<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cybersecurity Pulse (TCP): Deep Cuts]]></title><description><![CDATA[The deep cuts. Original research and analysis on security trends, M&A, and the vendor landscape.]]></description><link>https://www.cybersecuritypulse.net/s/deep-cuts</link><image><url>https://substackcdn.com/image/fetch/$s_!qMTq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fef06d7-bf82-40ef-855b-21ff2898ce23_200x200.png</url><title>The Cybersecurity Pulse (TCP): Deep Cuts</title><link>https://www.cybersecuritypulse.net/s/deep-cuts</link></image><generator>Substack</generator><lastBuildDate>Fri, 01 May 2026 23:37:48 GMT</lastBuildDate><atom:link href="https://www.cybersecuritypulse.net/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Darwin Salazar]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[TheCybersecurityPulse@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[TheCybersecurityPulse@substack.com]]></itunes:email><itunes:name><![CDATA[Darwin Salazar]]></itunes:name></itunes:owner><itunes:author><![CDATA[Darwin Salazar]]></itunes:author><googleplay:owner><![CDATA[TheCybersecurityPulse@substack.com]]></googleplay:owner><googleplay:email><![CDATA[TheCybersecurityPulse@substack.com]]></googleplay:email><googleplay:author><![CDATA[Darwin Salazar]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Dust Has Settled: Top Takeaways from RSAC & BSidesSF 2026]]></title><description><![CDATA[Build vs. buy, decoupled SOCs, MCP, and the builder mindset.]]></description><link>https://www.cybersecuritypulse.net/p/the-dust-has-settled-top-takeaways</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/the-dust-has-settled-top-takeaways</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Tue, 31 Mar 2026 17:54:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!o2sR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The Cybersecurity Pulse (TCP)</strong>! I&#8217;m Darwin Salazar, Head of Growth at <strong><a href="https://www.monad.com/">Monad</a></strong> and former detection engineer in big tech. Each week, I bring you the latest security innovation and industry news. Subscribe to receive weekly updates! &#128231;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/25-million-alerts-one-year-of-real?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMTY2OTE1NTEsInBvc3RfaWQiOjE4OTk5NTgyNCwiaWF0IjoxNzczMTk3ODk5LCJleHAiOjE3NzU3ODk4OTksImlzcyI6InB1Yi0xMjU0OTkwIiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.uLri8qmd3TaY1NBupbqOvebAA6UkoZKWikyo0XeoQSw&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/p/25-million-alerts-one-year-of-real?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMTY2OTE1NTEsInBvc3RfaWQiOjE4OTk5NTgyNCwiaWF0IjoxNzczMTk3ODk5LCJleHAiOjE3NzU3ODk4OTksImlzcyI6InB1Yi0xMjU0OTkwIiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.uLri8qmd3TaY1NBupbqOvebAA6UkoZKWikyo0XeoQSw"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o2sR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o2sR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png 424w, https://substackcdn.com/image/fetch/$s_!o2sR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png 848w, https://substackcdn.com/image/fetch/$s_!o2sR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png 1272w, https://substackcdn.com/image/fetch/$s_!o2sR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o2sR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png" width="1440" height="811" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:811,&quot;width&quot;:1440,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1665856,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/192673867?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o2sR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png 424w, https://substackcdn.com/image/fetch/$s_!o2sR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png 848w, https://substackcdn.com/image/fetch/$s_!o2sR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png 1272w, https://substackcdn.com/image/fetch/$s_!o2sR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54544f84-e7e7-4cbe-99a5-49452d530d09_1440x811.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><strong>Introducing the AI Security Platform Built on Data Security</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mW4H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mW4H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png 424w, https://substackcdn.com/image/fetch/$s_!mW4H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png 848w, https://substackcdn.com/image/fetch/$s_!mW4H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png 1272w, https://substackcdn.com/image/fetch/$s_!mW4H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mW4H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png" width="401" height="77.14799154334038" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:91,&quot;width&quot;:473,&quot;resizeWidth&quot;:401,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mW4H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png 424w, https://substackcdn.com/image/fetch/$s_!mW4H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png 848w, https://substackcdn.com/image/fetch/$s_!mW4H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png 1272w, https://substackcdn.com/image/fetch/$s_!mW4H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe55fd890-83d1-4ccb-bc06-097a7ddb8d39_473x91.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p>AI adoption is exploding. But most security tools still can&#8217;t see what data AI is touching.</p><p>Varonis Atlas is designed to secure AI across the entire AI lifecycle, with data context built in. From visibility to runtime protection to governance, Atlas can secure everything you build and run with AI in one platform.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://hubs.ly/Q0470YYp0&quot;,&quot;text&quot;:&quot;See it in action here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://hubs.ly/Q0470YYp0"><span>See it in action here</span></a></p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SrMy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SrMy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png 424w, https://substackcdn.com/image/fetch/$s_!SrMy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png 848w, https://substackcdn.com/image/fetch/$s_!SrMy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!SrMy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SrMy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png" width="1456" height="1165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1165,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8054292,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/192673867?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SrMy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png 424w, https://substackcdn.com/image/fetch/$s_!SrMy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png 848w, https://substackcdn.com/image/fetch/$s_!SrMy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!SrMy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0de3f291-f16c-4eac-8832-d8993ca1de46_2000x1600.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">My RSAC 2026 in one photo</figcaption></figure></div><p>Though I&#8217;m still recovering from a 9-day conference stretch, this was easily my favorite BSidesSF + RSAC week. The energy was on point. I had 100+ conversations with security leaders on what they&#8217;re most excited about, biggest pain points, you name it. After RSAC, I ended up traveling 15 hours to another security conference where I presented on Saturday (more on that in a separate post ;)</p><p>It&#8217;s interesting because I wear multiple hats at conferences. I run this newsletter, so I&#8217;m always watching the emerging landscape from tradecraft to threats, tooling and capabilities, and how security leaders are future-proofing their teams and environments. </p><p>I&#8217;m also Head of Growth at Monad, so I do sales, marketing, and a bit of product management. If I learn that you have pain points Monad can solve, I will gladly pitch you on Monad and tell you about all the great stuff we&#8217;re up to. And at my core, I&#8217;m a security practitioner who still loves nerding out on how teams are staying current and how my previous crafts of detection engineering and cloud security continue to evolve.</p><p>That said, this post is an amalgamation and distillation of my biggest takeaways from the con from a holistic standpoint. Not my typical announcements roundup. That will come on Thursday! </p><div><hr></div><h3><strong>Build vs. Buy is Shifting</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3o8K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3o8K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3o8K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3o8K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3o8K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3o8K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg" width="801" height="507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:507,&quot;width&quot;:801,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:114259,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/192673867?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F765b2af1-6fd2-4704-8395-63bf647d131a_1024x768.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3o8K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3o8K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3o8K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3o8K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cf05054-3369-4643-9e8a-dcbe25e0c648_801x507.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In recent years, Build vs. Buy has become even more of a hot topic. The continual improvement of LLMs and agentic development has seriously lowered the barrier for entry. People are obviously all over the spectrum on this debate, but I feel like more people are leaning towards &#8220;Build&#8221; on certain categories than ever. </p><p>This was a main topic on the BSidesSF panel w/ security leaders from Anthropic, OpenAI, Perplexity, and Cursor. Here&#8217;s what stuck w/ me most after synthesizing a bunch of takes on this topic last week: </p><ul><li><p><strong>The gap between MVP and &#8220;production-ready&#8221; is where things get ugly.</strong> It varies by application, use case, and criticality, but that middle stretch is always messy.</p></li><li><p><strong>Shipping it is only the beginning.</strong> Even after something is production-ready, you still have to staff for maintenance and scalability.</p></li><li><p><strong>Some problems are just too hairy to own.