaging, capturing the playful spirit of overcoming challenges in a cybersecurity context." srcset="https://substackcdn.com/image/fetch/$s_!APBg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!APBg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!APBg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!APBg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9afcb88b-cf9d-4a16-8dc5-3d3859bc14bb_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/water-water-everywhere-but-not-a/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/water-water-everywhere-but-not-a/comments"><span>Leave a comment</span></a></p><h1>Less Noise, More Boring</h1><p>With the exception of perhaps nation-states, most threat actors aren&#8217;t innovating, because they don&#8217;t really need to. In fact, the data we have suggests that cybercriminals have more easy targets than they have time or resources to take advantage of. Initial access brokers aren&#8217;t running out of product to sell. After every breach post-mortem I work through, the lessons are the same: staff wasn&#8217;t trained, security products weren&#8217;t configured correctly, and security processes were either missing, untested, ineffective or all of the above.</p><p>There are a lot of parallels between the health &amp; fitness industry and cybersecurity. Both industries generate a constant barrage of &#8220;innovations&#8221; and things that sound like shortcuts. Some folks will buy anything to avoid the old, tired, reliable advice: diet and exercise. Yeah, you got that Whoop 4.0 strapped to your wrist, but it didn&#8217;t stop you from eating 2,000 calories of Cool Ranch Doritos during the Oscars last night, did it?</p><p>The path forward is clear:</p><ol><li><p><strong>Focus on nailing the fundamentals, not chasing the latest &#8220;innovation&#8221; in security.</strong> The constant process of chasing, trying new products, and ripping/replacing is disruptive and will contribute to security failures (particularly if the products, processes, and people you already have aren&#8217;t effective!)</p></li><li><p><strong>Constantly test the efficacy of your products, people, and processes.</strong> One pen test a year isn&#8217;t often enough. Practice like a sports team.</p></li><li><p><strong>Talk to the folks who don&#8217;t seem to have their hair on fire all the time - you&#8217;ll get good advice and product recommendations.</strong> There are some products out there that are real gems. When these folks move to a new company, there&#8217;s a short list of &#8220;evergreen&#8221; products they&#8217;ll put in place every time. Buy and implement those, and ignore most of the rest of the noise in the market.</p></li><li><p><strong>Make sure your product overhead to headcount ratio makes sense so you can get the most out of the products you already have.</strong> What&#8217;s the right number? I don&#8217;t know, but five products per FTE is probably too much. Some products need more attention than others, so it&#8217;s hard to nail down a number for every org and scenario.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9tmW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9tmW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!9tmW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!9tmW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!9tmW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9tmW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp" width="430" height="430" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:430,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A line art cartoon showing the cybersecurity professional from the previous images, now sitting at his desk with a big smile on his face, symbolizing his victory over the cyber product sprawl. He is working on a small, manageable number of products, representing his successful navigation and control over the multitude of tools. The image should convey a sense of satisfaction and accomplishment, with the professional looking relaxed and content as he focuses on his work. The scene should be light and funny, capturing the idea of triumph in a playful manner, with the desk tidy and the workspace organized, reflecting the professional's mastery over the chaos.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A line art cartoon showing the cybersecurity professional from the previous images, now sitting at his desk with a big smile on his face, symbolizing his victory over the cyber product sprawl. He is working on a small, manageable number of products, representing his successful navigation and control over the multitude of tools. The image should convey a sense of satisfaction and accomplishment, with the professional looking relaxed and content as he focuses on his work. The scene should be light and funny, capturing the idea of triumph in a playful manner, with the desk tidy and the workspace organized, reflecting the professional's mastery over the chaos." title="A line art cartoon showing the cybersecurity professional from the previous images, now sitting at his desk with a big smile on his face, symbolizing his victory over the cyber product sprawl. He is working on a small, manageable number of products, representing his successful navigation and control over the multitude of tools. The image should convey a sense of satisfaction and accomplishment, with the professional looking relaxed and content as he focuses on his work. The scene should be light and funny, capturing the idea of triumph in a playful manner, with the desk tidy and the workspace organized, reflecting the professional's mastery over the chaos." srcset="https://substackcdn.com/image/fetch/$s_!9tmW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!9tmW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!9tmW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!9tmW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c8faebe-4d2d-4307-9f55-8c7687c02f87_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There isn&#8217;t a finish line, but you&#8217;ll know when you&#8217;ve arrived at security enlightenment. You&#8217;ll still have the same boring routines, but incidents won&#8217;t rattle the team or burn out employees. You&#8217;ll return to normal from incidents more quickly. You&#8217;ll sweat less in management/board meetings when presenting metrics and updates. Changes to the security program and its processes will be smaller and more iterative.</p><p>Before cybersecurity enlightenment: chop wood, carry water.</p><p>After cybersecurity enlightenment: chop wood, carry water.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you like this piece, please subscribe to The Cyber Why. Subs keep us going!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Microsegmentation Finally Gets Its Day]]></title><description><![CDATA[... with new guidance from the NSA.]]></description><link>https://www.thecyberwhy.com/p/microsegmentation-finally-gets-its</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/microsegmentation-finally-gets-its</guid><dc:creator><![CDATA[Katie Teitler-Santullo]]></dc:creator><pubDate>Tue, 12 Mar 2024 14:10:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7e49840d-e0cb-4471-a3f9-3e53e25fea0d_304x166.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>The National Security Agency (NSA) has long advocated for a zero trust approach to cybersecurity. The new guidance, released in early March 2024, details how organizations can mature their security programs via the &#8220;network and environment&#8221; pillar, one of the seven pillars that comprise the NSA&#8217;s zero trust model.</em></p><p><em>One of the key aspects highlighted in the guidance is a focus on microsegmentation &#8212; a cybersecurity buzzword from the 2016-2018 era. Will microsegmentation finally take hold? Are organizations equipped to implement microsegmentation now? In this article, we&#8217;ll explore what makes microsegmentation so hard and how enterprises can adopt the NSA&#8217;s zero trust guidelines intended for government entities.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!367c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!367c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg 424w, https://substackcdn.com/image/fetch/$s_!367c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg 848w, https://substackcdn.com/image/fetch/$s_!367c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!367c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!367c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg" width="456" height="249" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:166,&quot;width&quot;:304,&quot;resizeWidth&quot;:456,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;5 steps to Zero Trust The Inevitability of the &#8220;perimeter-less&#8221; network&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="5 steps to Zero Trust The Inevitability of the &#8220;perimeter-less&#8221; network" title="5 steps to Zero Trust The Inevitability of the &#8220;perimeter-less&#8221; network" srcset="https://substackcdn.com/image/fetch/$s_!367c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg 424w, https://substackcdn.com/image/fetch/$s_!367c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg 848w, https://substackcdn.com/image/fetch/$s_!367c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!367c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f7fe98e-fad6-4c4d-90db-f4c9d1b3e7f6_304x166.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2>Zero Trust Microsegmentation Is HARD!</h2><p>Several years ago, I worked for a software vendor building a zero trust based microsegmentation product. The company was one of many emerging at the time. Each of the startup vendors offered its own interpretation of what microsegmentation meant and where in a network it should be deployed, leading to some pretty nasty turf wars. The promises were big, execution was uneven, and results were unreliable.</p><p>The microsegmentation market started cooling off by mid-2019 after the more successful players got scooped up by bigger (platform-oriented) vendors. In my opinion, the acquisitions were focused on the concept of offering a path to zero trust based microsegmentation rather than the particular technologies themselves. Given that most of the acquired technologies got rolled into other product lines and ceased to exist in their original form, this seems like a solid argument.&nbsp;&nbsp;</p><p>It&#8217;s not that microsegmentation is (or was) a bad idea. In fact, it&#8217;s a great idea! <a href="https://substack.com/profile/11988704-adrian-sanabria?utm_source=about-page">Adrian</a> and I recorded a video at Black Hat 2019 (which I cannot, for the life of me, find anywhere online) about why microsegmentation, while highly beneficial for security purposes, can be challenging to implement. To quickly recap:</p><ol><li><p><strong>Complexity of network architecture</strong>: Overhauling large, complex networks with highly interconnected devices and systems (including legacy tooling that may lack flexibility and granularity) would be excessively time-consuming and would likely be incomplete due to architectural limitations.</p></li><li><p><strong>Granular policy definition</strong>: Microsegmentation requires security, IT, and operations teams to define and enforce granular access control policies based on factors such as user identity, device type, managed/unmanaged applications, data sensitivity, baseline traffic patterns, dependencies, and intended security policies. Many organizations don&#8217;t have the level of visibility that would allow them to start this process.</p></li><li><p><strong>Performance impacts</strong>: If not implemented well, microsegmentation could introduce latency and overhead as network traffic passes through additional security enforcement points.</p></li><li><p><strong>Integration with existing infrastructure</strong>: Microsegmentation requires integration with existing network infrastructure. Compatibility issues, interoperability challenges, and the need for software-defined networking (SDN) may make it hard for teams to update their networks to a state that makes microsegmentation possible.</p></li><li><p><strong>Dynamic nature of modern networks</strong>: Today&#8217;s networks are dynamic and constantly evolving, with devices connecting and disconnecting, applications being deployed and updated, and users accessing resources from various locations and devices. This means that policies must be flexible enough to meet the modern network&#8217;s demands &#8212;&nbsp;and that may seem impossible for many organizations.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/microsegmentation-finally-gets-its?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">The Cyber Why needs you! Share Katie&#8217;s Awesome Writing.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/microsegmentation-finally-gets-its?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/microsegmentation-finally-gets-its?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div></li></ol><h2><strong>So, Exactly What Has changed?</strong></h2><p>If we understand that microsegmentation is beneficial but has been too hot to handle for many organizations, why is the NSA refreshing its push for it now?</p><p>Because software-defined networking (SDN), a hyper-reliance on cloud environments, and zero trust architectures are finally starting to be the de facto standard for public and private organizations alike.&nbsp;</p><p>The guidance specifically states, &#8220;Though microsegmentation can be achieved with traditional system components and manual configuration, the centralized nature of SDN allows for dynamic implementation and management across the network. SDN enables the control of packet routing by a centralized control server via a distributed forwarding plane, provides additional visibility into the network, and enables unified policy enforcement.&#8221;</p><p>It continues to note that &#8220;SDN is already a feature of many modern network devices currently in use and can allow flexible integration and control of new equipment,&#8221; making it a prime facilitator of microsegmentation. Because traffic in an SDN flows through software-based controllers, an SDN provides a high level of visibility into the network and network traffic patterns. This, in turn, allows administrators to understand the network more clearly, allowing them to more easily create rules and policies for microsegmentation and adhere to zero trust policies.&nbsp;</p><p>Zero trust, for its part, is driven by greater adoption of SDN. Why? Because SDN allows admins to implement dynamic security policies that can automatically adapt to changing network conditions and events, and enforce actions based on user identity, device security posture, and behavior. It&#8217;s a cyclically beneficial model that has evolved alongside the increased adoption of modern and flexible networking technologies.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Please consider subscribing! It&#8217;s free and helps support our continued work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>More than just zero trust and microsegmentation</strong></h2><p>The new NSA guidance focusing on the &#8220;network and environment&#8221; pillar includes more than recommendations for implementing zero trust and microsegmentation. However, these two elements are noteworthy because they are a re-emergence of topics that tried to take a stronghold in the past. Nonetheless, with current capability comes additional opportunities. It is undoubtedly the NSA&#8217;s hope that organizations will use the new recommendations and deploy more robust security controls and processes across their networks.&nbsp;</p><p>Now that past barriers to zero trust based microsegmentation implementation have been removed, perhaps now is the proper time for its heyday. There is no question that microsegmentation enhances network security and reduces the cyberattack surface, making it a worthwhile endeavor. As for zero trust, it should be the default architecture in all organizations&#8217; network environments. Applying a zero trust approach to microsegmentation, using SDN and other present-day networking capabilities, will only serve to strengthen organizations&#8217; network defenses, which is &#8212; truly &#8212; the main point of the NSA&#8217;s guidance.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/microsegmentation-finally-gets-its/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/microsegmentation-finally-gets-its/comments"><span>Leave a comment</span></a></p>]]></content:encoded></item><item><title><![CDATA[Platforms and Point Products Will Both Continue to Be a Thing]]></title><description><![CDATA[Neither are going away. Arguing that one or the other will "win out" is silly.]]></description><link>https://www.thecyberwhy.com/p/platforms-and-point-products-will</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/platforms-and-point-products-will</guid><dc:creator><![CDATA[Adrian Sanabria]]></dc:creator><pubDate>Thu, 29 Feb 2024 14:33:16 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6d6c14b1-c2a9-43fb-8842-77854b087e75_768x768.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A large portion of the vendor security market is venture capital-funded. Founders raise money to build and grow companies that overwhelmingly get acquired by larger cybersecurity companies.</p><p>Private equity (PE) firms also have a large stake in the cybersecurity market. PE firms pick up moderate-performing companies and combine them with other moderate-performing companies. This is in the hopes that 1+1=3, from an investment standpoint.</p><p>This market cycle, where point products and features masquerading as products get acquired into platforms, has been the dominant force setting the market pace for the past 20 years. This cycle shows no sign of changing or stopping.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><h1>The Palo Alto Platform Debate</h1><p>Recently, Palo Alto&#8217;s CEO, Nikesh Arora, felt the need to do some <a href="https://www.linkedin.com/feed/update/urn:li:activity:7166581847525707776">defensive explaining</a> around PANW&#8217;s current market strategy. At the end of this LinkedIn post, he strikes a match, which finds some dry tinder.