</strong> Sometimes it makes more sense to pay someone else and hand off the problem entirely.</p></li></ul><div class="pullquote"><p><strong>Do you want to be the one on-call when the thing you built breaks at 2am?</strong> - <strong><a href="https://www.linkedin.com/in/jackie-bow-83933840/">Jackie Bow</a></strong>, Detection &amp; Response @ Anthropic</p></div><div class="pullquote"><p><strong>Midmarket Security Is Quietly Overconfident &#8212; And the Numbers Prove It</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kfq6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kfq6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png 424w, https://substackcdn.com/image/fetch/$s_!kfq6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png 848w, https://substackcdn.com/image/fetch/$s_!kfq6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png 1272w, https://substackcdn.com/image/fetch/$s_!kfq6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kfq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png" width="337" height="94.07648183556405" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:146,&quot;width&quot;:523,&quot;resizeWidth&quot;:337,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kfq6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png 424w, https://substackcdn.com/image/fetch/$s_!kfq6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png 848w, https://substackcdn.com/image/fetch/$s_!kfq6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png 1272w, https://substackcdn.com/image/fetch/$s_!kfq6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf928cf0-65bb-4208-b8dd-f73f9038fa44_523x146.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>94% of midmarket security leaders say they can catch critical risks before attackers do. But 51% admit a zero-day would take a week to assess. Something doesn't add up. <a href="https://www.intruder.io/?utm_source=cybersecuirtypulse&amp;utm_medium=p_referral&amp;utm_campaign=global%7Cfixed%7Cmiddle_child">Intruder</a> surveyed 500+ security decision-makers at companies with 400&#8211;6,000 employees to get the real picture of how teams are coping with growing digital estates, shrinking exploitation windows, and tooling built for enterprise budgets.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.intruder.io/downloads/security-middle-child-report?utm_source=cybersecuirtypulse&amp;utm_medium=p_referral&amp;utm_campaign=global%7Cfixed%7Cmiddle_child&quot;,&quot;text&quot;:&quot;Get the full report&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.intruder.io/downloads/security-middle-child-report?utm_source=cybersecuirtypulse&amp;utm_medium=p_referral&amp;utm_campaign=global%7Cfixed%7Cmiddle_child"><span>Get the full report</span></a></p></div><h3><strong>People Are Building Really Cool Things with AI</strong></h3><p>I had a few convos with security leaders including some at F500s who are super AI-pilled. We&#8217;re talking dedicated homegrown agents and skills for dozens of different security functions, mostly handling initial triage and investigations all the way through recommending remediation paths.</p><p><strong>I also spoke with a leader who built a living, digital twin of their entire environment.</strong> If an AWS asset config gets changed, the digital twin gets updated. If a new admin account is spun up in Okta, the digital twin records it. Now, this person is an anomaly and pretty forward-thinking, but I think more and more people will continue to get creative with AI for security in meaningful ways. The ones who think outside the box, own the future, as always. </p><div><hr></div><h3><strong>MCP is Changing the Game</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zw0Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zw0Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png 424w, https://substackcdn.com/image/fetch/$s_!zw0Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png 848w, https://substackcdn.com/image/fetch/$s_!zw0Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png 1272w, https://substackcdn.com/image/fetch/$s_!zw0Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zw0Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png" width="1446" height="876" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:876,&quot;width&quot;:1446,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:191814,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/192673867?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zw0Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png 424w, https://substackcdn.com/image/fetch/$s_!zw0Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png 848w, https://substackcdn.com/image/fetch/$s_!zw0Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png 1272w, https://substackcdn.com/image/fetch/$s_!zw0Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03e08bfb-8a99-4c6c-a7d8-7efdb89e6a23_1446x876.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Model Context Protocol (MCP) has played a massive role in modernizing security workflows. One leader I spoke with even said <strong>he won&#8217;t consider a new vendor if they don&#8217;t have MCP capabilities. </strong>I don&#8217;t agree with his take as I think MCP eats a lot of tokens.</p><p>But it does makes sense when you look at what it unlocks. Security teams are using MCP to give AI agents direct access to their tools. Think an AI assistant that can pull alert context from your SIEM, query your CMDB for asset ownership, and check your threat intel platform for IOC enrichment, all in a single investigation flow. Teams are also building MCP-enabled agents that can take action like isolating endpoints, creating tickets, or kicking off response playbooks based on findings. </p><p>It&#8217;s basically turning every security tool with an MCP server into a composable building block that AI can orchestrate across.</p><div class="pullquote"><p><strong>The security data lake for AI agents</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n89N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n89N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png 424w, https://substackcdn.com/image/fetch/$s_!n89N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png 848w, https://substackcdn.com/image/fetch/$s_!n89N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png 1272w, https://substackcdn.com/image/fetch/$s_!n89N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n89N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png" width="430" height="109.5673076923077" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:371,&quot;width&quot;:1456,&quot;resizeWidth&quot;:430,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!n89N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png 424w, https://substackcdn.com/image/fetch/$s_!n89N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png 848w, https://substackcdn.com/image/fetch/$s_!n89N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png 1272w, https://substackcdn.com/image/fetch/$s_!n89N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a65f3b-d168-43e6-b026-1db9719f4f75_1600x408.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Scanner is an agentic security data lake to investigate alerts, hunt threats, and respond to incidents. It indexes logs directly in S3, making years of data searchable in seconds. Scanner scales up when needed and scales to zero after, so you pay for answers, not idle compute. Open-source agents help you get started fast.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://scanner.dev/mcp-apis?utm_source=tcp&amp;utm_medium=email&amp;utm_campaign=tcp_march_18&quot;,&quot;text&quot;:&quot;See Scanner in Action&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://scanner.dev/mcp-apis?utm_source=tcp&amp;utm_medium=email&amp;utm_campaign=tcp_march_18"><span>See Scanner in Action</span></a></p></div><h3><strong>Decoupled Architectures for Security Operations</strong></h3><p>This goes hand in hand with the previous takeaway. More and more security leaders are considering a decoupled security architecture. Security data needs to live in more places than ever, especially with teams gaining more appetite to augment their tooling with homegrown capabilities. Recent breakthroughs are enabling teams to keep telemetry in ultra cost-effective, highly performant storage layers (<strong><a href="https://scanner.dev/">Scanner.dev</a></strong> being a prime example) while data pipeline players like <strong><a href="https://www.monad.com/">Monad</a></strong> have pretty much been the trojan horse enabling security teams to gain back control of how and where they route their data, with added benefits like enrichments and transformations that make data AI-ready.</p><p>I also heard more rumblings around federated search and how AI agents are good at querying data at the source for investigative work. The dust has yet to settle here but it&#8217;s clear that most security leaders are redrawing their SOC architectures, and there are a lot of emerging approaches and tooling to choose from. As someone who worked closely with Fortune 500 teams on detection engineering and response while at Accenture, this is a feel-good story. Security teams are breaking out of vendor lock-in and rebuilding their stacks with composable, best-of-breed solutions.</p><p><strong>I&#8217;d say that after a long, hard-fought battle, SIEMs are no longer the one-stop shop for security analytics, response, and investigations. </strong>MCP, data lakes, data pipelines, triage agents etc. have disrupted the SIEMs moat. What comes next? </p><div><hr></div><h3><strong>Talent and Upskilling</strong></h3><p>Security leaders are thinking hard about how to keep their teams at the forefront, not just of threats, but of evolving capabilities and tooling. They&#8217;re encouraging their people to adopt a builder mindset and go wider.</p><p>The world is changing fast. The ones who lean into the hacker and builder mindset will excel.</p><div><hr></div><h2><strong>Honorable Mentions</strong></h2><p><strong>Attack velocity + volume:</strong> Bad guys are using AI to find 0-days, exploit unpatched systems, and scale their campaigns. Defenders are cognizant of this and while there&#8217;s not an impending sense of doom, people are feeling the heat. </p><p><strong>Agentic AI Identity:</strong> Still the wild west. No clear winner or winning approach, imo but we&#8217;re getting closer.</p><p><strong>AI Pen Testing:</strong> Lots of funding and hype around it. I think it&#8217;s a space at risk if frontier model shops really wanted to go after it. Regardless, there&#8217;s a massive need for AI pen testing in validating vulns, securing new attack surface, and ensuring secure code and apps. This was a part of the security cycle that was painfully manual and having continual coverage here is a big upgrade.