</p><blockquote><p>&#8230;we feel confident that in the next five years point solutions will become a thing of the past.</p></blockquote><p>This is clearly hyperbole, right? Nikesh knows how the market works. In fact, as an acquisition-driven company, Palo Alto <strong>depends on </strong>a healthy ecosystem of competitive point products to fuel their growth! For some perspective on Palo Alto&#8217;s dependence on the startup ecosystem, <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Tyler Shields&quot;,&quot;id&quot;:77573547,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/aa42ed17-b0e5-49d6-a3bd-b89a8771d803_400x400.jpeg&quot;,&quot;uuid&quot;:&quot;f4b4d783-3533-4078-96c4-a265d4e06e9b&quot;}" data-component-name="MentionToDOM"></span><a href="https://www.thecyberwhy.com/p/palo-alto-networks-a-play-for-the">published a recent piece</a> that details Palo Alto&#8217;s acquisitions over the past six years: 16 transactions totaling nearly $4.8B USD.</p><p>For some market perspective on the size and health of the security startup ecosystem, <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Mike Privette&quot;,&quot;id&quot;:38572785,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/ce146337-3287-4eb4-b993-cb4b6724b596_2560x2048.jpeg&quot;,&quot;uuid&quot;:&quot;ebbbad4b-7d1c-4699-b1a4-3613df8af227&quot;}" data-component-name="MentionToDOM"></span> over at Return on Security <a href="https://www.returnonsecurity.com/p/2023-cybersecurity-market-review">reported </a>684 funding rounds across 100+ unique product categories worth ~$12.7B in 2023. Mike also reported that 2023 had 259 M&amp;A transactions across 70+ unique product categories worth ~$40.5B. That&#8217;s nearly <em>1000 </em>major transactions, pumping over $53B into the cybersecurity market. As the market continues to recover, we can only expect to see the number and size of transactions increase, particularly after tech and security companies start going public again.</p><p>Palo Alto has no less than three major platforms. The company&#8217;s firewall platforms, Cortex, and Prisma, have all been around for many years, making it difficult to claim that platformization (a real word, apparently) doesn&#8217;t work. Further bolstering the strategy, PANW&#8217;s incredible growth over the period that these platforms were built is well-detailed by <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Tyler Shields&quot;,&quot;id&quot;:77573547,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/aa42ed17-b0e5-49d6-a3bd-b89a8771d803_400x400.jpeg&quot;,&quot;uuid&quot;:&quot;eae33270-a1fc-42bc-b5ff-04825511e38d&quot;}" data-component-name="MentionToDOM"></span> in his &#8216;<a href="https://www.thecyberwhy.com/p/palo-altos-big-hairy-audacious-goal">BHAG</a>&#8217; post. </p><p>Symantec and McAfee&#8217;s corpses are often dragged out and placed on display as evidence that platformization doesn&#8217;t work, but those companies were built during a very different time. Building a simple integration required dozens of meetings, contracts, and the exchange of proprietary information. Today, nearly all products are API-first SaaS and integrations are built in <em>hours</em>. Honestly, it&#8217;s a miracle McAfee made ePolicy Orchestrator work at all in the 2000s!</p><p>(pssst, <a href="https://www.trellix.com/products/epo/">it still exists</a>, BTW)</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/platforms-and-point-products-will?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/platforms-and-point-products-will?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h1>A Challenger Approaches</h1><p><span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Richard Stiennon&quot;,&quot;id&quot;:6189296,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d5f22f67-2387-44cb-96d4-2d10e3e6823b_48x48.jpeg&quot;,&quot;uuid&quot;:&quot;22769f52-be9f-4a61-9dbf-0c6e8be51942&quot;}" data-component-name="MentionToDOM"></span>, industry analyst and author of <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;The Security Industry&quot;,&quot;id&quot;:169638,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/stiennon&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/ff0b666f-6c36-4676-8a22-90154ec4bf98_187x187.png&quot;,&quot;uuid&quot;:&quot;4db2437c-d23f-4193-8c37-98882902214c&quot;}" data-component-name="MentionToDOM"></span>, jumps feet-first into the point vs platform debate with some bold statements. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qRSg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qRSg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png 424w, https://substackcdn.com/image/fetch/$s_!qRSg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png 848w, https://substackcdn.com/image/fetch/$s_!qRSg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png 1272w, https://substackcdn.com/image/fetch/$s_!qRSg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qRSg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png" width="661" height="181" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:181,&quot;width&quot;:661,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:25244,&quot;alt&quot;:&quot;A headline that reads \&quot;There is no such thing as a cybersecurity platform\&quot; and a subtitle that reads, \&quot;and never will be\&quot;, by Richard Stiennon, Feb 21, 2024&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A headline that reads &quot;There is no such thing as a cybersecurity platform&quot; and a subtitle that reads, &quot;and never will be&quot;, by Richard Stiennon, Feb 21, 2024" title="A headline that reads &quot;There is no such thing as a cybersecurity platform&quot; and a subtitle that reads, &quot;and never will be&quot;, by Richard Stiennon, Feb 21, 2024" srcset="https://substackcdn.com/image/fetch/$s_!qRSg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png 424w, https://substackcdn.com/image/fetch/$s_!qRSg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png 848w, https://substackcdn.com/image/fetch/$s_!qRSg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png 1272w, https://substackcdn.com/image/fetch/$s_!qRSg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0167ebf8-8f73-4bba-a7c3-b696f8785a5a_661x181.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>This left me scratching my head. There are <em>tons</em> of cybersecurity platforms on the market. Sure, many of them make compromises and probably aren&#8217;t considered &#8216;best-of-breed&#8217; in some categories, but to say there is no such thing as a cybersecurity platform? I don&#8217;t get it. Perhaps his next statement is a clue?</p><blockquote><p>There is ZERO appetite within the enterprise to purchase all of their cybersecurity from the same vendor.</p></blockquote><p>Any statement that goes to such an extreme is impossible to disagree with. It&#8217;s a strawman - there aren&#8217;t any vendors <em>trying</em> to be everything to everyone, unless we consider VARs vendors. There are plenty of categories I just don&#8217;t see Palo Alto venturing into.  The cybersecurity market is full of niches and nuanced products that will never make sense as part of a larger platform.</p><p>Even within Palo Alto itself, there isn&#8217;t a single dashboard or platform. Panorama, Cortex, and Prisma are all separate platforms with separate UI/UX. This makes sense - each platform has separate buyers and use cases, each with its own UI/UX needs. Mashing it all together into a single console would be a mess.</p><h1>What&#8217;s a platform?</h1><p><em>A platform doesn&#8217;t have to cover every use case and product to be a platform.</em></p><p>Personally, I define a platform (in the enterprise B2C software sense, at least) as multiple, highly integrated products that can be accessed and leveraged via one cohesive UI/UX. Pricing often also enjoys some discount over purchasing the software separately. Platforms should generally benefit the buyer in terms of cost and convenience, but like anything else, there are examples of badly executed platforms. As companies grow, business diversification is often necessary to achieve growth goals.</p><p>Zscaler has a platform. Crowdstrike has a platform. Trend Micro has a platform. Sophos has a platform. I think it is fair to say that platforms are common and successful. Perhaps the confusion here is that a well-integrated platform closely resembles a point product.</p><p>For some more perspective, let&#8217;s play with the opposite extreme as a thought exercise.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share The Cyber Why&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share The Cyber Why</span></a></p><h1>There Is No Such Thing as Best of Breed</h1><p>The vast majority of security point products are created by early-stage, VC-dependent startups. Selling a minimum viable product to a Fortune 100/500/1000 can be tricky to pull off. Enterprise features are often missing in MVPs, but startups target large enterprises because they have a small sales team with big numbers to hit. They ain&#8217;t gonna get there with a 4-5 digit ACV, and large enterprises fling a lot less when the cost is big.</p><p>Most point products aren&#8217;t even usable or available to the larger general market. As previously mentioned, sales teams can&#8217;t afford to go after smaller deals. I often hear buyers complain that they can&#8217;t get anyone to return their calls or take their money, and it is often because these startups have to be picky about who they sell to. They need enough growth and the right logos to reach the next milestone. Rinse and repeat until the ARR/growth numbers are right for a decent exit.</p><p>These products are often rough and might not even work reliably at this stage. If early-stage startups manage to make a sale, it&#8217;s almost certainly at a discount. Unless it creates an <em>immediate </em>impression, there&#8217;s a good chance it ends up as <em>shelfware</em>. Surely this isn&#8217;t what we&#8217;re calling best-of-breed? Late-stage startups get closer to polished, more usable products but are also closer to exiting to a platform vendor.</p><p>So&#8230; are we most likely to find best-of-breed products within a platform? Or is there some optimal window where a startup is late-stage but also pre-acquisition that could be described as a peak point product?</p><p>Let&#8217;s jump back to another quote from Richard:</p><blockquote><p>You need the best possible defenses against a real and present danger. If you compromise to reduce the burden on your purchasing department you are going to be out of a job and may be indicted by the SEC.</p></blockquote><p>I think there is a misunderstanding here of how products are purchased, implemented, and used in enterprises. The &#8220;best possible defenses&#8221; (i.e., product performance) are just one factor the buyer must consider. It probably isn&#8217;t even the most important factor for most buyers. Botched and abandoned deployments are so common in the security space that getting a product deployed, working, and producing value is often a major win, regardless of product performance. The best security product in the world can&#8217;t make a difference if it never gets deployed.</p><p>Let&#8217;s say Crowdstrike was the best performer in some anti-malware tests, but SentinelOne was the best performer in an EDR/XDR test. Endpoint security platforms are tightly integrated - I can&#8217;t imagine a buyer mixing and matching both of these solutions. Honestly, I&#8217;m not even sure if it&#8217;s possible to segregate some of these functions anymore - there are many places in cybersecurity where you <em>need </em>a platform to avoid massive inconvenience and overhead: endpoint, cloud, vulnerability management, identity.</p><p>Usability, compatibility, and ability to integrate are critical features that weigh into &#8220;best of breed&#8221; decisions. A .NET shop&#8217;s favorite SAST tool might not work for a Java/C++ shop because language support is missing or retired. Best-of-breed is subjective - objective best-of-breed products don&#8217;t exist in many categories.</p><p>Let&#8217;s explore another way to define best-of-breed: industry analyst reports. Who are the &#8220;leaders&#8221; according to all the analyst firms? They&#8217;re all <em><strong>platforms</strong></em>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bKoS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bKoS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png 424w, https://substackcdn.com/image/fetch/$s_!bKoS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png 848w, https://substackcdn.com/image/fetch/$s_!bKoS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png 1272w, https://substackcdn.com/image/fetch/$s_!bKoS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bKoS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png" width="1456" height="1582" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1582,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:430174,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bKoS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png 424w, https://substackcdn.com/image/fetch/$s_!bKoS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png 848w, https://substackcdn.com/image/fetch/$s_!bKoS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png 1272w, https://substackcdn.com/image/fetch/$s_!bKoS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c44027-8d7d-4df6-8f71-861db74f14f7_3446x3744.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9PUV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9PUV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png 424w, https://substackcdn.com/image/fetch/$s_!9PUV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png 848w, https://substackcdn.com/image/fetch/$s_!9PUV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png 1272w, https://substackcdn.com/image/fetch/$s_!9PUV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9PUV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png" width="1240" height="1719" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1719,&quot;width&quot;:1240,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:136424,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9PUV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png 424w, https://substackcdn.com/image/fetch/$s_!9PUV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png 848w, https://substackcdn.com/image/fetch/$s_!9PUV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png 1272w, https://substackcdn.com/image/fetch/$s_!9PUV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c7f4c6c-a3ae-42e0-8b9f-5510b3f170f9_1240x1719.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Each buyer must individually decide what <em>best-of-breed</em> means to them based on their unique requirements and resource constraints. I&#8217;ve seen the same product perform amazingly for one customer and not work at all for another, because things were &#8220;too noisy&#8221; for one, and &#8220;not noisy enough&#8221; for another. Customer environments are diverse, and it&#8217;s difficult to build one product that suits everyone.</p><p>Integration is another important consideration in the buying process. &#8220;Does your product integrate with X,&#8221; will be asked on nearly every introductory sales call. Have someone with disabilities on your team? You&#8217;re probably looking for a mature, well-established platform. There&#8217;s little to no chance that a startup&#8217;s MVP will include accessibility features for folks with low vision, for example.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><h1>No Best-of-Breed, Only M&amp;A Targets</h1><p>It&#8217;s incredibly rare for point products to remain private or go public. The vast majority get acquired. Trying to advocate for point products can be painful - I regularly hear buyers bemoan that their favorite product is now part of Broadcom, Microsoft, Palo Alto, or some other platform vendor that they worry will ruin it. Buyers will search for an alternative and switch to it, and inevitably, that vendor will also exit to a larger player, leaving the buyer to repeat the cycle.</p><p>That said, the security market and threat landscape change so often that ripping and replacing solutions every few years isn&#8217;t necessarily a terrible idea for some security product categories. However, doing it across dozens of products is a considerable time and labor investment. Is all this work worth it? That depends - best of breed only exists in the eye of the beholder.</p><p>All growth paths lead to platforms. Do you think Apple is building VR headsets because they want to? They have to satisfy shareholder expectations of continued growth, and that often means differentiating by entering new markets, like VR/AR. The Apple ecosystem is the platform that bridges the path there. Palo Alto and Crowdstrike&#8217;s platform moves aren&#8217;t that different. Like Apple&#8217;s laptops, tablets, and smartphones, the network, cloud, and endpoint are ideal environments to build a platform around.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/platforms-and-point-products-will/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/platforms-and-point-products-will/comments"><span>Leave a comment</span></a></p>]]></content:encoded></item><item><title><![CDATA[How Insider Threats Have Evolved]]></title><description><![CDATA[Spoiler Alert: The fixes haven't really changed.]]></description><link>https://www.thecyberwhy.com/p/how-insider-threats-have-evolved-f82</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/how-insider-threats-have-evolved-f82</guid><dc:creator><![CDATA[Katie Teitler-Santullo]]></dc:creator><pubDate>Tue, 27 Feb 2024 15:03:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QPyU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>As the workplace evolves, so, too, does its effect on employees. The impact of digital transformation on insider threat mirrors that of its effect on business transformation &#8212; greater speed, efficiency, and opportunity expansion. Unlike business transformation, however, when it comes to insider threat, these &#8220;gains&#8221; are a win for the criminals rather than the business.</em></p><p><em>In this piece, we&#8217;ll take a look at some of the new data and trends shaping workplace evolution and thus insider threat, and briefly cover a few mitigations.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to The Cyber Why for FREE!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>&#8220;Insider threat,&#8221; as it pertains to cybersecurity, is broadly defined as the potential for harm caused by an employee, business partner, supplier, or any other person with authorized and legitimate access to systems, data, and/or facilities. Insider threat is (or should be) a major concern for any business. Why? Because it&#8217;s insiders who already know their way around the organization. They&#8217;ve been granted access to the organization&#8217;s network and technologies, including devices, applications, and data repositories. They understand the types of data and information upon which the business runs. They have relationships with people inside the organization and may use those relationships to coax information. They likely know (at least some) workarounds for certain access or security controls (when those controls get in the way of efficacy).</p><p>There are four main types of insiders:</p><p><em><strong>Malicious insider</strong></em>: These are the people with intentioned evil actions. They might be a disgruntled worker, someone who feels they&#8217;ve been wronged by the organization or a specific person in it. They have an ax to grind and use what&#8217;s at their disposal to steal or harm systems or data. For instance, this might be a salesperson who recently resigned because they feel they&#8217;ve been mistreated. They download their client list before moving to the next job, taking proprietary information outside the company. Or it could be an executive who leaks potential M&amp;A information in exchange for future financial gain.</p><p><em><strong>Unintentional insider</strong></em>: These people accidentally or unwittingly cause a security event. They might typo an email address or Slack username and send sensitive information to the wrong person. They might click on a link or email attachment, thinking it is legitimate, and trigger malware or have their credentials stolen.&nbsp;&nbsp;</p><p><em><strong>Compromised insider</strong></em>: This is someone who has been bribed, blackmailed, or coerced by a third party who has malicious intent. The compromised insider may be acting against their will but feel they must carry out harmful actions to protect themselves, loved ones, or fellow employees.</p><p><em><strong>Negligent insider</strong></em>: This type of insider is someone who doesn&#8217;t know the rules for acceptable use or ignores them to get work done. It might be a developer uploading sensitive data to GitHub in the name of efficiency or an employee putting a sensitive presentation on a personal laptop so they can work while on vacation.&nbsp;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share The Cyber Why&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share The Cyber Why</span></a></p><h4><strong>What&#8217;s new with insider threat?</strong></h4><p>OK, you&#8217;ve read this far and are thinking: <em>What&#8217;s new here?</em> Well, so far, nothing. Just level setting, my friends. Let&#8217;s get to the meat, shall we?</p><p>According to the <a href="https://gurucul.com/2023-insider-threat-report?qgad=678204915519&amp;qgterm=2023%20insider%20threat%20report&amp;utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=consideration&amp;utm_adgroup=%7Badgroup%7D&amp;utm_term=2023%20insider%20threat%20report&amp;gad_source=1&amp;gclid=CjwKCAiAt5euBhB9EiwAdkXWO7QXJNG7B6zXR94yfpBZsz4eExRyXAbmFk-32LRYX8ZSIHGk2z5UBRoCT5cQAvD_BwE">Gurucul 2023 Insider Threat Report</a>, 74% of organizations say insider attacks have become more frequent. An equal number of&nbsp; respondents say they are &#8220;at least moderately vulnerable or worse to insider threats.&#8221;&nbsp;</p><p>A December 2023 <a href="https://www.crowdstrike.com/blog/how-malicious-insiders-use-known-vulnerabilities-against-organizations/">report by CrowdStrike</a> found that &#8220;Approximately 55% of the identified insider threat incidents involved unauthorized use or attempted use of privilege escalation,&#8221; and &#8220;approximately 45% of insider threat incidents involved insiders who unwittingly introduced risk to their environment through the unauthorized download of exploits or by downloading other offensive security tools for testing or training purpose.&#8221;</p><h4><strong>But, why?</strong></h4><p>There are so many reasons &#8212; too many to list in one article<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> &#8212; why the risk of insider threats is increasing.</p><ol><li><p><strong>Digital transformation</strong>: We live in a hyper-connected world. Our personal lives and professional lives run on technology. Most of us have multiple devices that we use or cross-use. We connect to dozens or hundreds of apps daily. The more technology we have and the more data we put into it, the greater the chance for a leak or breach, intentional or unintentional. Growing attack surface = growing risk.</p></li><li><p><strong>Data is currency</strong>; there is always something to be gained by it. This doesn&#8217;t always mean a person is going to weaponize data. In fact, mostly it&#8217;s not weaponized (despite the scary statistics published here). But if a person were so inclined or coerced into using data for harm, there&#8217;s plenty to choose from.&nbsp;</p></li><li><p><strong>Social issues</strong>: Contentious topics like the wars in Ukraine and Gaza, gender politics, national politics, the environment, and more have wended their way into the workplace, dividing colleagues and creating tensions. An insider with a grudge or point to make could easily use sensitive or private business data as retaliation or retribution.</p></li><li><p><strong>Anonymity</strong>: Many employees feel it&#8217;s easy to cover their tracks if they intend to abuse, misuse, or tamper with systems and data. Perhaps they haven&#8217;t met a forensic investigator. If they have, perhaps they know stealthier ways to hide in today&#8217;s network traffic messiness.&nbsp;</p></li><li><p><strong>Work-life imbalance</strong>: Many employees work remotely and/or in hybrid environments. Along with it comes the co-mingling of work and personal devices, additional user accounts and access needs, and a general blurring of system and data use. Users can more easily make mistakes (if the threat is unintentional or negligence) or simply blame technology (&#8220;<em>I&#8217;ve been hacked!&#8221;</em> If the threat is intentional or malicious). What&#8217;s more, detecting insider threats is more difficult for security and ops teams because permissions have to be so broad to accommodate current working conditions.</p></li></ol><blockquote></blockquote><h4><strong>Discontent in the workplace</strong></h4><p>Workplace unhappiness is higher than it&#8217;s ever been (Or, at least, it&#8217;s higher than has ever been expressed). Either way, people are unhappy at work, and unhappiness and stress can be a significant <a href="https://thereformedanalyst.substack.com/p/5-tricks-to-reduce-burnout-at-work">contributing factor to mistakes</a>, carelessness, or the desire for retaliation. It can also make a person more prone to negative influence if the influencer promises personal or financial gain (&#8220;I can help you get a better job with a nicer manager and a higher salary&#8221;) or some sort of protection (&#8220;I won&#8217;t tell your boss you&#8217;ve been drinking at lunch if you just get me this one file&#8230;&#8221;).</p><p>Insider threat programs frequently stress the importance of&#8230;well&#8230;watching employees for elevated stress or unhappiness. Although increased unhappiness and stress in no way guarantee employee wrongdoing, any adverse change in behavior should be noted and delicately addressed before bad turns to worse.&nbsp;</p><p>Just how bad are we talking about?</p><p>The &#8220;<a href="https://www.bamboohr.com/resources/guides/employee-happiness-h1-2023?utm_source=newswire&amp;utm_medium=press%20release&amp;utm_campaign=Q2%2723">Employee Happiness Index</a>&#8221; report by BambooHR says employee job satisfaction has declined at a rate that is <em>10 times faster than in the previous three years</em>!!!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QPyU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QPyU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png 424w, https://substackcdn.com/image/fetch/$s_!QPyU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png 848w, https://substackcdn.com/image/fetch/$s_!QPyU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png 1272w, https://substackcdn.com/image/fetch/$s_!QPyU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QPyU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png" width="1456" height="920" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:920,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QPyU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png 424w, https://substackcdn.com/image/fetch/$s_!QPyU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png 848w, https://substackcdn.com/image/fetch/$s_!QPyU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png 1272w, https://substackcdn.com/image/fetch/$s_!QPyU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7857a2e7-d26f-42cd-931a-150252908b71_1600x1011.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>                                                           Source: BambooHR</p><p>Separately, Gallup&#8217;s <a href="https://www.gallup.com/workplace/349484/state-of-the-global-workplace-2022-report.aspx">State of the Global Workplace 2023 Report</a> shows that 6 in 10 employees are &#8220;quiet quitting&#8221; and &#8220;exhibiting record-high stress levels&#8221;. Further, according to the report, more than half of employees are currently job-seeking.&nbsp;</p><p>Some of the top reasons for workplace unhappiness cited in these and other recent reports include:</p><ul><li><p>High stress caused by workplace demands or perceived poor management practices</p></li><li><p>Lack of recognized value or contribution by the employee&#8217;s colleagues, managers, or executives</p></li><li><p>High inflation with <a href="https://www.atlantafed.org/chcs/wage-growth-tracker">declining wage growth</a> (ie., lower take-home pay)</p></li><li><p>The prevalence of layoffs directly or indirectly affecting employees&nbsp;</p></li><li><p>Return-to-office policies threatening work-life balance</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/leaderboard?&amp;utm_source=post&quot;,&quot;text&quot;:&quot;Refer a friend&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/leaderboard?&amp;utm_source=post"><span>Refer a friend</span></a></p><h4><strong>UGH, just tell me what to do!</strong></h4><p>The good news is that there is little that&#8217;s actually new when it comes to reducing the risk of insider threat and deploying controls that can prevent it!</p><p>The bad news is that the advice is neither new nor sexy. It&#8217;s back to basics. Focus on the fundamentals. It is the cyber essentials that will pave the way to a more protected work environment.</p><ul><li><p><em><strong>Inventory and control of enterprise and software assets</strong></em>: These are the #1 and #2 on the <a href="https://www.cisecurity.org/controls">CIS Critical Security Controls</a>, and for good reason. Know what you have so you can monitor, manage, and measure it. For example, if you don&#8217;t know that a sensitive data repository exists, you probably don&#8217;t know when/if an employee is accessing it. You, therefore, can&#8217;t see that they&#8217;re downloading tons of data from the repository and exporting it to an external app or thumb drive. Lesson: You can&#8217;t remediate insider threats without knowing what systems, data, and users are involved.</p></li><li><p><em><strong>Zero trust</strong></em>: Despite Tyler&#8217;s hate &lt;GRIN&gt;, zero trust is an important element in an organization's infrastructure security plan. Let me be clear: <strong>Zero trust is not a product</strong> but an approach, framework, or policies that result in identity-based, least privilege, and conditional access to (network-segmented) data and systems (all the things attackers, including insiders, are after). In today&#8217;s computing environments, zero trust = security. It&#8217;s the baseline upon which security teams should be architecting their networks.</p></li><li><p><strong>Patch</strong>: We know that vulnerable hardware and software versions are leading entry points for attackers. While they are possibly less of a bright, shiny object to most insiders, someone with ample technical knowledge can use outdated versions to execute an insider attack. Fix vulnerabilities and identify and remediate misconfigurations. In other words, take away the easy access points.</p></li><li><p><strong>Monitor for behavioral anomalies</strong>: Organizations must know their baselines before they can start looking for what may be going wrong. And in the case of insider threat, the signs might be very minor. Remember, insider threat is one of the hardest attack types to stop because these are people with legitimate access. But there are usually at least <em>some</em> signs that things are awry. Simple network traffic patterns, access requests, and data volumes are good places to start. More advanced organizations should deploy user and entity behavior analytics (UEBA) to identify individual user or user device anomalies.</p></li><li><p><strong>Acceptable use policies (AUP)</strong>: While a policy isn&#8217;t going to stop a determined criminal from anything, the hesitant or nervous would-be insider who is thinking about stealing, leaking, or tampering with data or systems may think twice if the organization has shone a spotlight on expectations and consequences of an intentional insider compromise. Be careful not to be overly strict about accidental compromise; we don&#8217;t want people doing stupid things, but accidents can happen &#8212; and they can happen to anyone. However, be very deliberate with wording around negligence. &#8220;I didn&#8217;t know I couldn't dump our product designs into ChatGPT&#8221; isn&#8217;t a scenario you want to deal with.&nbsp;</p></li></ul><p>In short, insider threat is still insider threat. The things security and operations teams (along with HR, legal, and communications colleagues) have to do to mitigate the risk aren&#8217;t vastly different today than they were four years ago. However, our corporate environments have changed, and (apparently) not for the better.&nbsp; As a result, security and ops teams must be hyper-aware of the situation, work with business colleagues to put the data into context, and put an extra spotlight on the security fundamentals to ensure systems and data are more resilient to stealthy attacks from insiders than ever before.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Yes, I know it&#8217;s bad form to outline a problem as the main focus of an article. But let&#8217;s face it, the mitigations are the same this year as they were a year ago, five years ago. It&#8217;s back to basics, folks. Always back to basics.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Even if you&#8217;re me and overly verbose.</p></div></div>]]></content:encoded></item><item><title><![CDATA[Palo Alto Networks - A Play For The Future]]></title><description><![CDATA[The market got it wrong. This one is going TO THE MOON!]]></description><link>https://www.thecyberwhy.com/p/palo-alto-networks-a-play-for-the</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/palo-alto-networks-a-play-for-the</guid><dc:creator><![CDATA[Tyler Shields]]></dc:creator><pubDate>Thu, 22 Feb 2024 15:20:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yZos!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I woke up this morning to an article about Palo Alto&#8217;s new push towards a singular platform and their hopes of market capture, written by one of the top analysts in the business, <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Richard Stiennon&quot;,&quot;id&quot;:6189296,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d5f22f67-2387-44cb-96d4-2d10e3e6823b_48x48.jpeg&quot;,&quot;uuid&quot;:&quot;06ca225b-c9bf-4ef5-8c95-198540abf1ce&quot;}" data-component-name="MentionToDOM"></span> from <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;The Security Industry&quot;,&quot;id&quot;:169638,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/stiennon&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/ff0b666f-6c36-4676-8a22-90154ec4bf98_187x187.png&quot;,&quot;uuid&quot;:&quot;eef44767-177a-4184-be6d-678450361144&quot;}" data-component-name="MentionToDOM"></span> newsletter. I very much respect Richard, his work, his analysis, and his experience. I even consider him a friend. <em><strong>However&#8230; he&#8217;s wrong!</strong></em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This one&#8217;s a GOOD ONE! If you like what you read please subscribe!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>To summarize the news, Palo Alto Networks announced earnings earlier this week, topping industry analyst estimates with the results. However, they also put out lower guidance for the rest of 2024. The net result was about a 20% drop in the stock price after hours and the scrubbing off of around $20B in market cap the following day. In other words, the public market freaked the hell out.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yZos!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yZos!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif 424w, https://substackcdn.com/image/fetch/$s_!yZos!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif 848w, https://substackcdn.com/image/fetch/$s_!yZos!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif 1272w, https://substackcdn.com/image/fetch/$s_!yZos!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yZos!