</p><p><strong>Data Security:</strong> Scorching hot space and a top concern. Agentic AI is creating entirely new data access patterns that most teams aren&#8217;t equipped to govern yet. When your AI agents can autonomously query databases, pull documents, and chain API calls together, the blast radius of a misconfigured permission or over-scoped identity gets a lot bigger. Lots of energy here, and rightfully so.</p><p><strong>Securing AI Code Gen Output and Agent Usage:</strong> Velocity and volume are big concerns, along with non-devs building small scripts to automate tasks. No clear winner here though the incumbents like Semgrep, Snyk, OX, etc. are shipping capabilities to keep up with the madness.</p><p><strong>Software Supply Chain Security:</strong> <strong>Software Supply Chain Security:</strong> This one keeps getting scarier and giving me whiplash. March alone gave us the <a href="https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack">TeamPCP cascading campaign</a> that started with compromising Aqua&#8217;s <a href="https://github.com/aquasecurity/trivy">Trivy</a> scanner, spread to Checkmarx KICS, and then used stolen CI/CD credentials to poison <a href="https://www.reversinglabs.com/blog/teampcp-supply-chain-attack-spreads">LiteLLM</a> on PyPI (a library present in 36% of cloud environments according to Wiz). <strong>One compromised security tool turned into five compromised ecosystems in under a week.</strong> </p><p>And then literally today, <a href="https://socket.dev/blog/axios-npm-package-compromised">Axios got hit</a> with a hijacked maintainer account pushing a RAT through poisoned npm releases to a package with 100M+ weekly downloads. The window was only a couple hours but the blast radius is wild.</p><p>Scary pattern. Recommend checking these blogs out if you&#8217;re responding to these attacks: </p><ul><li><p><strong><a href="https://socket.dev/blog/axios-npm-package-compromised">Supply Chain Attack on Axios Pulls Malicious Dependency from npm</a> </strong></p></li><li><p><strong><a href="https://www.stepsecurity.io/blog/trivy-compromised-a-second-time---malicious-v0-69-4-release">Trivy - StepSecurity</a></strong></p></li><li><p><strong><a href="https://www.reversinglabs.com/blog/teampcp-supply-chain-attack-spreads">LiteLLM - ReversingLabs</a></strong></p></li></ul><div><hr></div><p>The dust has settled on BSidesSF and RSAC 2026, but there is still SO much in flux for security teams. So in that sense, the dust may never for security teams. Just have to keep operating through the chaos which is easier when you have strong leadership + culture. Fun time to be in security. </p><p>I&#8217;ve still got a lot more to share. On Thursday, I&#8217;ll drop Part II covering the biggest announcements, my favorite events, and the overall vibes from the week etc. Stay tuned!</p><div><hr></div><h2><strong>Interested in sponsoring TCP?</strong></h2><p>Sponsoring TCP not only helps me continue to bring you the latest in security innovation, but it also connects you to a dedicated audience of 20,000+ CISOs, practitioners, founders, and investors across 135+ countries &#127758;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach&quot;,&quot;text&quot;:&quot;&#128073; Learn more here!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach"><span>&#128073; Learn more here!</span></a></p>]]></content:encoded></item><item><title><![CDATA[The AppSec Model Was Built for a World That's Disappearing.]]></title><description><![CDATA[AI code generation broke the math. Clover Security is building for what comes next.]]></description><link>https://www.cybersecuritypulse.net/p/the-appsec-model-was-built-for-a</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/the-appsec-model-was-built-for-a</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Wed, 11 Mar 2026 12:15:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Vn9N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The Cybersecurity Pulse (TCP)</strong>! I&#8217;m Darwin Salazar, Head of Growth at <strong><a href="https://www.monad.com/">Monad</a></strong> and former detection engineer in big tech. Each week, I bring you the latest security innovation and industry news. Subscribe to receive weekly updates! &#128231;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/25-million-alerts-one-year-of-real?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMTY2OTE1NTEsInBvc3RfaWQiOjE4OTk5NTgyNCwiaWF0IjoxNzczMTk3ODk5LCJleHAiOjE3NzU3ODk4OTksImlzcyI6InB1Yi0xMjU0OTkwIiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.uLri8qmd3TaY1NBupbqOvebAA6UkoZKWikyo0XeoQSw&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/p/25-million-alerts-one-year-of-real?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxMTY2OTE1NTEsInBvc3RfaWQiOjE4OTk5NTgyNCwiaWF0IjoxNzczMTk3ODk5LCJleHAiOjE3NzU3ODk4OTksImlzcyI6InB1Yi0xMjU0OTkwIiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.uLri8qmd3TaY1NBupbqOvebAA6UkoZKWikyo0XeoQSw"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Vn9N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vn9N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png 424w, https://substackcdn.com/image/fetch/$s_!Vn9N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png 848w, https://substackcdn.com/image/fetch/$s_!Vn9N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png 1272w, https://substackcdn.com/image/fetch/$s_!Vn9N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vn9N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png" width="1440" height="811" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:811,&quot;width&quot;:1440,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:607083,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/190579014?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Vn9N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png 424w, https://substackcdn.com/image/fetch/$s_!Vn9N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png 848w, https://substackcdn.com/image/fetch/$s_!Vn9N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png 1272w, https://substackcdn.com/image/fetch/$s_!Vn9N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9f16cd7-c4fc-4e0a-b743-b327d69698e6_1440x811.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2><strong>A Personal Note</strong></h2><p>Every now and again I come across a security vendor doing genuinely innovative and differentiated work. A breath of fresh air in a space full of copy/paste products with different logos.</p><p>I vet every TCP sponsor carefully to ensure I only put the best in front of you so if I&#8217;m writing a deep dive on a company, know that it&#8217;s passed a high bar. <strong><a href="https://hubs.li/Q045_jqG0">Clover Security</a> </strong>brought me back to my Product Security days at Johnson &amp; Johnson, where design-phase security reviews and threat modeling weren&#8217;t optional best practices, they were FDA and HITRUST requirements. This is a platform that would have made life meaningfully easier back then.</p><p>I&#8217;m excited to bring you this piece. Let&#8217;s get into it.  </p><div><hr></div><h2><strong>Executive Summary</strong></h2><p>The engineering world is undergoing a structural shift. AI coding agents now handle implementation at a pace and volume that human-led security processes were never designed to match. Innovation cycles are compressing. The response from the most forward-thinking engineering orgs isn&#8217;t to scan more code faster. It&#8217;s to invest in design and architecture rigor, the phase where most risk actually originates.</p><p><strong><a href="https://clover.security/?utm_campaign=39986224-TCP%20Deep%20Dive&amp;utm_source=email&amp;utm_medium=Substack&amp;utm_content=Clover">Clover Security</a></strong> made this bet two years ago. They&#8217;ve raised $36M and built a platform of AI agents that embed security into the design phase, where PRDs are written, architecture decisions are made, and threat models should live.</p><p>This deep dive covers why the design phase has become the critical gap in most security programs, how Clover&#8217;s platform actually works, what their early customer results look like, and where the product is headed as agentic development accelerates.</p><div><hr></div><h2><strong>The Perfect Storm</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!roli!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!roli!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png 424w, https://substackcdn.com/image/fetch/$s_!roli!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png 848w, https://substackcdn.com/image/fetch/$s_!roli!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!roli!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!roli!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png" width="727.998046875" height="727.998046875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:727.998046875,&quot;bytes&quot;:4558906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/190579014?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!roli!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png 424w, https://substackcdn.com/image/fetch/$s_!roli!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png 848w, https://substackcdn.com/image/fetch/$s_!roli!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!roli!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd43fb9f0-1d4f-4ae9-969b-26e494a52ebb_2160x2160.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Two years ago, a senior engineer would split their week between writing code, reviewing code, debugging code, and making architectural decisions. Today, AI coding agents handle the first three.<a href="https://techcrunch.com/2026/02/12/spotify-says-its-best-developers-havent-written-a-line-of-code-since-december-thanks-to-ai/"> Spotify&#8217;s co-CEO said it plainly on their Q4 earnings call</a>. The company&#8217;s best developers haven&#8217;t written a single line of code since December. That trend is only accelerating.</p><p>What&#8217;s emerging is a fundamental reprioritization across engineering orgs. The smartest teams are investing in design and architecture rigor, the phase where risk actually enters the system. Innovation cycles are compressing. A feature that took a team two sprints now ships in days. <strong>The human role in software development is shifting from writing code to designing systems, choosing infrastructure, and deciding how services interact</strong>. The design decisions that determine whether a system is secure are now the most consequential part humans still control.