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif" width="484" height="271.6792452830189" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:357,&quot;width&quot;:636,&quot;resizeWidth&quot;:484,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Freaking Out Hippie Dude GIF&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Freaking Out Hippie Dude GIF" title="Freaking Out Hippie Dude GIF" srcset="https://substackcdn.com/image/fetch/$s_!yZos!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif 424w, https://substackcdn.com/image/fetch/$s_!yZos!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif 848w, https://substackcdn.com/image/fetch/$s_!yZos!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif 1272w, https://substackcdn.com/image/fetch/$s_!yZos!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2093c80a-ea8e-45af-93be-e3a2bb2194ac_636x357.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The public markets after PANWs earnings announcement!</figcaption></figure></div><p>The earnings report stated that the company was seeing spending fatigue and an increase in the need to tighten security budgets amidst businesses becoming more efficient with their spending. <strong>This makes TOTAL sense!</strong></p><blockquote><p>Cybersecurity buyers have been publicly saying that we have &#8220;<a href="https://stiennon.substack.com/p/how-many-cybersecurity-products-are">too many solutions</a>&#8221;, &#8220;<a href="https://ventureinsecurity.net/p/why-there-are-so-many-cybersecurity/comments">too many vendors</a>&#8221;, &#8220;<a href="https://ioactive.com/cybersecurity-alert-fatigue/">too many alerts</a>&#8221;, &#8220;<a href="https://venturebeat.com/security/the-cybersecurity-industry-is-burning-and-vcs-dont-care/">too much investment</a>&#8221;, and quite frankly too many shitty products that don&#8217;t provide value. I agree with them!</p></blockquote><p>But for the sake of argument, let&#8217;s take a step back and consider the alternatives. Let&#8217;s assume that all of the complaints of the last few years are echo chamber garbage, and the reality is that buyers really want point solutions that provide siloed output that don&#8217;t work well together and haven&#8217;t been successful in securing the enterprise. If this is true, I can still make the case that Palo Alto&#8217;s <a href="https://en.wikipedia.org/wiki/Platform_economy#Platformization">platformization</a> play <em>(HAH, I love the new word)</em> will win in the long term.</p><h1>The Strategic Details</h1><p>Nikesh Arora and the Palo team have spent the last half-decade acquiring the best of bread in many of the critical cybersecurity niche areas. Let&#8217;s take a look at Wikipedia to see the list of acquisitions since 2017. I added bolding to the ones that I felt were near the top of the market in their specific subsegment at the time of acquisition (your bolding may vary).</p><ul><li><p>March 2017: LightCyber for approximately $100 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-34"><sup>[34]</sup></a></p></li><li><p><strong>March 2018: Cloud Security company Evident.io for $300 million. This acquisition created the Prisma Cloud division.<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-35"><sup>[35]</sup></a></strong></p></li><li><p>April 2018: Secdo<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-36"><sup>[36]</sup></a></p></li><li><p><strong>October 2018: RedLock for $173 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-37"><sup>[37]</sup></a></strong></p></li><li><p><strong>February 2019: Demisto for $560 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-38"><sup>[38]</sup></a></strong></p></li><li><p><strong>May 2019: Twistlock for $410 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-39"><sup>[39]</sup></a></strong></p></li><li><p>June 2019: PureSec for $47 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-40"><sup>[40]</sup></a><a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-41"><sup>[41]</sup></a></p></li><li><p>September 2019: Zingbox for $75 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-42"><sup>[42]</sup></a></p></li><li><p><strong>November 2019: Aporeto, Inc. for $150 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-43"><sup>[43]</sup></a><sup>[</sup></strong><em><strong><a href="https://en.wikipedia.org/wiki/Wikipedia:NOTRS"><sup>better&nbsp;source&nbsp;needed</sup></a></strong></em><strong><sup>]</sup></strong></p></li><li><p>April 2020: CloudGenix, Inc. for $420 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-44"><sup>[44]</sup></a></p></li><li><p>August 2020: Crypsis Group for $265 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-45"><sup>[45]</sup></a></p></li><li><p><strong>November 2020: Palo Alto Networks announced its intent to acquire Expanse for $800 million.<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-46"><sup>[46]</sup></a></strong></p></li><li><p><strong>February 2021: Bridgecrew for $156 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-47"><sup>[47]</sup></a></strong></p></li><li><p><strong>November 2022: Cider Security for $300 million.<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-48"><sup>[48]</sup></a></strong></p></li><li><p><strong>November 2023: Talon Cyber Security for $625 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-51"><sup>[51]</sup></a></strong></p></li><li><p><strong>December 2023: Dig Security for $400 million<a href="https://en.wikipedia.org/wiki/Palo_Alto_Networks#cite_note-52"><sup>[52]</sup></a></strong></p></li></ul><p>As you can see, they weren&#8217;t buying garbage technology. It&#8217;s not like the old days of an acquisition done by IBM or Symantec, where good companies go to wither and die. Palo targeted and acquired one of the top three companies in each security subsegment to broaden their offering. The promise all along has been an eventual platform that offers all of these technologies from a single vendor. If this is where the story ended, I&#8217;d agree with Richard that the results will go nowhere.. but this is just where the tale BEGINS!</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UJfj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UJfj!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif 424w, https://substackcdn.com/image/fetch/$s_!UJfj!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif 848w, https://substackcdn.com/image/fetch/$s_!UJfj!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif 1272w, https://substackcdn.com/image/fetch/$s_!UJfj!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UJfj!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif" width="400" height="215" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:215,&quot;width&quot;:400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;YARN | Wait till I get going! | The Princess Bride | Video clips by quotes  | e0b6cf9a | &#32023;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="YARN | Wait till I get going! | The Princess Bride | Video clips by quotes  | e0b6cf9a | &#32023;" title="YARN | Wait till I get going! | The Princess Bride | Video clips by quotes  | e0b6cf9a | &#32023;" srcset="https://substackcdn.com/image/fetch/$s_!UJfj!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif 424w, https://substackcdn.com/image/fetch/$s_!UJfj!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif 848w, https://substackcdn.com/image/fetch/$s_!UJfj!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif 1272w, https://substackcdn.com/image/fetch/$s_!UJfj!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F995dc808-bf7a-4202-8417-8e307733c47e_400x215.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">You fell victim to one of the classic blunders! The most famous of which is, &#8216;never get involved in a land war in Asia,&#8217; but only slightly less well-known is this: &#8216;Never go in against a Sicilian when death is on the line!</figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/palo-alto-networks-a-play-for-the/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/palo-alto-networks-a-play-for-the/comments"><span>Leave a comment</span></a></p><h1>The Era of Unified Data and AI Analysis</h1><p>In the earnings guidance, Palo stated that it would offer programs and incentives (e.g., free months of service) to buyers who trade in legacy vendor products. They are willing to do no-cost deals, introductory offers, and free product upgrades to bring on and grow their customer base. At first glance, this sounds like a HORRIBLE idea - next year, let&#8217;s GIVE AWAY our products. That&#8217;s a super refreshing new way to do business!</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r_VJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r_VJ!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif 424w, https://substackcdn.com/image/fetch/$s_!r_VJ!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif 848w, https://substackcdn.com/image/fetch/$s_!r_VJ!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif 1272w, https://substackcdn.com/image/fetch/$s_!r_VJ!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r_VJ!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif" width="368" height="179.31636363636363" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:268,&quot;width&quot;:550,&quot;resizeWidth&quot;:368,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Oh-well-that-will-make-a-refreshing-change GIFs - Get the best GIF on GIPHY&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Oh-well-that-will-make-a-refreshing-change GIFs - Get the best GIF on GIPHY" title="Oh-well-that-will-make-a-refreshing-change GIFs - Get the best GIF on GIPHY" srcset="https://substackcdn.com/image/fetch/$s_!r_VJ!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif 424w, https://substackcdn.com/image/fetch/$s_!r_VJ!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif 848w, https://substackcdn.com/image/fetch/$s_!r_VJ!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif 1272w, https://substackcdn.com/image/fetch/$s_!r_VJ!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c000bcf-2603-4bc2-8a43-c6daf8d4b8ec_550x268.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>So why would Palo choose this strategy? The public market immediately responded and told the executive team they had made a mistake. Hold on to your shorts because here comes the twist. They haven&#8217;t.</p><p>Palo plans to use this year to do some essential things to the business to set them up to win in the long game. They are playing chess while the rest of the cybersecurity market is playing checkers.</p><ol><li><p><strong>Pay down technical debt - </strong>Palo's historic acquisitions were largely left alone and only worked toward a broader integration play in the last few years. This built up technical debt, and in the next year, Palo will pay this debt down and build a much more robust engine and user experience. This costs money and will be a minor hit to their bottom line. They must invest in themselves and their innovation pipeline.</p></li><li><p><strong>Collect and unify the largest cybersecurity dataset on the planet</strong> - Only a few cyber players have multiple SaaS cyber offerings and can collect such a massive data set. Palo plans to leverage this dataset and build a network effect by getting as many new customers onto the platform as quickly as possible. Each new customer is another set of raw data that their AI system learns from and can use to improve accuracy. This is an apparent reason to blitz the market and attempt to dominate as a single vendor offering. This is why they are giving products away for free.</p></li><li><p><strong>&#8220;Activate their AI leadership strategy&#8221;</strong> - The marketing words are Palo&#8217;s, not mine. However, the strategy is a good one. There are two to three players in the global cyber market who might understand and take a shot at the broad AI cyber vision. Palo believes that their resources and current capabilities give them a headstart in the AI-backed cybersecurity detection and prevention of attacks arena. I am confident they are correct. There is nobody better fit to make these moves except for Microsoft and possibly Google (the leaders in AI today). Google doesn&#8217;t see the cybersecurity market as meaningful, and Microsoft has traditionally been unable to execute its long-term vision. Palo has the lead and will win over everyone else.</p></li><li><p><strong>Start the afterburners and buy the market</strong> - There is a unified market forming in which a one-vendor platform provides outsized value compared to point solutions. Nobody would switch if the platform's value weren&#8217;t orders of magnitude better than point solutions - but it is, or at least will be! Every additional customer you put onto the platform makes the platform more robust for everyone else. The network effect is real, and when the network effect is real, you have to blitzscale (buy) the market. The first company to get there has a distinct advantage over the competition, making it challenging to dethrone them over time.</p></li></ol><p>The new guidance Palo provided not only makes sense in the near term but will show a massive return on investment in the long term. They will spend 2024 reworking the spaceship with new boosters, nose cones, and steering systems. The only real question remains whether they can execute the engineering side of this vision because this is one market they will not be able to acquire their way into. This year will be a year of innovation and reinvestment in the company, shrinking its growth rate but resulting in a launching pad that will take the company to a whole new level of dominance. </p><p>I&#8217;m sorry <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Richard Stiennon&quot;,&quot;id&quot;:6189296,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d5f22f67-2387-44cb-96d4-2d10e3e6823b_48x48.jpeg&quot;,&quot;uuid&quot;:&quot;a4a23d80-8c31-492d-a6d6-4eee49bddbcc&quot;}" data-component-name="MentionToDOM"></span>. I love ya, brother, but with all due respect, you&#8217;ve missed the boat on this one. The one ring to rule them cyber platform will be here in the next three years, and Palo Alto Networks will be the one to bring it to the world.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/palo-alto-networks-a-play-for-the?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/palo-alto-networks-a-play-for-the?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>Additional background reading from The Cyber Why on Palo Alto Networks and the cyber AI race is below:</p><p><a href="https://www.thecyberwhy.com/p/palo-altos-big-hairy-audacious-goal">Palo Alto's Big Hairy Audacious Goal</a> <br><a href="https://www.thecyberwhy.com/p/the-next-era-of-cyber-security-capabilities">The Next Era of Cyber Security Companies</a><br><a href="https://www.thecyberwhy.com/p/ai-will-be-the-next-new-massive-platform">AI Will Be The Next New Massive Platform</a><br><a href="https://www.thecyberwhy.com/p/the-margin-crush-is-coming-in-2024">The Margin Crush is Coming in 2024</a></p>]]></content:encoded></item><item><title><![CDATA[A Retrospective on Veritas]]></title><description><![CDATA[Symantec and Veritas were a weird couple that never made sense. Has Veritas finally found its forever home?]]></description><link>https://www.thecyberwhy.com/p/a-retrospective-on-veritas</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/a-retrospective-on-veritas</guid><dc:creator><![CDATA[Adrian Sanabria]]></dc:creator><pubDate>Tue, 20 Feb 2024 14:40:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1bYI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the early days, we didn't know what security was supposed to look like. As a program, as a discipline, as a career, as a market.</p><p>Like patching, backups were security-adjacent but never really considered a &#8216;pure play&#8217; security product. It was a little odd for Symantec to acquire Veritas, but what did we know? Everything was new back then. Maybe hybrid IT/security vendors would be the thing from now on. We still see some of that today where there is clear synergy between the IT and security sides, like with data (Splunk, Elastic, DataDog, etc).</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1bYI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1bYI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1bYI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1bYI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1bYI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1bYI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg" width="358" height="214.35109717868337" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:382,&quot;width&quot;:638,&quot;resizeWidth&quot;:358,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;VAST on LinkedIn: Cohesity to Acquire Veritas' Data Protection Business&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="VAST on LinkedIn: Cohesity to Acquire Veritas' Data Protection Business" title="VAST on LinkedIn: Cohesity to Acquire Veritas' Data Protection Business" srcset="https://substackcdn.com/image/fetch/$s_!1bYI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1bYI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1bYI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1bYI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91f01d49-dcf0-4491-b155-76ef050924b3_638x382.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>It was <a href="https://www.cohesity.com/press/cohesity-and-veritas-data-protection-business-to-combine-forming-a-new-leader-in-ai-powered-data-security-and-management/">announced last week</a> that Veritas and <a href="https://en.wikipedia.org/wiki/Cohesity">Cohesity </a>will merge (it sounds like a merger, at least), which seems a much better fit than Symantec ever was. This seemed like an excellent opportunity to do a bit of a retrospective.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><h1>In the year 2000&#8230;</h1><p>Symantec paid $13.5B (a 6.75x revenue multiple) for Veritas in an all-stock deal that closed in 2005 (<a href="https://www.youtube.com/watch?v=kmzpdd4pWvM">okay, not quite 2000</a>). The pairing didn't make a lot of sense and was later undone. It&#8217;s said that, after the acquisitions, Symantec and Veritas continued operating independently.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1tXT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1tXT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png 424w, https://substackcdn.com/image/fetch/$s_!1tXT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png 848w, https://substackcdn.com/image/fetch/$s_!1tXT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png 1272w, https://substackcdn.com/image/fetch/$s_!1tXT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1tXT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png" width="266" height="195.86069651741295" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:296,&quot;width&quot;:402,&quot;resizeWidth&quot;:266,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Symantec y Veritas se separan para fortalecerse - NextVision&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Symantec y Veritas se separan para fortalecerse - NextVision" title="Symantec y Veritas se separan para fortalecerse - NextVision" srcset="https://substackcdn.com/image/fetch/$s_!1tXT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png 424w, https://substackcdn.com/image/fetch/$s_!1tXT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png 848w, https://substackcdn.com/image/fetch/$s_!1tXT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png 1272w, https://substackcdn.com/image/fetch/$s_!1tXT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e4ccd4-3e06-4920-8cd6-6453c4a87b95_402x296.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p>What a difference ten years can make! In 2014, Symantec was getting bloodied by 'next-gen' AV startups like Crowdstrike and Cylance. The endpoint security incumbents, Symantec and McAfee, rejected innovation, resulting in the creation of their own worst enemies. This occurred directly in the case of McAfee, as Crowdstrike and Cylance&#8217;s founders both came from leadership roles there before founding the companies that would outcompete their former employer. This battle would inevitably see Symantec and McAfee be taken private and dismantled by private equity.</p><blockquote><p>To drive my point home - can you recall what Symantec and McAfee are called these days, <em>without looking it up</em>? I&#8217;ll put the answer at the end of this piece if you give up.</p></blockquote><p>Symantec at least had the foresight to see that they needed to focus on security, so in late 2014, they announced the sale of Veritas to The Carlyle Group, a private equity firm. Completed in February 2016, the deal was only for $8B. The revenue multiple was less than half (3.08x) what Symantec paid ten years prior. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L4kT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L4kT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!L4kT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!L4kT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!L4kT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L4kT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg" width="330" height="198" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:500,&quot;resizeWidth&quot;:330,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Symantec Says Antivirus Is Dead, World Rolls Eyes | PCMag&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Symantec Says Antivirus Is Dead, World Rolls Eyes | PCMag" title="Symantec Says Antivirus Is Dead, World Rolls Eyes | PCMag" srcset="https://substackcdn.com/image/fetch/$s_!L4kT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!L4kT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!L4kT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!L4kT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2bc57b-de23-4ebe-b6d6-e6213b82472f_500x300.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h1>The acqui-merger-combination</h1><p>Somehow, another ten years have passed (I feel OLD), and Carlyle is selling off Veritas in what appears to be a merger. The press release never uses the term &#8220;acquisition&#8221; or &#8220;merger.&#8221; The businesses will instead &#8220;combine&#8221; and are referred to as &#8220;the combined company&#8221; thereafter. </p><p>While we can&#8217;t estimate a multiple for the sale of Veritas alone, <a href="https://www.cohesity.com/press/cohesity-and-veritas-data-protection-business-to-combine-forming-a-new-leader-in-ai-powered-data-security-and-management/">the press release</a> does share <em>combined</em> numbers: $1.6B in total revenue, $1.3B ARR, and a combined valuation of $7B. Combined, the companies are targeting a market with a $30B TAM that I suspect is likely shrinking, as many of the products and services offered here are increasingly consumed as features within other platforms (e.g., AWS Glacier).</p><p>This isn&#8217;t the most exciting product category, but it also doesn&#8217;t seem like one that is going away any time soon. I&#8217;m just glad that, after 20 long years, Veritas finally has a home that makes sense.</p><h1>What&#8217;s in a name?</h1><p>If you&#8217;ve given up, here&#8217;s what happened with the branding.</p><p>Symantec was split into two, with the enterprise software becoming a product within Broadcom called <strong>Symantec Enterprise Cloud</strong>. The consumer side of the business was rebranded as Norton LifeLock and later rebranded again as <strong>Gen Digital</strong> after merging with Avast.</p><p>As for McAfee, the name stayed with the consumer product, while the enterprise business was split off and split again into two pieces by STG: the SSE products became <strong>Skyhigh Networks,</strong> and the remainder of McAfee&#8217;s enterprise business was merged with FireEye (which was split off from Mandiant) and rebranded as <strong>Trellix</strong>.</p><p><em>Editors Note: If you can follow all that splitting and rebranding, you deserve a cookie!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share The Cyber Why&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share The Cyber Why</span></a></p>]]></content:encoded></item><item><title><![CDATA[Breaking Down The EU Data Act]]></title><description><![CDATA[A tear down of the risk and impacts of this new regulation.]]></description><link>https://www.thecyberwhy.com/p/breaking-down-the-eu-data-act</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/breaking-down-the-eu-data-act</guid><dc:creator><![CDATA[Katie Teitler-Santullo]]></dc:creator><pubDate>Wed, 07 Feb 2024 16:03:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5L-d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>The General Data Protection Act (GDPR), enacted in 2018, was the world&#8217;s first overarching data privacy law. It established a precedence of due care for the collection, handling, processing, and storage of European Union (EU) citizens&#8217; personal data. The law necessitated major changes for any company doing business with EU citizens, and set the foundation for ensuing data privacy and protection laws.</em></p><p><em>In 2022, the European Commission proposed new legislation that would give EU citizens even greater control over their personal data. It was called the Data Act, and it became law on January 11, 2024.&nbsp;</em></p><p><em>In this article, we&#8217;ll break down the Data Act and consider its impacts on the cyber attack surface.</em></p><p>Back in 2018, companies worldwide were in a frenzy to comply with the EU&#8217;s General Data Protection Regulation (GDPR). The new law drastically changed data handling practices for any organization processing personal data of individuals residing in the EU. Companies spent months and millions of dollars updating processes and tools that would help them meet and maintain compliance. But the GDPR was only the first stepping stone in what&#8217;s to become a long line of data-focused laws meant to strengthen data protection and privacy rights for individuals.</p><p>Countless additional laws and frameworks have followed the passing of the GDPR, notably in the EU, the <a href="https://digital-strategy.ec.europa.eu/en/policies/data-governance-act">European Data Governance Act</a> (signed into law on June 23, 2022) and Europe&#8217;s <a href="https://digital-strategy.ec.europa.eu/en/policies/europes-digital-decade">Digital Decade</a> initiative, which helps EU Member States follow leading practices that help achieve safe and responsible digital transformation. The newest regulation, the <a href="https://digital-strategy.ec.europa.eu/en/news/european-data-act-enters-force-putting-place-new-rules-fair-and-innovative-data-economy">Data Act</a>, was formally adopted by the Council of the European Union and endorsed by the EU&#8217;s Parliament in late 2023, passed into law in January 2024, and will be enforceable in mid-2025.&nbsp;</p><p>According to the European Commission&#8217;s press release, <em>&#8220;The new rules define the rights to access and use data generated in the EU across all economic sectors and will make it easier to share data, in particular industrial data.</em></p><p><em>The Data Act will ensure fairness in the digital environment by clarifying who can create value from data and under which conditions. It will also stimulate a competitive and innovative data market by unlocking industrial data and by providing legal clarity as regards the use of data.&#8221;</em></p><h3><strong>What is the EU Data Act?</strong></h3><p>In clear terms, what is the EU Data Act, and what does it mean? Practically speaking, the Data Act creates rules that enable consumers and businesses to access, use, and share personal data generated during the use of connected products, mainly Internet of Things (IoT) devices. It forces manufacturers of connected devices to design their products in a way that makes it straightforward to access the data upon request, by the data owner or holder, and by any business or service to which the data owner/holder has granted permission.&nbsp;</p><p>The Data Act also applies to suppliers of related services (e.g., the software used in the connected device), data holders and providers (e.g., the businesses that store/process data on behalf of the manufacturer), and public sector entities (when there is an &#8220;exceptional need&#8221;).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5L-d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5L-d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512 424w, https://substackcdn.com/image/fetch/$s_!5L-d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512 848w, https://substackcdn.com/image/fetch/$s_!5L-d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512 1272w, https://substackcdn.com/image/fetch/$s_!5L-d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5L-d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512" width="512" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:512,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5L-d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512 424w, https://substackcdn.com/image/fetch/$s_!5L-d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512 848w, https://substackcdn.com/image/fetch/$s_!5L-d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512 1272w, https://substackcdn.com/image/fetch/$s_!5L-d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F564b1bb9-c255-489c-a97e-ca5ecfdb9502_800x512 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Rights for Data Owners</strong></h3><p>In short (and first and foremost), the Data Act gives data rights back to data owners.</p><p>Let&#8217;s say you are an EU citizen with a connected toothbrush. In theory, this toothbrush has been spitting out (pun intended) some data about the state of your oral health. You, as a consumer, have access to some of this processed data (Yippe! You brushed for two minutes, two times per day, for eight days straight!). But getting access to the metadata is much more challenging (until the Data Act becomes law).&nbsp;</p><p>So what, you may ask? At present, the toothbrush manufacturer is collecting (and likely sharing or selling, albeit &#8212;&nbsp;hopefully &#8212; anonymized or pseudonymized) data about your brushing habits and using the data to create new revenue streams. They&#8217;re harvesting your habits.&nbsp;</p><p>However, it might benefit your dentist to see this metadata and use it to help you prevent or manage oral problems. At present, it would be hard for you &#8212; the toothbrush owner and user &#8212; to get all data related to your use of the connected toothbrush. And if you do manage to get it, it might be in an unusable format. Furthermore, the manufacturer might not even be able to generate a comprehensive report, given that the data could be scattered across various components of the system.&nbsp;</p><p>But with the enforcement of the Data Act, connected toothbrushes will have to be designed in such a way that the data owner can request access to all their data and/or transfer it securely to their dentist. Importantly, the law also states that the data must be provided free of charge and in a ubiquitously machine-readable format.</p><p>Imagine the same scenario in regard to car maintenance and repairs; access to diagnostic data could be very useful to a third-party mechanic of your choice. The new laws make it easier for you and your repair person to get your hands on all that data.</p><p>The Data Act gives users (data owners) additional rights, as well. The regulation specifies that users will have greater control over how manufacturers can leverage data generated by their operation of a connected device. For example, users should be able to prevent or limit the inclusion of their data in marketing campaigns, the manufacturer&#8217;s revenue-generating activities, and how/where the data is processed. The act also requires manufacturers to comply with all user data access requests as well as transfer requests to third parties.</p><p>The same standards apply to businesses when the business is generating data on behalf of another business. For example, in the case of cloud providers, cloud processing services, and other data processing/data handling services, providers must now support data interoperability when or if the user &#8212;&nbsp;in this scenario, a business &#8220;user&#8221; &#8212; chooses a new provider.</p><h3><strong>Greater market opportunity</strong></h3><p>In addition to data access and data sharing obligations, the Data Act prohibits unfair contract terms that prevent anyone but connected device manufacturers (and other data generators) and their data service providers from benefiting from the data.</p><p>Going back to our car example, under the Data Act, car makers must release the data generated through the operation of the car to the owner and/or a third-party repair facility if requested to do so; they can no longer force EU owners/operators of these cars to use only manufacturer-managed repair facilities and/or manufacturer-built components.</p><p>Further, one of the stated intents of the Data Act is to spark greater innovation. With broader access to connected device data, entrepreneurs can create new aftermarket products and services. The press release about the regulation states that the Data Act &#8220;makes a significant contribution&#8221; to &#8220;advancing digital transformation&#8221; and ensuring fair market pricing as well as more effective business decisions and planning that result from data access.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cvhN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cvhN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512 424w, https://substackcdn.com/image/fetch/$s_!cvhN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512 848w, https://substackcdn.com/image/fetch/$s_!cvhN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512 1272w, https://substackcdn.com/image/fetch/$s_!cvhN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cvhN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512" width="512" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6c26dc62-eb9f-49cc-b957-814e1028a039_800x512&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:512,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cvhN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512 424w, https://substackcdn.com/image/fetch/$s_!cvhN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512 848w, https://substackcdn.com/image/fetch/$s_!cvhN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512 1272w, https://substackcdn.com/image/fetch/$s_!cvhN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c26dc62-eb9f-49cc-b957-814e1028a039_800x512 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">smart toothbrush</figcaption></figure></div><h3><strong>No hindrance to normal operations</strong></h3><p>A main stipulation of the Data Act is product design; manufacturers must now build their connected products and services in such a way that data access is guaranteed. However, manufacturers are prohibited from designing the product/service so that data access interferes with the normal and intended operation of the device. In other words, a manufacturer cannot build a product that is effectively ineffective after its data is accessed.</p><p>While it is not specifically spelled out in this legislation, there is sure to be some follow-on addendum that prevents manufacturers from adding insecure backdoors to products in the name of data access, thereby creating easier attack paths. At least, let&#8217;s hope there is. While the law, in part, makes a case for a stronger economy, it first and foremost claims to focus on protecting personal data, even widening the definition of &#8220;personal data&#8221; beyond what is defined in the GDPR.</p><h3><strong>Attack surface considerations</strong></h3><p>It&#8217;s no secret that connected devices and the data they generate have increased the cyber attack surface. Data is a valuable commodity. And both legitimate businesses and attackers relish in the overabundance of data made available as a result of our digital economy. So while the Data Act is an effort to give some control back to data owners, it also potentially opens up more doors to misuse and abuse. Manufacturers/providers must be cognizant of product design changes that facilitate unauthorized data access. Data owners must take responsibility for any data they request; if a manufacturer/provider securely transfers data to an owner who then stores or uses it insecurely, the data is at risk of theft, tampering, and more. If the requestor is a business rather than a consumer, insecure storage or use of this data could result in a major data breach.