</p><p>And this math was broken long before AI code generation entered the picture. Product security engineers are<a href="https://www.notablecap.com/blog/from-reactive-to-proactive-clover-securitys-design-led-revolution"> outnumbered by developers 300-to-1</a> at most technology companies.<a href="https://go.crowdstrike.com/rs/281-OBQ-266/images/report-2024-state-of-app-security-report.pdf"> CrowdStrike&#8217;s 2024 State of Application Security Report</a> quantifies the downstream impact. Over half of major code changes don&#8217;t undergo full security reviews (50% median, 54% mean). That was before AI-generated code tripled the volume. Jerry Gamblin&#8217;s<a href="https://jerrygamblin.com/2026/01/01/2025-cve-data-review/"> 2025 CVE data review</a> counted 48,185 published vulnerabilities, a 21% jump over 2024, with XSS still the most common class at over 8,000 entries despite decades of tooling investment.<a href="https://www.first.org/blog/20260211-vulnerability-forecast-2026"> FIRST&#8217;s 2026 forecast</a> projects that number climbing to roughly 59,000.</p><p><a href="https://hubs.li/Q045_jqG0">Clover Security</a> saw this coming. Founded in 2023, right as the AI coding wave began to take shape, the company raised $36M on the thesis that the entire AppSec model was pointed at the wrong phase of development.</p><p>Their bet is that AI agents embedded in design and architecture workflows are the only way to close the gap. Two years in, the market is moving in their direction.</p><p> Now they&#8217;re building for what the next two years look like.</p><div><hr></div><h2><strong>The Founding Story</strong></h2><p>Clover&#8217;s founding story starts with a big tech engineer and a product leader at two of the largest AppSec vendors in the world, both independently arriving at the same conclusion that scanning code after it&#8217;s written was never going to be enough. Then they found each other on X.</p><p><a href="https://www.linkedin.com/in/alonkol/">Alon Kollmann</a> (CEO) spent 15+ years as an engineer at Microsoft and Google before taking strategic roles at Hysolate and Dazz, the ASPM company acquired by Wiz for roughly $450M.</p><p><a href="https://www.linkedin.com/in/or-chen/">Or Chen</a> (CPO) spent 8 years in Unit 8200 leading technical cyber operations, then founded a startup acquired by Checkmarx. He rose to VP and built their SCA and API Security offerings from the ground up.</p><p>The two found each other the way a lot of good things start in 2022: sliding into each other&#8217;s DMs on Twitter. They had arrived at the same conclusion from opposite sides of the security stack, and connected right as ChatGPT launched and the AI coding revolution started to take shape. The timing validated their shared conviction: code generation would be automated, making design the true security chokepoint. They co-founded Clover in 2023.</p><p>Clover raised $36M across a seed led by Team8 and a Series A led by Notable Capital, with Team8 and SVCI participating. The angel roster tells the real story: Wiz co-founders Assaf Rappaport and Yinon Costica, Shlomo Kramer (Check Point, Imperva, Cato Networks), Rene Bonvanie (former CMO, Palo Alto Networks), and senior executives from Snyk, CrowdStrike, Atlassian, and Google.</p><div><hr></div><h2><strong>You Can&#8217;t Scan Your Way Out of Insecure Design Choices</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MnUr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MnUr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png 424w, https://substackcdn.com/image/fetch/$s_!MnUr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png 848w, https://substackcdn.com/image/fetch/$s_!MnUr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!MnUr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MnUr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3466896,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/190579014?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MnUr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png 424w, https://substackcdn.com/image/fetch/$s_!MnUr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png 848w, https://substackcdn.com/image/fetch/$s_!MnUr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!MnUr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18fea179-e37d-4453-b1cd-6523dffd1502_2160x2160.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Every AppSec tool on the market today works the same way, downstream: wait for code to exist, then scan it. SAST, SCA, DAST, ASPM, runtime scanning.</p><p>Product Security (ProdSec) operates upstream. Architecture review, threat modeling, design-phase risk assessment. Security baked into how a system is designed, not bolted on after it&#8217;s built. If you&#8217;ve worked in automotive or medical devices, none of this is new. ProdSec is table stakes in those worlds.</p><p>I interned on Ford Motor&#8217;s Red Team and spent 2.5 years doing product security for <a href="https://www.jnj.com/media-center/press-releases/johnson-johnson-submits-ottava-robotic-surgical-system-to-the-u-s-food-and-drug-administration">a robotic surgical system</a> at Johnson &amp; Johnson. When you&#8217;re threat modeling software that controls a robot performing surgery on a human being, design-phase security reviews are a non-negotiable. <strong>The gap is that most pure software companies haven&#8217;t adopted this discipline yet, and the ones that have are doing it manually, expensively, and at a coverage rate that never keeps pace with engineering velocity.</strong></p><p>In practice, ProdSec means a security engineer sits down with a PRD or architecture doc before a single line of code is written and asks: where are the trust boundaries? What are the data flows? Where could business logic be abused? How does this feature interact with existing services? They map the design against frameworks like OWASP ASVS or STRIDE, identify threats at the architecture level, and write security requirements into the ticket.</p><p>Here&#8217;s why this matters concretely. A team builds a payments integration where users can link external bank accounts. The code is solid: encrypted connections, proper auth tokens, passes every scan. But the design never accounted for what happens when a user links an account, initiates a transfer, then unlinks the account before settlement completes. The transaction goes through with no account to claw back from. That&#8217;s not a vulnerability. It&#8217;s a business logic gap that only exists at the design layer, and no scanner on the market catches it.</p><p>The problem is that ProdSec requires people who understand both software architecture and threat modeling deeply enough to review designs at speed. Those people are rare. Most orgs either can&#8217;t hire them or can&#8217;t hire enough of them, which is why even mature security teams end up triaging by risk and only reviewing the highest-priority features manually.</p><p>As AI handles more implementation, design is the last human-controlled artifact. If security isn&#8217;t embedded there, there&#8217;s no checkpoint before code ships. Clover&#8217;s bet is that as AI eliminates trivial code-level vulnerabilities, the remaining risk concentrates at the logic and architecture layer.</p><div><hr></div><h2><strong>How It Works</strong></h2><p>Clover runs eight purpose-built AI agents, each handling a specific security function but all built on the same platform core. Design risk is the guiding principle, but risk can initiate at any point. A review can start from a PRD for a brand new feature just as easily as from code drifting from its original design requirements. The result is a platform that tracks design risk from the first spec through production, and catches drift long after code ships.</p><h4><strong>The Context Layer</strong></h4><p>The most differentiated thing I saw in the demo was Clover&#8217;s context engine. Two components work together here.</p><p>The Memory Agent builds and maintains a living knowledge base of your organization, split across three dimensions. <strong>Technical context</strong> covers your tech stack, infrastructure components, APIs, and data points. <strong>Business memory</strong> captures how your org makes decisions, internal glossary, and product relationships. <strong>Inferred memory</strong> surfaces connections the platform identifies across your environment over time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DuFX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DuFX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!DuFX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!DuFX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!DuFX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DuFX!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DuFX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!DuFX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!DuFX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!DuFX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F595684d0-e281-4759-a303-8436ab05f2ca_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Clover Memory Agent displaying technical content</em></figcaption></figure></div><p>The Feature Context Graph maps how a single feature connects to requirements, framework standards, code, and infrastructure. You can drill into the specific standards a feature was reviewed against, see which code repos are linked, and trace from design doc to implementation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p5Ey!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p5Ey!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!p5Ey!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!p5Ey!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!p5Ey!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p5Ey!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Clover Security's Feature Context Graph for an \&quot;Upload candidate CV design\&quot; security review, showing connected nodes tracing a feature from R&amp;D Design origin through Product Dev, GitHub commits, and downstream features, with OWASP ASVS, AWS FSBP, and internal framework requirements mapped on the right panel.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="Clover Security's Feature Context Graph for an &quot;Upload candidate CV design&quot; security review, showing connected nodes tracing a feature from R&amp;D Design origin through Product Dev, GitHub commits, and downstream features, with OWASP ASVS, AWS FSBP, and internal framework requirements mapped on the right panel." title="Clover Security's Feature Context Graph for an &quot;Upload candidate CV design&quot; security review, showing connected nodes tracing a feature from R&amp;D Design origin through Product Dev, GitHub commits, and downstream features, with OWASP ASVS, AWS FSBP, and internal framework requirements mapped on the right panel." srcset="https://substackcdn.com/image/fetch/$s_!p5Ey!