</p><p>Businesses are, as a result of many prior laws and regulations (including the GDPR), better acquainted with data protection and privacy protocols. However, they still need to improve their data protection game &#8212; too much data is lost to weak protections already.&nbsp;</p><p>But for consumers&#8230;generally speaking, the average citizen has neither the desire nor the expertise to safeguard what will likely be highly coveted by cyber criminals. While the idea of returning data rights to data owners is a positive step, let&#8217;s hope that some enterprising individuals have ideas on how to penetrate the consumer data privacy and protection market in a way we haven&#8217;t seen before. Individuals &#8212; consumers &#8212; will need help when presented with the responsibility for hardened data access controls.&nbsp;</p>]]></content:encoded></item><item><title><![CDATA[Palo Alto's Big Hairy Audacious Goal]]></title><description><![CDATA[The first $100B cybersecurity company]]></description><link>https://www.thecyberwhy.com/p/palo-altos-big-hairy-audacious-goal</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/palo-altos-big-hairy-audacious-goal</guid><dc:creator><![CDATA[Tyler Shields]]></dc:creator><pubDate>Mon, 05 Feb 2024 14:32:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eRhL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the world of acronyms and memes that are cybersecurity, a BHAG is a &#8220;big hairy audacious goal.&#8221; BHAGs are used to build vision and dreams, motivate people, and inspire them to reach heights they never thought they could. This is the story of a BHAG that wasn&#8217;t a BHAG. The BHAG was something even more significant.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eRhL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eRhL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!eRhL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!eRhL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!eRhL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eRhL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png" width="290" height="290" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:290,&quot;bytes&quot;:1587258,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eRhL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!eRhL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!eRhL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!eRhL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8af567-222e-4864-a028-2d823f5fc7f9_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On October 10, 2022, Nikesh Arora, the CEO of Palo Alto Networks (PANW), gave an <a href="https://www.calcalistech.com/ctechnews/article/byidvs00vi">interview</a> to Sophie Shulman of CTECH by Calcalist. In that interview, he talked about his background and history, how he views business success, his decisions to leave both SoftBank and Google, and, most importantly to this article, his predictions on the cybersecurity market.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you like this post please subscribe to our weekly newsletter and monthly deep thought pieces! We appreciate YOU!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>First, the BHAG</h2><p>Arora came to Palo Alto knowing nothing about cyber, but a lot about how to grow a business from small numbers to much bigger numbers by looking at the market as a whole. Despite this lack of cyber experience, or maybe &lt;more likely&gt; because of it, Arora grew Palo Alto Networks from a $19 billion valuation in 2018 to $50 billion in 2022. That wasn&#8217;t the big goal, though. <strong>Arora&#8217;s BHAG was to double PANW&#8217;s valuation to $100 billion and become the first cyber company to hit that goal. He did it before the end of 2023, just over a year later.</strong> And it looks like PANW&#8217;s valuation and market share will continue to grow. So how&#8217;d Arora do that in a year that saw market consolidation, more difficulty in getting funding for small players, longer sales cycles, and more challenges in closing deals? </p><h2>More Cyber Attacks, More Regulation</h2><p>There&#8217;s no way to avoid saying this. The cyber industry gets more attention and more customers when there are a lot of cyber attacks, which often coincide (not coincidentally) with an increase in chaos in the world. Last year, there was plenty of chaos as the war in Ukraine dragged on, chaos that only increased when the war in Gaza began. FBI Director Christopher Wray is now warning that Chinese hackers are getting ready to <a href="https://www.usatoday.com/story/news/politics/2024/01/31/fbi-christopher-wray-chinese-hackers/72419856007/">target American infrastructure</a>, while Congress is <a href="https://apnews.com/article/ukraine-border-security-congress-0c35bad8790ccbbeed1bc14057457648">stalled</a> on providing aid to Ukraine, Israel, and Taiwan due to disagreements about border policies. These disputes embolden malicious actors to take advantage of areas of weakness.</p><p>Plus, the <a href="https://techcrunch.com/2023/12/18/new-sec-data-breach-disclosure-rules/">new U.S. Securities and Exchange Commission (SEC) regulations</a> regarding rapid, comprehensive reporting on cyber incidents in public companies went into effect on December 18, increasing the urgency to have the tools in place to be able to report on an adverse cybersecurity event within 96 hours of discovering the attack. The additional pressure on boards of directors to understand cybersecurity risk also changes how organizations make cyber investments and what they&#8217;ll expect of them. More regulations are coming, too, both related to incident reporting and artificial intelligence, particularly as hackers figure out how AI can help them carry out an attack successfully, and cybersecurity companies add AI capabilities to prevent those attacks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UlqV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UlqV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UlqV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UlqV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UlqV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UlqV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg" width="376" height="250.75274725274724" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:376,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Ex-SoftBank, Google Exec Nikesh Arora Becomes Billionaire With Palo Alto  Package - Bloomberg&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Ex-SoftBank, Google Exec Nikesh Arora Becomes Billionaire With Palo Alto  Package - Bloomberg" title="Ex-SoftBank, Google Exec Nikesh Arora Becomes Billionaire With Palo Alto  Package - Bloomberg" srcset="https://substackcdn.com/image/fetch/$s_!UlqV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UlqV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UlqV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UlqV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F737da5e7-0310-496b-9689-f7a006583dc6_2000x1334.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>More Money, Less Security?</h2><p>It rarely seems like a day goes by without <a href="https://www.thecyberwhy.com/p/2024-cybersecurity-breach-list">a significant breach</a> or a new <a href="https://www.techradar.com/pro/security/a-google-kubernetes-security-flaw-could-let-anyone-with-a-gmail-account-compromise-your-business">vulnerability</a>. Granted, sometimes the vulnerability sounds more critical than it is, either because it&#8217;s hard to take advantage of or it allows access to something that no one really cares about. Either way, there&#8217;s a lot of noise in the cybersphere. And perhaps because there are so many breaches, it&#8217;s hard not to wonder whether any of these companies actually have cybersecurity solutions in place.</p><p>The short answer is that they do, but hackers are getting faster and, frankly, better at executing attacks. Arora knows the answer is to deflect those attacks in hours instead of days. His acquisitions, combined with the belief that companies need modern, integrated cybersecurity systems, seem to be proving that PANW can do just that.</p><h2>Strategic Acquisitions and Integrations</h2><p>Last summer, Palo Alto indicated that point solutions were over and platforms needed to take over. It&#8217;s not new news. Plenty of companies have tried to make strategic acquisitions and built cyber platforms that deliver what companies need in terms of cybersecurity today, but none have really succeeded. Arora&#8217;s slightly different approach has been to build a comprehensive set of cyber products through acquisitions, with an increasingly close eye on how the technology will integrate with what it already has in place. </p><p>Unlike many other organizations that grow cyber capabilities through acquisition, Arora maintains the existing management and teams. He buys companies that have achieved product-market fit and have a management team with a strategy they can <strong>(and do</strong>) execute. Then, he leaves the managers of the acquired companies in charge of their departments, minimizing the disruption and loss of talent that so often comes with a poorly executed acquisition. That method helps integrate those new companies into PANW and increases the likelihood of quickly and successfully integrating the technology.</p><h2>The Next BHAG?</h2><p>Arora is getting a lot right for someone who didn&#8217;t know anything about cyber just 4 or 5 years ago. <strong>Clearly becoming the first $100 billion company wasn&#8217;t much of a stretch for Arora, for all that it sounded pretty audacious last year.</strong> So, what can we expect next? In the past, Arora hasn&#8217;t stuck around just because of an impressive compensation package. At Google and SoftBank, he got <a href="https://www.msn.com/en-us/money/companies/the-google-exec-who-bagged-a-record-breaking-salary-at-softbank-nikesh-aroras-rise-and-net-worth/ar-AA1mYus3">record-breaking comp packages</a> and still chose to move on to new challenges. He&#8217;s already proven his ability to build the world&#8217;s largest cyber company, so will his next BHAG be to expand market share to an unprecedented 200B in valuation? Or will he find a new company in a different industry to gain next-level success? Either way, he&#8217;s someone to watch as he sets his next BHAG and likely achieves it!</p>]]></content:encoded></item><item><title><![CDATA[Open, Public Networks are a Misnomer]]></title><description><![CDATA[So why do our standards continue to pretend they exist?]]></description><link>https://www.thecyberwhy.com/p/open-public-networks-are-a-misnomer</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/open-public-networks-are-a-misnomer</guid><dc:creator><![CDATA[Adrian Sanabria]]></dc:creator><pubDate>Tue, 23 Jan 2024 20:56:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_U0m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recall reading version 1.0 of the PCI DSS back in the mid-2000s. I remember reading something along the lines of, "protect cardholder data with strong cryptography during transmission over open, public networks.&#8221; I remember reading this and thinking, &#8220;Wow, payment data really doesn&#8217;t have to be encrypted on internal networks?&#8221;</p><p>I figured the PCI Council was easing us into the new standards and its hundreds of highly prescriptive requirements. &#8220;Surely we&#8217;ll be required to encrypt internal traffic in the next version,&#8221; I thought. It didn&#8217;t come in version 1.1 or 2.0. It didn&#8217;t come in 3.0, and now that 4.0 is here, it&#8217;s still apparently okay to let payment data get transferred unprotected, as long as it is on a &#8220;private&#8221; network.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to The Cyber Why or all your networks will become PUBLIC!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The thing is, there aren&#8217;t really any &#8220;public&#8221; networks. Frustratingly, we can&#8217;t really consider anything truly &#8220;private&#8221; either.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_U0m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_U0m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_U0m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_U0m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_U0m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_U0m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg" width="356" height="237.808" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:334,&quot;width&quot;:500,&quot;resizeWidth&quot;:356,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;LoRaWAN public vs. private networks in building management - Wattsense&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="LoRaWAN public vs. private networks in building management - Wattsense" title="LoRaWAN public vs. private networks in building management - Wattsense" srcset="https://substackcdn.com/image/fetch/$s_!_U0m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_U0m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_U0m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_U0m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca42b3c6-28e1-4a15-a3b3-a21f96d62558_500x334.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>The original reason we created this public/private nomenclature was all about control. Private networks were ones that were entirely controlled by one organization. Public networks were those where multiple organizations handed off our network traffic for it to get from point A to point B. The Public Internet, in other words. In theory, since this traffic crosses the network of untrusted organizations (ISPs, telecoms, government-owned utilities in some cases), these untrusted parties could capture the traffic crossing their segment of the public Internet and abuse or misuse it.</p><p>In reality, it wasn&#8217;t practical for malicious parties to compromise these networks to access this juicy, unencrypted data. It was far easier to attack target organizations directly to get access to this data. When TJX&#8217;s internal networks were compromised, the PCI Council responded (<a href="https://www.wired.com/2009/07/pci/">4 years later</a>) by treating wireless networks as &#8220;public&#8221; networks, rather than treating internal networks as untrusted.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EQMg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EQMg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EQMg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EQMg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EQMg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EQMg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg" width="1456" height="437" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:437,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is Zero Trust? | Apporto&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is Zero Trust? | Apporto" title="What is Zero Trust? | Apporto" srcset="https://substackcdn.com/image/fetch/$s_!EQMg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EQMg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EQMg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EQMg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc367db53-5c9a-4a28-852c-06ead827d24e_2560x768.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image borrowed from: <a href="https://www.apporto.com/what-is-zero-trust">HERE</a></figcaption></figure></div><p>Not long after that time, John Kindervag introduced the concept of Zero Trust - a philosophy that assumes networks and other resources should be inherently untrusted. In another five years, cybercriminals would shift to organization-wide extortion tactics using ransomware. Ransomware attacks require access to &#8220;private&#8221; networks and systems and are so common that most ransomware attacks don&#8217;t even appear in the news anymore.</p><blockquote><p>It is long past time to stop pretending that any network can remain private. We can&#8217;t keep pretending that &#8220;internal&#8221; networks are safe enough to send sensitive data in the clear. Encrypting data in transit should be considered basic hygiene and ubiquitous.</p></blockquote><p>The <em>really </em>painful bit is that encrypting data on the wire doesn&#8217;t really solve anything. Attackers aren&#8217;t breaking weak transport encryption or stealing data by capturing packets - they compromise hosts, log into databases, and grab data off file systems. </p><p>Sadly, it seems we&#8217;ve got significant catching up to do, and that will take a lot of effort. Even more SADLY, this effort likely won&#8217;t get us very far.</p><p>To continue the conversation, either comment here, or check out <a href="https://www.linkedin.com/posts/adrian-sanabria_i-was-catching-up-on-pci-40-and-am-a-bit-activity-7155193390479937536-Qeiz">my LinkedIn post</a> on this topic!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Please subscribe to The Cyber Why for more great content!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Margin Crush is Coming in 2024]]></title><description><![CDATA[Decreasing margins in 2024 will make acquisition numbers jump.]]></description><link>https://www.thecyberwhy.com/p/the-margin-crush-is-coming-in-2024</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/the-margin-crush-is-coming-in-2024</guid><dc:creator><![CDATA[Tyler Shields]]></dc:creator><pubDate>Sun, 21 Jan 2024 19:46:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Costs are rising, prices are coming down, unit economics are going sideways, and cybersecurity startups must adapt. Cybersecurity SaaS businesses are undergoing several significant changes that will hurt the broader market. This is what it all means.</p><h2>A Quick Primer on Margins</h2><p>Here&#8217;s a quick lesson for those not versed in success metrics in software businesses. Gross margin is the difference between the cost to make software and the price at which you sell. There are many different types of &#8220;margin,&#8221; but the image below represents the most common math used in cybersecurity businesses at the board level.</p><p>Traditionally, in a software business, it&#8217;s widely believed that 85%+ is a good level of expected gross margin on software you sell. In board meetings everywhere, investors and business leaders track margins to ensure you aren&#8217;t losing money on each new subscriber to the business. This directly ties to the unit economics of the business and is a great way to determine how successful any business will be over time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SsMk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SsMk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!SsMk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!SsMk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!SsMk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SsMk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png" width="556" height="312.75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:556,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What Is SaaS Gross Margin and How Do You Calculate It?&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What Is SaaS Gross Margin and How Do You Calculate It?" title="What Is SaaS Gross Margin and How Do You Calculate It?" srcset="https://substackcdn.com/image/fetch/$s_!SsMk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!SsMk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!SsMk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!SsMk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4c7854-35d7-4b89-9551-d9fdb2ccea8f_1600x900.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.chargebee.com/resources/glossaries/saas-gross-margin/">Definition of Gross Margin from ChargeBee...</a></figcaption></figure></div><h2>Business Math Basics</h2><p>Now that we have the introduction aside, here&#8217;s the exciting part of the story. In 2022 through 2023, the world saw unit economics for subscription businesses start to change. The macroeconomic conditions in the United States put significant downward pressure on the price at which we could sell software, resulting in a lower revenue number. Businesses had to cut their prices to continue driving sales and extend their runway without returning to the investors in a down business cycle for more funding. If they didn&#8217;t lower their prices, they sold less software (or possibly both things happened), and revenue dipped either way.</p><p>At the same time, we have seen a continued increase in the price of cloud services required to build modern SaaS software businesses. Cloud services, specifically storage and read/write activities, have dramatically increased the cost of running a SaaS software business. This is represented in the gross margin equation's denominator and again puts pressure on the result.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p><p>All businesses will suffer when they see a top-line decrease in price and, therefore, revenue, coupled with a bottom-line increase in cost. Add to that the fact that cybersecurity products are going through a reinvention that requires a significant increase in the storage of large quantities of contextual data, and we see not just an increase in cost but an explosion in the bottom line of the margin equation. </p><p><em><a href="https://www.thecyberwhy.com/p/the-next-era-of-cyber-security-capabilities">See my piece on the Next Era of Cybersecurity Capabilities for more details on this reinvention.</a></em></p><p>All this &#8220;business math&#8221; leads to a lousy situation for software-as-a-service cybersecurity startups. The idea that we will be able to keep 85% margins on successful businesses in the future is becoming a fallacy. In the next 12 months, successful SaaS cybersecurity companies will see acceptable margins drop to the 50-60% range. Because of this, we will have to decrease the size of our sales and marketing engine, lower the number of engineers available to grow the business, and rely on things like AI and co-pilot style development to ensure that we have a stable and prosperous company. </p><p>The only other option will be to re-engineer our SaaS products to operate in a hybrid on-premise and cloud model or create BYOC solutions so that compute and storage costs can be passed through to the buyer of the product. By requiring the buyer to create their own storage and compute nodes to run our software, we can keep the cost of goods sold to a minimum and continue to see the traditionally high gross margin levels.</p><h2>The Trickle-Down Effect of Pricing Pressure</h2><p>Higher gross margin means higher valuations in both private and public companies. As you can see in the chart below from CloudZero, as the gross margin increases, so does the value of the business. The valuation is very important when it comes to raising capital, M&amp;A, and stock options for your employees.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CdgD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CdgD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp 424w, https://substackcdn.com/image/fetch/$s_!CdgD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp 848w, https://substackcdn.com/image/fetch/$s_!CdgD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp 1272w, https://substackcdn.com/image/fetch/$s_!CdgD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CdgD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp" width="1432" height="900" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:900,&quot;width&quot;:1432,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Why SaaS Companies Are Reporting Weaker Margins Than They Need To&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Why SaaS Companies Are Reporting Weaker Margins Than They Need To" title="Why SaaS Companies Are Reporting Weaker Margins Than They Need To" srcset="https://substackcdn.com/image/fetch/$s_!CdgD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp 424w, https://substackcdn.com/image/fetch/$s_!CdgD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp 848w, https://substackcdn.com/image/fetch/$s_!CdgD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp 1272w, https://substackcdn.com/image/fetch/$s_!CdgD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F567daa6a-2650-44a7-8dd7-62d6d7ba41f7_1432x900.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.cloudzero.com/blog/reporting-weak-margins/">Image from an article by CloudZero</a></figcaption></figure></div><p>Price pressures, increases in cloud costs, and the resulting valuation decreases will result in a race to the gross margin-bottom for many markets. The best business leaders will rightsize their business expectations, allowing them to execute on a much longer timeline and, if possible, reach profitability well before initially intended. </p><h2>The Impact On Investment and M&amp;A</h2><p>Venture capital is designed on a power law model, meaning that a select few investments return the entire fund, while most invested businesses go to zero. Suppose existing SaaS cyber companies retool their business to become profitable quicker instead of building towards the massive growth exit. In that case, it will permanently upset the apple cart that is venture investment in early-stage SaaS companies. This will decrease venture investment in the future due to limited returns to the venture LP base. We&#8217;re already seeing this in private funding numbers as tracked on Crunchbase.com.</p><p>When markets decrease in size and value, companies within them become logical acquisition targets for rollups and strategic acquisition plays. Most private equity investors are happy purchasing a company that is growing in the 10-20% annual range as they will inject efficiencies post-acquisition to help them get to scale and profitability as soon as possible. If the net impact of cost and margin changes identified earlier come true, the companies will better fit private equity than traditional venture investment. This will result in an increase in exits to private equity firms in 2024 for cybersecurity-related SaaS companies. Those companies with significant scale will be the first to be snapped up. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/p/the-margin-crush-is-coming-in-2024?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/p/the-margin-crush-is-coming-in-2024?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>The Big Winner - At Scale Contextual Security</h2><p>Healthier companies are an easier acquisition for strategic acquirers as well. Consider the Palo Alto Networks and Cisco Systems style, publicly traded companies out there. They both reinvented themselves not by innovating internally but instead by acquiring emerging cloud and application security companies to become dominant players in the market. Strategic acquisitions from large companies such as these, looking to increase the amount of contextual data under their control, will increase in quantity as SaaS-based cyber companies make themselves look pretty from a margin perspective. The end result should be an increase in momentum around the contextual cybersecurity data play and a significant move by major cyber vendors looking to unify the global cybersecurity market.</p><h2>Let&#8217;s Go Out On A Limb - An Odd Prediction</h2><p>As a closing thought and a long-shot bet, I have a final crystal ball prediction. Suppose the gross margin impact prediction comes true and the cloud services do not correct their pricing. In that case, we will eventually see hybrid hardware and bring your own cloud offerings take over for SaaS software only as businesses move to the on-premise approach and look for optimizations in speed and pass-through cost on the customer site. This will directly result in a rethinking of cybersecurity responsibilities and again require the CISO to reconsider where she places her trust. </p><p>Because of the impact of cloud costs and decreasing margins, I believe that there will be less cloud-focused innovation and less financial capital injection into young cyber software-as-a-service startups in the coming years. Services approaches and on-premise models come in waves, and I believe we are cresting the peak of a recent wave. The era of insane exit multiples and crazy returns for SaaS-specific cybersecurity investing is over. Lick your wounds. Exit what you can in 2024. And find a new way to make money.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberwhy.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[The Next Era of Cyber Security Capabilities]]></title><description><![CDATA[Context is the mortar and AI are the bricks that stand up the new cyber platform]]></description><link>https://www.thecyberwhy.com/p/the-next-era-of-cyber-security-capabilities</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/the-next-era-of-cyber-security-capabilities</guid><dc:creator><![CDATA[Tyler Shields]]></dc:creator><pubDate>Sat, 25 Nov 2023 15:13:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2dSw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>The difference between traditional cybersecurity products and modern cybersecurity platforms lies in the use of context (vs. data) and AI to facilitate more intelligent and accurate decisions.</strong> </p><p>This wave of change hasn't emerged suddenly; it has been rising and swelling over several years, leading to an inflection point where we witness a drastic shift from the status quo. This new era of cybersecurity capabilities is arriving more swiftly than anticipated, poised to transform daily cybersecurity operations.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe for more essays. It&#8217;s FREE!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Data Collected - Analysis Engine - Actionable Output</h3><p>Cybersecurity technologies, like all software, adhere to a basic framework encompassing data intake, data analysis, and the generation of actionable output. For instance, a traditional application security static code analysis tool ingests the binary or source code of applications, conducts an analysis to detect vulnerabilities, and then produces a list of exposures with remediation instructions. This framework can describe nearly any cybersecurity technology on the market today. While it's a nuanced and focused version of general software theory, it's beneficial to consider cybersecurity within this framework as it offers a means to differentiate between technologies.</p><p>Historically, cyber companies have distinguished themselves in at least one aspect of this framework when building their products. They often highlighted a "superior analysis engine" as the primary reason for being a more effective solution in detecting attacks or attackers. This approach led to a point-solution strategy in cybersecurity, where products excelled in resolving specific issues but lacked integration with other siloed technologies. As a result, "defense in depth" became the expected norm.</p><p>The popularity of defense in depth surged as enterprise cybersecurity teams amassed various solutions in pursuit of the ideal combination of detection, protection, and response technologies. This method, akin to needing a better mousetrap (analysis engine) that targets only mice while ignoring other creatures, propelled the cybersecurity market towards a focus on identifying more vulnerabilities and exploits rather than mitigating risk. To effectively reduce risk, the value proposition of products must evolve beyond mere issue detection to encompass other elements of the foundational framework.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2dSw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2dSw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!2dSw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!2dSw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!2dSw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2dSw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp" width="378" height="378" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:378,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated by DALL&#183;E&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated by DALL&#183;E" title="Generated by DALL&#183;E" srcset="https://substackcdn.com/image/fetch/$s_!2dSw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!2dSw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!2dSw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!2dSw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcc048fc-1a93-4f70-99a7-20ac92a54b0e_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>API and Cloud Adoption Drive The New Security Data Fabric</h3><p>With the growing adoption of cloud infrastructure, software as a service (SaaS), and API-based communications, our access to data has significantly expanded. Data is now omnipresent and readily accessible via APIs.</p><p>Transitioning workloads to the cloud removed them from traditional data centers, placing them in environments where every aspect, including configuration and current state data, is accessible through APIs. The rise of SaaS usage transferred corporate data into the hands of third parties, offering API-based access in return. Moreover, the explosion of API communication patterns, as applications were segmented into smaller components to exploit cloud-native services, gave rise to microservices and service mesh architectures, all underpinned by API communication models.</p><p>In today's world, we are inundated with data, possessing the capability to access extensive enterprise information in real-time, often with minimal programming expertise. The common saying, "There's an app for that," has evolved to "There's an API for that!"</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mg4_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mg4_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!mg4_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!mg4_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!mg4_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mg4_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp" width="374" height="374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:374,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated by DALL&#183;E&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated by DALL&#183;E" title="Generated by DALL&#183;E" srcset="https://substackcdn.com/image/fetch/$s_!mg4_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!mg4_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!mg4_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!mg4_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bec212b-138d-458e-97df-80d5bafc26a9_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Context Is The Next Wave of Oil</h3><p>Isolated data fragments are limited in utility. Data's value multiplies exponentially when numerous pieces are combined, providing insights unattainable in isolation. Consider a scenario where your car has a flat tire and is involved in an accident on the same day. One could infer that the flat tire either caused or resulted from the accident.</p><blockquote><p><strong>When two or more pieces of data are near each other in logical proximity, we may gain additional insights and value that couldn&#8217;t be perceived when the data points were viewed in isolation. </strong><em><strong>This is context, and context is king.</strong></em><strong> </strong>Taking multiple data points and looking at them holistically to make more competent observations is contextual awareness, which humans are really good at.</p></blockquote><p>We live in a world with more data and, thus, more context than ever. In addition to quantity, this breadth and depth of data is available programmatically, increasing the speed at which systems can consume and analyze it to create additional context. More context begets more data, so the virtuous cycle continues as analysis creates and builds more and more contextual knowledge, feeding on itself as the gravitational pull between the raw data and the contextual output becomes more intense. The pace of contextual creation is gaining speed, and there is no way to stop it.</p><p>Context has become the new oil. As technology and software companies devise systems that amass vast data collections, the contextual insights gleaned from analysis generate a network effect for the owning businesses. Context transforms into the high-octane fuel powering the engines of artificial intelligence and future computing systems.