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!p5Ey!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!p5Ey!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!p5Ey!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feabbe992-baeb-4cfa-bd59-f338fb317700_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Feature Context Graph with connected nodes across R&amp;D Design, Product Dev, Features, and Security</em></figcaption></figure></div><p>These two components are what make everything below possible. Without organizational context, an AI agent reviewing a design doc is just guessing. With it, the agent knows your tech stack, your policies, your architecture patterns, and how this feature connects to everything else you&#8217;ve already built.</p><p><strong>Scenario 1. A new feature lands in your project management tool.</strong></p><p>Your product team writes a PRD in Notion for a new instant peer-to-peer payments feature. Clover&#8217;s Discovery Agent picks it up automatically, identifies it as high-priority based on the financial data flows and regulatory surface involved, and flags it for security review.</p><p>The Design Review Agent takes over and runs a security review against your configured frameworks and threat models, whether that&#8217;s OWASP ASVS, PCI, STRIDE, or your own internal standards. Because of the context layer, Clover knows this feature interacts with your existing account linking service, handles external bank credentials, and exposes a new transaction initiation path to end users. The review reflects that specificity rather than returning generic findings.</p><p>Business logic flaws are a major focus. Or walked me through examples like logic gaps that let attackers siphon funds from a gaming platform, and arbitrage attacks on a prediction market. These are the exact categories of risk that traditional scanners miss because they have no awareness of what the feature is supposed to do, only what the code does.</p><p>On the app level, security teams manage risk posture through custom-built security models around applications, architecture, data flows, and risks. Each application view lets security teams tune prioritization sensitivity across three dimensions. Risk, Business Impact, and Depth and Complexity. You can also feed it pentest reports and it incorporates findings into the posture view.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8uxK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8uxK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!8uxK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!8uxK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!8uxK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8uxK!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Clover Security's Agent Fleet dashboard displaying configurable AI agents including Threat Optimizer, Application Threat Modeling, and Attack Vector Discovery, with the Prioritization Configuration Agent open showing a triangle-weighted slider for tuning Risk, Business Impact, and Depth and Complexity scoring across security reviews.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="Clover Security's Agent Fleet dashboard displaying configurable AI agents including Threat Optimizer, Application Threat Modeling, and Attack Vector Discovery, with the Prioritization Configuration Agent open showing a triangle-weighted slider for tuning Risk, Business Impact, and Depth and Complexity scoring across security reviews." title="Clover Security's Agent Fleet dashboard displaying configurable AI agents including Threat Optimizer, Application Threat Modeling, and Attack Vector Discovery, with the Prioritization Configuration Agent open showing a triangle-weighted slider for tuning Risk, Business Impact, and Depth and Complexity scoring across security reviews." srcset="https://substackcdn.com/image/fetch/$s_!8uxK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!8uxK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!8uxK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!8uxK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4881f253-bc29-42f4-a2aa-de3164bf5170_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Agent Fleet showing Prioritization Configuration Agent with triangle-weighted Risk/Business Impact/Depth and Complexity</em></figcaption></figure></div><p><strong>Scenario 2. Code ships that drifts from the original design.</strong></p><p>Your design spec requires encryption at rest for all candidate records. A developer (or an AI coding agent) implements the database layer but skips the encryption step.</p><p>The Developer Guidance Agent integrates with GitHub, GitLab, and Bitbucket, and compares implemented code against original design specifications and PRDs. It surfaces the drift between what was designed and what was built. Traditional SAST tools see code in isolation. They&#8217;d look at this implementation and find no vulnerability pattern, no dependency flaw, no known CVE. Clover sees the intent behind the code.</p><p><strong>Scenario 3. Your developers are using Cursor, Codex and Claude Code. Who&#8217;s watching?</strong></p><p>This is the forward-looking bet. Clover&#8217;s MCP Agent provides visibility into AI-generated code, enforces organizational policies for coding agents, and monitors MCP connections across AI-driven development workflows. The Vibe Coding Agent evaluates shadow AI and vibe coding for misconfigurations, excessive permissions, and missing controls.</p><p>What makes this tangible rather than theoretical is the Agent Observability dashboard. Clover gives you granular visibility into which LLMs are being used across your environment (Claude 3.5 Sonnet, GPT-4, GPT-4-turbo in this instance), which developers are using them, lines of code written with coding agents over time, how many MCP connections are active, and where the PR blind spots are.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NgPB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NgPB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!NgPB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!NgPB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!NgPB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NgPB!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NgPB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!NgPB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!NgPB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!NgPB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05e62cf1-1eee-4029-85bf-99cbebb19465_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>AI Coding Agents Overview showing Developers Using Coding Agents, Agents Usage Over Time, Top Developers, LLM Models Usage, and PR distribution</em></figcaption></figure></div><p>Most security teams today have zero visibility into what AI coding agents are generating across their org. Engineering teams are three steps ahead of security teams on AI coding agent adoption. Clover has built an observability layer that helps make the invisible visible, which models, which developers, how much code, and where the blind spots are</p><p><strong>Integrations and Day One Value</strong></p><p>Clover hooks into where teams already work.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3Uq3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3Uq3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!3Uq3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!3Uq3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!3Uq3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3Uq3!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Clover Security's integrations hub showing connections to V0, Google Drive, Confluence, LucidChart, Notion, SharePoint, Bitbucket, GitHub, Azure DevOps, GitLab, Jira, Trello, and Aha, spanning document, repository, and project management tool categories.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="Clover Security's integrations hub showing connections to V0, Google Drive, Confluence, LucidChart, Notion, SharePoint, Bitbucket, GitHub, Azure DevOps, GitLab, Jira, Trello, and Aha, spanning document, repository, and project management tool categories." title="Clover Security's integrations hub showing connections to V0, Google Drive, Confluence, LucidChart, Notion, SharePoint, Bitbucket, GitHub, Azure DevOps, GitLab, Jira, Trello, and Aha, spanning document, repository, and project management tool categories." srcset="https://substackcdn.com/image/fetch/$s_!3Uq3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!3Uq3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!3Uq3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!3Uq3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1287b889-4cc0-4716-b9c8-2b68fb01580c_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Integrations &amp; Developer Guidance</em></figcaption></figure></div><p>The platform also functions as a contextual security chatbot within Slack, where teams can ask questions like &#8220;What auth method should I use for this service?&#8221; and get answers informed by their org&#8217;s specific context and policies.</p><p>Clover produces actionable security reviews from day one, covering framework checks, threat modeling, and architecture anti-patterns out of the box. As it ingests more documentation and observes how teams build, reviews get sharper and more tailored to your specific environment.</p><div><hr></div><h2><strong>From Stealth to Scale</strong></h2><p>Most security startups launch publicly, spend heavily on marketing, and grind through 12-month enterprise sales cycles before landing their first logos. Clover did it backwards. They hit millions in ARR before publicly launching. No website, no press, no conference booths. Deals came through CISO networks and word of mouth, which tells you something about how the product landed with the people actually using it.</p><p><strong><a href="https://clover.security/case-studies/neo4j/?utm_campaign=39986224-TCP%20Deep%20Dive&amp;utm_source=email&amp;utm_medium=Substack&amp;utm_content=Clover">Neo4j</a></strong> went from 49% to 100% design review coverage. CISO David Fox: &#8220;Manual review covered 49% of tickets, but with Clover&#8217;s automation we hit 100%.