</p><h3>Improved Analysis with AI-Derived Contextual Decisions</h3><p>Humans excel at drawing connections and inferences from discrete data points. We are adept at observation and recollection, enabling informed and intelligent decision-making. However, humans are not as efficient in the speed of analysis. Becoming a subject matter expert involves years, sometimes decades, of focused study and experience, a gradual ascent up "knowledge mountain."</p><p>In contrast, computers excel in processing speed, designed for swift execution of processes and data analysis. The advancements in artificial intelligence have enabled computing systems to process vast amounts of data and solve complex problems in a fraction of the time required for human analysis. What might take a human a decade to learn, AI can master in mere weeks or months.</p><p>Simply put, artificial intelligence involves processing massive data sets, posing context-based questions in natural language, and rapidly deriving accurate answers. As AI's analytical capabilities evolve with our expanding data access, context will multiply exponentially. Over time, AI will become more adept and intelligent, drawing inferences not just from raw data but from the amalgamation of multiple contextual elements, now seen as a data superset. </p><blockquote><p>In this equation, Context + Context = Consciousness. Applying these analysis techniques to cybersecurity, as previously discussed, suggests that cybersecurity technologies are on the brink of a revolutionary capability to observe and protect our cyber universe like never before.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!42uX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!42uX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!42uX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!42uX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!42uX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!42uX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp" width="374" height="374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:374,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated by DALL&#183;E&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated by DALL&#183;E" title="Generated by DALL&#183;E" srcset="https://substackcdn.com/image/fetch/$s_!42uX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!42uX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!42uX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!42uX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F553adad9-bc26-42c9-b9c2-eb6fa6de44ef_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Automated Workflows On Accurate Data</h3><p>In cybersecurity, there's a prevailing belief that automated solutions to security issues are risky, as errors could compromise services, networks, or applications, eroding trust in both the automation and the security team. Historically, this caution was warranted, as security automations were not context-aware and relied solely on raw data, lacking the nuanced decision-making akin to human consciousness. The risk of technology-driven decisions was deemed too high.</p><p>However, today's landscape is different. Our source data comprises analyzed context, offering a more precise foundation for decision-making. Our analysis engines now emulate human consciousness through AI, utilizing a very rich data set. Furthermore, our outputs are expected to yield unparalleled data comprehension and accuracy. If these factors hold true, we can automate fixes with a sufficiently low-risk level, making automation preferable to human intervention.</p><h3>The New Cyber Platform</h3><p>To reiterate: <strong>"The difference between traditional cybersecurity products and modern cybersecurity platforms is the incorporation of context (data) and AI to enable more intelligent and accurate decisions.</strong>"</p><p>The question isn't if we can develop a cybersecurity platform that emulates human behavior and intelligence, executing its recommendations in real-world scenarios, but when? As AI and contextual understanding evolve alongside the proliferation of APIs, so too does our intelligence's richness. Gradually, we will build trust in the system's answers to complex questions, allowing for autonomous corrections. This progression could mark the beginning of a significant advantage in the fight against cyber attackers. The barriers separating technologies, people, processes, and data will crumble, granting us a comprehensive view of the cybersecurity context and, hopefully, a real chance at success.</p><p>...until, of course, attackers begin to leverage the same contextual insights.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Cyber Why. Please subscribe for more thought-provoking content.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[AI Will Be the Next New Massive Platform]]></title><description><![CDATA[Don't underestimate the hype as AI reshapes the world!]]></description><link>https://www.thecyberwhy.com/p/ai-will-be-the-next-new-massive-platform</link><guid isPermaLink="false">https://www.thecyberwhy.com/p/ai-will-be-the-next-new-massive-platform</guid><dc:creator><![CDATA[Tyler Shields]]></dc:creator><pubDate>Thu, 15 Jun 2023 13:50:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>My partner in crime <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Adrian Sanabria&quot;,&quot;id&quot;:11988704,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/4ac0fb06-ca31-4031-b771-baf3ec53bd46_679x679.jpeg&quot;,&quot;uuid&quot;:&quot;fd39d417-38c2-433f-b54e-344a3a8a3520&quot;}" data-component-name="MentionToDOM"></span> wrote a post recently that had me all worked up (ok not THAT worked up.. but I still disagree.) I watched the same All-In Podcast that triggered his thoughts on &#8220;AI as a platform,&#8221; and I had an opposite reaction than he did. </p><p><strong>IMHO: AI will be globally transformative and act as the underlying platform for future technologies.</strong> </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Why is a reader-supported publication. To receive new posts and support my work, consider becoming a free subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Here is the link to the episode at the exact point of the Doug Leone comments on AI being a platform. It&#8217;s short&#8230; give it a listen. <em>*Side note, I introduced Adrian to the All-In Pod.. so yeah.. take that!</em></p><div id="youtube2-FOuks3BM55o" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;FOuks3BM55o&quot;,&quot;startTime&quot;:&quot;467&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/FOuks3BM55o?start=467&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1>The Hype is Indeed Intense</h1><p>The hype around AI reminds me of the web hype cycle in 1999 in silicon valley. I moved to the bay area in 1997 for a startup. I dropped out of undergrad in western New York and flew across the country with only a signing bonus in my pocket - no bed, no clothing, no nothing. I had to sleep on the floor in the closet of my tiny little studio apartment across the street from 1 Infinite Loop (Apple HQ). Until I could get settled in. I often stayed overnight at my employer's office with a blanket and pillow I borrowed from the engineering closet. Everyone was doing it! The world wide web had taken hold of the universe, and the hype was out of control. You couldn&#8217;t avoid the topic. Websites for every possible idea were being built left and right and funded into existence by insane amounts of venture capital flooding the valley's streets.</p><p>Where there is smoke, there is fire. Insane funding amounts don&#8217;t happen in a vacuum with a total result of failure. They happen when the herd mentality that is venture capital connects so violently with an investment thesis that anyone with a vague idea for a product can get funded. Today is no different with AI. You can get funded if you have anything to do with AI, whether focused on a single solution or a broader vision of what AI could mean to society. The bulk of the projects will miss. We will likely end up with an AI investing bubble resulting in a crash of AI projects when they realize specifically what it takes to be successful in this market. Like the .com era, from those ashes will arise a phoenix that ends up being the top-tier companies and products of the time, and going forward, they will dominate AI as it takes over the world - much like websites eventually did!</p><h3>What Makes a Platform</h3><p>We must first extrapolate a clear definition of the word to determine if AI is a platform. Of course, the most logical thing to do for this article is to ask ChatGPT how to define the term. So we did just that:</p><blockquote><p><em>In general, a platform refers to a base or foundation upon which something else is built or supported.</em></p><p><em>In technology, a platform refers to a software or hardware environment that enables the development and deployment of applications or services. For example, the Android operating system is a platform for developing mobile applications.</em></p><p><em>In business, a platform can refer to a company or organization that provides a set of tools or services that enable other businesses or individuals to build their own products or services. For example, Amazon Web Services (AWS) is a platform that provides cloud computing infrastructure and services to other businesses.</em></p></blockquote><p>So essentially, if someone can build a product on top of another tool, that tool becomes a platform.  OpenAI introduced the concept of ChatGPT Plugins on March 23, 2023. According to ChatGPT and Bing AI search, 120 plugins are available as of May 20, 2023. As of February 2023 (yes, before the release of plugins), OpenAI&#8217;s API received an average of 3 million API calls per day, totaling over 1.5 billion examples per month. It is clear enough to say that people are building on top of OpenAI and that we should consider it a platform. To ensure I wasn&#8217;t crazy, I asked ChatGPT if OpenAI was a platform.</p><blockquote><p>Yes, OpenAI can be considered a platform in the sense that it provides a variety of resources and tools for artificial intelligence (AI) research and development. These resources include AI models like GPT-3 and Codex, a cloud-based API for interacting with these models, and research papers and data sets that support the broader AI community. OpenAI's goal is to ensure that artificial general intelligence (AGI) benefits all of humanity, and it provides these resources as part of its mission to directly build safe and beneficial AGI, or to aid others in achieving this outcome.</p></blockquote><p>That&#8217;s enough evidence to declare that most AI technology being used today (specifically OpenAI and ChatGPT) is indeed a platform. But how do we know if this is the platform that becomes transformative to the future of how we operate our lives daily? <em>Is AI going to be the &#8220;Next New Massive Platform!&#8221;</em> </p><p>When I start talking about the grand vision of AI disruption, people often throw other recent hype cycles in my face. The one I get most frequently is the debate that crypto would be the next massive transformative technology platform that changes how the world operates. This was just a bunch of hype with no real value behind it (at least, that&#8217;s my take on it). So what makes AI any different? Why will AI become the next .com wave that massively changes our lives?</p><h3>Waves Dominate When Value Is Provided</h3><p>Truth be told, I fell for a bit of the hype in the crypto run-up. I made a lot of money buying useless shit-coins and then lost it all when the bubble burst. I fell for people telling me that actual value was coming soon. While I didn&#8217;t fall for the &#8220;Bitcoin will rule the world&#8221; rhetoric, I did fall in love with the concept of smart contracts and using the blockchain to provide immutability of data and an accurate trail of operations that the world could see. I also believed in the idea of compute on the chain and having automated execution of code within those smart contracts. The key thing to learn from what happened to me was that I &#8220;BELIEVED IN IT,&#8221; &#8230; but I didn&#8217;t really &#8220;DERIVE VALUE FROM IT.&#8221;</p><p>In actuality, there was very little development on top of the blockchain that showed ACTUAL value to the end users of the products. Sure, there were crypto kitty games, drug and weapon purchases from dark web sites, and even some smart contract usage for certain niche needs. But we never really saw a world where blockchain and crypto came to provide real value to the daily lives of a random person with minimal technical capability. Crypto and blockchain became odd technology terms the masses didn&#8217;t understand or care about. Outside of gambling in shitcoins, the average person didn&#8217;t USE the blockchain or crypto.</p><p>AI is different. AI is a true platform with an exponential level of adoption. And we aren&#8217;t just seeing technology built for technology's sake because many smart people think it would be cool. We&#8217;re seeing LIVE applications of AI in the products we use every day and direct interaction with AI systems to ease the burdens of doing work daily. <a href="https://aistratagems.com/chat-gpt-4-stats/">This is the exact definition of the masses finding value from a technology platform</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nL-E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nL-E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png 424w, https://substackcdn.com/image/fetch/$s_!nL-E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png 848w, https://substackcdn.com/image/fetch/$s_!nL-E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png 1272w, https://substackcdn.com/image/fetch/$s_!nL-E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nL-E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png" width="1251" height="985" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:985,&quot;width&quot;:1251,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Artificial Intelligence: Still a Long Way from Judgment Day | U.S. GAO&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Artificial Intelligence: Still a Long Way from Judgment Day | U.S. GAO" title="Artificial Intelligence: Still a Long Way from Judgment Day | U.S. GAO" srcset="https://substackcdn.com/image/fetch/$s_!nL-E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png 424w, https://substackcdn.com/image/fetch/$s_!nL-E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png 848w, https://substackcdn.com/image/fetch/$s_!nL-E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png 1272w, https://substackcdn.com/image/fetch/$s_!nL-E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8793f9-87d1-4ac1-b4a1-ef7033e12add_1251x985.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">DARPA - Three Waves of AI</figcaption></figure></div><h3>Finding Value from AI Today</h3><p>To drive home the point of value being provided by AI today, I&#8217;ll attempt to enumerate where I touch AI (or AI touches me) every day.</p><ul><li><p>As I read news articles daily, I use a web clipper to automatically grab the article text, enter it into a database in Notion, use notion AI to summarize the article, and write three jokes. AI then creates a tweetstorm that I occasionally use to write tweets about things I read. The Cyber Why team then peruses this information weekly and writes our newsletter. While we rarely use the summary and joke text directly, the content definitely influences our decisions on the text that makes it into each piece. As the content improves, I'm sure we will start using it more directly!</p></li><li><p>I&#8217;ve built a system that creates a text transcript of every meeting that I have, then using AI, summarizes the meeting, creates action items, emails me the action items list, adds it to a TODO list, and stores everything in a big daily notion database with a great calendar view. While I have homegrown this system myself, it won&#8217;t be long before you can pay someone like <a href="http://sembly.ai">sembly.ai</a>, <a href="http://fireflies.ai">fireflies.ai</a>, <a href="http://otter.ai">otter.ai</a>, or some other system to be your second brain. I plan to shelve my homegrown solution as soon as the products are baked enough to be fully usable.</p></li><li><p>Working with clients as a fractional CMO, I often have to be creative. ChatGPT and OpenAI are my friends. I frequently use them to create that first big content lump of clay that I can form and mold into something you, as a reader, are interested in. I can do that right in the ChatGPT interface and prompt engineer my way to a successful piece, or I can take a first pass out of ChatGPT and mold the clay by hand. As I write, grammar.ly takes an AI approach to help me write in real-time. Additionally, I have Google AI built into Google Docs that I often use to help me create text.</p></li><li><p>Finally, I am exploring an AI-backed contact management system and personal CRM. The system takes all my contacts, meetings, and emails and helps me determine who to stay in touch with and for what reasons. The system then guides me with automatic email options to sync and connect with people from my personal and business worlds. This is a fantastic new concept for people like me that are naturally introverted and horrible at staying in touch with people no matter how much I want to.</p></li></ul><p>As you can see, I am a believer in the AI hype. The daily use cases are real, and the average human being will be significantly impacted by the progress of AI sooner rather than later. We are at the precipice of a massive change in how the technology we use everyday functions. AI is the underlying platform upon which we will build the next generation of transformative technologies!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberwhy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Why is a reader-supported publication. To receive new posts and support my work, consider becoming a free subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>