&#8221; (<a href="https://hubs.li/Q045_k4W0">Full case study</a>)</p><p><strong><a href="https://clover.security/case-studies/lemonade/?utm_campaign=39986224-TCP%20Deep%20Dive&amp;utm_source=email&amp;utm_medium=Substack&amp;utm_content=Clover">Lemonade</a></strong> cut review time from roughly two hours to fifteen minutes. Before Clover, Lemonade triaged reviews by perceived risk because the volume was too high to cover everything. Now they review all documents, not just the ones they think are risky. (<a href="https://hubs.li/Q045_jVl0">Full case study</a>)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1OBq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1OBq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png 424w, https://substackcdn.com/image/fetch/$s_!1OBq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png 848w, https://substackcdn.com/image/fetch/$s_!1OBq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png 1272w, https://substackcdn.com/image/fetch/$s_!1OBq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1OBq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png" width="841" height="399" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29555121-3a7b-4528-b618-027e1731545c_841x399.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:399,&quot;width&quot;:841,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1OBq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png 424w, https://substackcdn.com/image/fetch/$s_!1OBq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png 848w, https://substackcdn.com/image/fetch/$s_!1OBq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png 1272w, https://substackcdn.com/image/fetch/$s_!1OBq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29555121-3a7b-4528-b618-027e1731545c_841x399.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://clover.security/case-studies/virgin-money/?utm_campaign=39986224-TCP%20Deep%20Dive&amp;utm_source=email&amp;utm_medium=Substack&amp;utm_content=Clover">Virgin Money</a></strong>, one of the UK&#8217;s largest retail banks serving 6.6 million customers, achieved 4x faster design reviews. But the bigger story is what changed qualitatively. Before Clover, reviews depended on individual interpretation across hundreds of policy controls. Now every design is reviewed against the same standard, every time. Head of Security Solutions Gordon Moon: &#8220;Clover turns generic threats into design-specific threats so our teams understand what really matters in that system.&#8221; (<a href="https://hubs.li/Q045_jJ40">Full case study</a>)</p><p>The fact that CISOs at Neo4j, Lemonade, and Virgin Money are willing to go on record with specific metrics at this stage is strong signal for both company direction and product validation. Excited to see how these numbers evolve as deployments scale.</p><div><hr></div><h1><strong>Closing Thoughts</strong></h1><p>I&#8217;ve covered a lot of security startups through TCP. Very few make me stop and rethink how an entire category should work.</p><p><strong>Where the bet gets bigger.</strong> AI coding agents are already writing production code across thousands of engineering orgs. Most security teams have zero visibility into what those agents are generating, which models they&#8217;re using, or whether the output aligns with internal policies. That&#8217;s not a future problem. </p><p>Clover&#8217;s MCP Agent and Vibe Coding Agent are newer than the design review core, but they&#8217;re pointed at exactly the right problem. The agent observability dashboard alone is the kind of visibility security leaders will be demanding within 12 months. Clover is building it now.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dFZO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dFZO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png 424w, https://substackcdn.com/image/fetch/$s_!dFZO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png 848w, https://substackcdn.com/image/fetch/$s_!dFZO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!dFZO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dFZO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3566174,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/190579014?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dFZO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png 424w, https://substackcdn.com/image/fetch/$s_!dFZO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png 848w, https://substackcdn.com/image/fetch/$s_!dFZO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!dFZO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3adff92-8f81-4568-b9a0-de0218feb895_2160x2160.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Who should care.</strong> If you&#8217;re a CISO or Head of ProdSec at a company with 50+ engineers and you&#8217;re still doing design reviews manually (or not doing them at all), Clover should be on your shortlist. If your team is drowning in review requests and triaging by gut because you can&#8217;t cover everything, this is built for you.</p><p>Product Security as a discipline has historically been locked behind scarce human expertise. The security architects who can review a design doc, run a threat model, and identify business logic flaws before code is written are among the hardest hires in the industry. Most companies either can&#8217;t find them or can&#8217;t afford enough of them. If Clover&#8217;s agents can replicate that thinking at scale, they&#8217;re not just building a product. They&#8217;re making ProdSec accessible to teams that could never afford to staff it the way it deserves.</p><p>Having done this work by hand, I can tell you: this is the platform I wish I&#8217;d had.</p><p>I've shown you the thesis and where I think things are headed. Let them show you the product.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://clover.security/?utm_campaign=39986224-TCP%20Deep%20Dive&amp;utm_source=email&amp;utm_medium=Substack&amp;utm_content=Clover#book-a-demo&quot;,&quot;text&quot;:&quot;See Clover in Action&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://clover.security/?utm_campaign=39986224-TCP%20Deep%20Dive&amp;utm_source=email&amp;utm_medium=Substack&amp;utm_content=Clover#book-a-demo"><span>See Clover in Action</span></a></p>]]></content:encoded></item><item><title><![CDATA[25 Million Alerts. One Year of Real SOC Data. ]]></title><description><![CDATA[What Intezer's 2026 AI SOC Report Reveals About Alert Fatigue, Triage Gaps, and the Future of Security Operations]]></description><link>https://www.cybersecuritypulse.net/p/25-million-alerts-one-year-of-real</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/25-million-alerts-one-year-of-real</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Thu, 05 Mar 2026 13:58:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9KQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The Cybersecurity Pulse (TCP)</strong>! I&#8217;m Darwin Salazar, Head of Growth at <strong><a href="https://www.monad.com/">Monad</a></strong> and former detection engineer in big tech. Each week, I bring you the latest security innovation and industry news. Subscribe to receive weekly updates! &#128231;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/25-million-alerts-one-year-of-real?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/p/25-million-alerts-one-year-of-real?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="pullquote"><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9KQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9KQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png 424w, https://substackcdn.com/image/fetch/$s_!9KQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png 848w, https://substackcdn.com/image/fetch/$s_!9KQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png 1272w, https://substackcdn.com/image/fetch/$s_!9KQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9KQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png" width="1440" height="811" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:811,&quot;width&quot;:1440,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9KQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png 424w, https://substackcdn.com/image/fetch/$s_!9KQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png 848w, https://substackcdn.com/image/fetch/$s_!9KQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png 1272w, https://substackcdn.com/image/fetch/$s_!9KQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b57b3f9-95cf-491b-ae19-0c592941aef3_1440x811.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></div><p><em><strong><a href="https://hubs.li/Q045yZSD0">Intezer</a></strong> recently dropped their 2026 AI SOC Report. A full analysis of 25 million security alerts triaged across live enterprise SOCs in 2025. I read all 35 pages. Here&#8217;s what stood out, what it means, and what I think most security teams can take from it.</em></p><div><hr></div><p>The math inside <em>most</em> SOCs is broken, and it has been for years. Too many alerts, not enough analysts, and the people in those seats are legit running on fumes. Burnt-out analysts and overworked IR teams don&#8217;t just slow down. They miss things. So teams triage aggressively, auto-close the low-severity stuff, and hope nothing slips through.</p><p>This has been true for decades. Detection engineers can tune rules and build enrichment playbooks all day, but the volume problem is structural. Industry surveys consistently show that <strong><a href="https://www.vectra.ai/resources/2024-state-of-threat-detection">over 60% of alerts are never reviewed</a>.</strong> Not by in-house SOC teams. Not by MDRs. They get deprioritized or buried.</p><p>Intezer just put a number on what &#8220;slips through&#8221; actually looks like and the cost of the trade-off that most SOCs make.</p><p>The scale of the dataset alone sets this apart: </p><ul><li><p><strong>25 million alerts. 10 million monitored endpoints and identities. </strong></p></li><li><p><strong>180 million files analyzed. 7 million IP addresses investigated. 550,000 emails analyzed. </strong></p></li><li><p><strong>Over 82,000 endpoint forensic investigations, including live memory scans.</strong> </p></li></ul><p>This wasn&#8217;t a survey or a simulation. It&#8217;s operational data from production SOC environments like NVIDIA, MGM Resorts, and Equifax.</p><p>I spent years building detection rules and investigation playbooks, and I work with detection engineers and SOC teams daily at Monad. I know what&#8217;s supposed to happen after a rule fires. I also know what actually happens. This report quantifies that gap.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://hubs.li/Q045rws_0&quot;,&quot;text&quot;:&quot;Get the report here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://hubs.li/Q045rws_0"><span>Get the report here</span></a></p><div><hr></div><h3><strong>Why I&#8217;m Writing About a Vendor Report</strong></h3><p>Let me be direct. AI SOC is a crowded, noisy market. There are 25+ vendors selling some version of it right now. Most are glorified LLM wrappers that summarize alert metadata and call it &#8220;investigation.&#8221; If you&#8217;re skeptical of the category, you should be.</p><p>I&#8217;ve watched Intezer&#8217;s platform evolve over years. Where most AI SOC tools are pattern-matching on alert metadata and hoping for the best LLM-generated verdict, Intezer is doing actual forensic analysis. Deterministic, not probabilistic. Every verdict is fully auditable. And the analysis goes to forensic depth: live memory scans, genetic code analysis, actual endpoint investigation.</p><p>The framing matters too. Intezer isn&#8217;t selling &#8220;replace your analysts.&#8221; They&#8217;re selling &#8220;cover the 60% that was never getting covered.&#8221; That&#8217;s a fundamentally different value proposition.</p><p>But the report itself earned this writeup on its own merits. It&#8217;s genuinely educational in a way that leads me to recommend it to anyone from Jr.-level operators to CISOs. Take the section on plaintext password alerts (p.20). They don&#8217;t just flag &#8220;we found unencrypted credentials on the wire&#8221; and move on. They trace it to directory services still running unencrypted LDAP, transmitting credentials in cleartext because nobody configured LDAPS or StartTLS. That level of precision tells you the people who wrote this have actually done the work. It&#8217;s a great refresher or learning track for pretty much any level.</p><p>And it puts numbers behind things practitioners have said for years but could hardly prove. <strong>&#8220;Most impossible travel alerts are false positives.&#8221; &#8220;Low-sev alerts are hiding real threats.&#8221; &#8220;EDRs aren&#8217;t as reliable as we think.&#8221;</strong> Now there are receipts.</p><div><hr></div><h2><strong>The Math Nobody Wanted to See</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wPi6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wPi6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png 424w, https://substackcdn.com/image/fetch/$s_!wPi6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png 848w, https://substackcdn.com/image/fetch/$s_!wPi6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!wPi6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wPi6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png" width="1182" height="1066" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1066,&quot;width&quot;:1182,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Infographic showing Intezer analyzed 25 million security alerts. Over 60% of alerts are ignored by SOC and MDR teams, especially low-severity ones. Nearly 1% of real threats come from low-severity alerts.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Infographic showing Intezer analyzed 25 million security alerts. Over 60% of alerts are ignored by SOC and MDR teams, especially low-severity ones. Nearly 1% of real threats come from low-severity alerts." title="Infographic showing Intezer analyzed 25 million security alerts. Over 60% of alerts are ignored by SOC and MDR teams, especially low-severity ones. Nearly 1% of real threats come from low-severity alerts." srcset="https://substackcdn.com/image/fetch/$s_!wPi6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png 424w, https://substackcdn.com/image/fetch/$s_!wPi6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png 848w, https://substackcdn.com/image/fetch/$s_!wPi6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!wPi6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d5bec82-007e-4b5e-826b-e0e96c0a08db_1182x1066.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Of everything in this report, this is the finding I keep coming back to.</p><p><strong>Nearly 1% of low-severity and informational alerts turned out to be real threats</strong></p><p>That sounds small until you do the math. The average enterprise generates around 450,000 alerts per year. Over 60% never get reviewed. At that scale, 1% of low-severity alerts being real means roughly <strong>54 genuine threats per year</strong> that nobody investigates. That&#8217;s about one per week <strong>(!!)</strong></p><p>On endpoints it&#8217;s worse. <strong>2% of low-severity endpoint alerts were confirmed incidents.</strong> Active, real, and invisible to the teams responsible for catching them.</p><p>Intezer ran over <strong>82,000 forensic scans</strong> on endpoints throughout the year, including live memory analysis. In <strong>1.6% of those scans, the endpoint was still actively compromised even though the EDR had reported the threat as mitigated.</strong> The EDR closed the case. The analyst moved on. The attacker was still there.</p><p>And over half of all endpoint alerts were never automatically mitigated by endpoint protection in the first place. Of those non-mitigated alerts, roughly <strong>9% were confirmed malicious.</strong></p><p>There could be legitimate explanations. Vendor quirks, timing issues, partial remediation. But the operational reality doesn&#8217;t change: <strong>if you&#8217;re trusting your EDR&#8217;s &#8220;mitigated&#8221; status without verification, you have a blind spot.</strong></p><p>As someone who built detection rules and playbooks that generate these exact alert types, I know the gap between the intended workflow and what actually happens. The detection fires, the alert enters the queue, and the math takes over. Low-severity stuff gets deprioritized or auto-closed.</p><p>That&#8217;s the real value of AI-driven triage. Not replacing analysts. Doing forensic-grade analysis on the alerts that were going to be ignored anyway. Finding the threats that may slip through.</p><div><hr></div><h2><strong>Where Attacks Are Actually Evolving</strong></h2><p>Three patterns jumped out from the threat data. None of them are what most vendors are selling against.</p><h3><strong>Phishing Doesn&#8217;t Need Your Endpoint Anymore</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1DSq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1DSq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png 424w, https://substackcdn.com/image/fetch/$s_!1DSq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png 848w, https://substackcdn.com/image/fetch/$s_!1DSq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png 1272w, https://substackcdn.com/image/fetch/$s_!1DSq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1DSq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png" width="692" height="275.9376947040498" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:256,&quot;width&quot;:642,&quot;resizeWidth&quot;:692,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1DSq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png 424w, https://substackcdn.com/image/fetch/$s_!1DSq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png 848w, https://substackcdn.com/image/fetch/$s_!1DSq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png 1272w, https://substackcdn.com/image/fetch/$s_!1DSq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faba996e7-38af-41b8-97fb-9dd29cfc848f_642x256.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Intezer analyzed 550,000 user-reported phishing emails. Less than 8% were confirmed malicious. But look at how those malicious emails actually breakdown: l<strong>ess than 6% carried an attachment. Around 30% relied on a link</strong>.</p><p>The attack surface has moved. Endpoints and inboxes are well-defended, and attackers know it. So they&#8217;re keeping the entire kill chain inside the browser, where most security stacks have minimal visibility.</p><p>Intezer found platforms like Vercel, CodePen, JSitor, and JSBin hosting live credential-harvesting pages on trusted domains. Phishing sites impersonating crypto wallets and exchanges, asking victims for recovery phrases. Legitimate developer infrastructure being used as disposable phishing hosting. <strong>Most threat intel feeds won&#8217;t flag these domains because the domains themselves aren&#8217;t malicious.</strong></p><p><strong>Microsoft</strong> was the most impersonated brand, representing nearly a third of all phishing URLs. Microsoft and DocuSign together accounted for almost <strong>85% of brand impersonation.</strong> Brand impersonation was the top phishing technique at 28.7%, with callback scams right behind at 25.3%.</p><p>Attackers are also increasingly gating phishing pages behind Cloudflare&#8217;s Turnstile CAPTCHA. The majority of URLs using Google reCAPTCHA were safe. That ratio completely flipped for Cloudflare Turnstile. Attackers are using CAPTCHAs not to stop bots, but to stop security scanners from seeing what&#8217;s behind the page.</p><div><hr></div><h3><strong>Identity Is Drowning in Noise</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l8we!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l8we!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png 424w, https://substackcdn.com/image/fetch/$s_!l8we!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png 848w, https://substackcdn.com/image/fetch/$s_!l8we!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png 1272w, https://substackcdn.com/image/fetch/$s_!l8we!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l8we!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png" width="710" height="353.86581469648564" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:312,&quot;width&quot;:626,&quot;resizeWidth&quot;:710,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!l8we!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png 424w, https://substackcdn.com/image/fetch/$s_!l8we!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png 848w, https://substackcdn.com/image/fetch/$s_!l8we!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png 1272w, https://substackcdn.com/image/fetch/$s_!l8we!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7a11d-86fa-477a-99ca-1e52ed3d950b_626x312.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Location and geo anomalies made up <strong>over 36% of all identity alerts.</strong> Login failures accounted for 22%. But <strong>74.1% of login verdicts were classified as likely benign.</strong> The &#8220;impossible travel&#8221; alerts that flood every SOC queue? Only about <strong>2% were confirmed real compromises.</strong></p><p><strong>Roughly 30% of those alerts were caused by VPN activity. </strong>Mobile phones routing through distant data centers and overlapping security tools triggering alerts against each other accounted for most of the rest. The identity layer has become the highest-noise signal source in the SOC, and separating real compromise from normal variability at scale is one of the hardest unsolved problems in the space. I imagine this problem gets worse with the explosion of Non-Human Identities (NHI).</p><div><hr></div><h3><strong>Cloud Attackers Are Playing the Long Game</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F-A1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F-A1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png 424w, https://substackcdn.com/image/fetch/$s_!F-A1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png 848w, https://substackcdn.com/image/fetch/$s_!F-A1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png 1272w, https://substackcdn.com/image/fetch/$s_!F-A1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F-A1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png" width="891" height="532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/243e6176-cc93-4637-a72a-bedf612f118f_891x532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:532,&quot;width&quot;:891,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Bar chart showing cloud alert TTPs and tactics. Defense Evasion leads by a wide margin at over 150,000 alerts, followed by Persistence and Discovery. Less common tactics include Lateral Movement, Reconnaissance, and Privilege Escalation&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Bar chart showing cloud alert TTPs and tactics. Defense Evasion leads by a wide margin at over 150,000 alerts, followed by Persistence and Discovery. Less common tactics include Lateral Movement, Reconnaissance, and Privilege Escalation" title="Bar chart showing cloud alert TTPs and tactics. Defense Evasion leads by a wide margin at over 150,000 alerts, followed by Persistence and Discovery. Less common tactics include Lateral Movement, Reconnaissance, and Privilege Escalation" srcset="https://substackcdn.com/image/fetch/$s_!F-A1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png 424w, https://substackcdn.com/image/fetch/$s_!F-A1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png 848w, https://substackcdn.com/image/fetch/$s_!F-A1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png 1272w, https://substackcdn.com/image/fetch/$s_!F-A1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F243e6176-cc93-4637-a72a-bedf612f118f_891x532.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Defense evasion and persistence dominated cloud TTPs. Attackers are getting in (usually through identity) and sitting quietly. Token manipulation, obfuscation, abuse of legitimate cloud features etc. The goal is long-term access + recon, not immediate impact.</p><p>S3 accounted for roughly <strong>70% of all AWS control violations.</strong> Buckets still using ACLs instead of IAM policies, missing server access logging, overly permissive cross-account policies.</p><p>I spent years at Accenture and Datadog building the CSPM rules that flag these exact misconfigurations. The fact that they&#8217;re still this prevalent in 2026 tells you everything you need to know.</p><div><hr></div><h2><strong>What to Actually Do About It</strong></h2><p><strong>Invest in making your team AI-fluent, and seriously evaluate AI SOC platforms.</strong> LLMs are great for log analysis, triage assistance, detection rule development, playbook drafting. But for alert triage, the build vs. buy math almost never favors build. Reviewing every alert across every tool, investigating regardless of the original verdict, at forensic depth (live memory scans, genetic code analysis, full auditability)? That&#8217;s years of engineering, not a side project. The teams that figure out how to pair human judgment with AI speed at that level are the ones that will actually close the coverage gaps this report quantifies.</p><p><strong>Stop trusting your tooling&#8217;s verdicts blindly.</strong> Real threats are hiding in low-severity alerts and EDRs are reporting &#8220;mitigated&#8221; while endpoints remain compromised. If your team can&#8217;t cover the full alert volume manually, that&#8217;s a strong case for AI-augmented triage.</p><p><strong>Reassess your phishing defense model for browser-based attacks.</strong> The attack surface has shifted from attachments to links, from endpoints to browsers. If your phishing defense stack is primarily focused on catching malicious files, you&#8217;re defending last year&#8217;s battlefield. The code sandbox abuse and callback scam patterns in this report deserve your immediate attention.</p><p><strong>Audit your cloud posture against what you&#8217;re actually running, not what the docs say.</strong> S3 misconfigs aren&#8217;t news. But 70% of all AWS violations concentrating there suggests most organizations still haven&#8217;t done the unglamorous work of cleaning up notoriously bad configurations.</p><div><hr></div><h2><strong>The Full Report</strong></h2><p>I don&#8217;t say this often about vendor reports: go read the whole thing <a href="https://hubs.li/Q045rws_0">here</a>. It&#8217;s 35 pages, it&#8217;s technical, and it respects your intelligence. </p><p>If you&#8217;re a CISO, send it to your SOC lead. If you&#8217;re a SOC lead, send it to your analysts. If you build detections, you&#8217;ll find data in here that validates half the arguments you&#8217;ve been losing in meetings.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://hubs.li/Q045rws_0&quot;,&quot;text&quot;:&quot;Get the full report&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://hubs.li/Q045rws_0"><span>Get the full report</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Splunk .conf 2025 Recap]]></title><description><![CDATA[How Splunk Is Rewriting the SIEM Playbook]]></description><link>https://www.cybersecuritypulse.net/p/splunk-conf-2025-recap</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/splunk-conf-2025-recap</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Mon, 15 Sep 2025 19:27:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iNci!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The Cybersecurity Pulse (TCP)</strong>! I'm Darwin Salazar, Head of Growth and Marketing at <strong><a href="https://www.monad.com/">Monad</a></strong> and former Detection Engineer in big tech. Each week, I dig through all the major headlines to bring you the latest security product innovation and industry news. Subscribe below for weekly updates!</em> &#128231;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/splunk-conf-2025-recap?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/p/splunk-conf-2025-recap?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iNci!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iNci!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png 424w, https://substackcdn.com/image/fetch/$s_!iNci!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png 848w, https://substackcdn.com/image/fetch/$s_!iNci!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png 1272w, https://substackcdn.com/image/fetch/$s_!iNci!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iNci!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png" width="1280" height="560" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:560,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:392079,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iNci!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png 424w, https://substackcdn.com/image/fetch/$s_!iNci!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png 848w, https://substackcdn.com/image/fetch/$s_!iNci!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png 1272w, https://substackcdn.com/image/fetch/$s_!iNci!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F954fc57a-eaba-45dd-9440-bbe8d59cf63d_1280x560.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Courtesy: Splunk .conf Global Broadcast</figcaption></figure></div><p><strong><a href="https://conf.splunk.com/">Splunk&#8217;s user conference, .conf,</a></strong> took place in Boston last week and I had a front row seat to it all. I spent the week at the con sitting through keynotes, workshops, and catching up with friends + Splunk customers. This post will highlight what matters most to security teams and those building in the SecOps space.</p><div><hr></div><h2>TL;DR &#128240;</h2><p>Splunk bringing a lot more capabilities into their SIEM offering including domain-specific AI agents, AI x SOAR and a detection studio. They&#8217;ve also added federated search support for Snowflake and announced their upcoming launch of their Time Series Foundation Model on Hugging Face.</p><div class="pullquote"><p><em><strong> Security teams deserve better than building integrations, parsers and pipelines</strong></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZWeG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZWeG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png 424w, https://substackcdn.com/image/fetch/$s_!ZWeG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png 848w, https://substackcdn.com/image/fetch/$s_!ZWeG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png 1272w, https://substackcdn.com/image/fetch/$s_!ZWeG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZWeG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png" width="1456" height="508" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:508,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZWeG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png 424w, https://substackcdn.com/image/fetch/$s_!ZWeG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png 848w, https://substackcdn.com/image/fetch/$s_!ZWeG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png 1272w, https://substackcdn.com/image/fetch/$s_!ZWeG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c79fc43-b079-4795-9999-f32100cfdf09_1600x558.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Stop spending hours wrangling APIs, building custom parsers and data pipelines. Monad is the easy button for security data integration, with 150+ pre-built connectors that just work. Our flexible platform seamlessly routes data from any source to any destination&#8212;whether you're using Splunk, Snowflake, S3, or all of the above. Transform, filter, and enrich your data with the utmost flexibility.</p><p>Let your security engineers focus on catching threats, not building plumbing. Monad handles the data complexity while saving you over 70% on your SIEM bill so your team can focus on what matters most: securing the org.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.monad.com/&quot;,&quot;text&quot;:&quot;&#128073;&#127996; Start Free - 1TB/month&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.monad.com/"><span>&#128073;&#127996; Start Free - 1TB/month</span></a></p></div><h2><strong>Standout Announcements from .conf &#128640;</strong></h2><h4><strong>Triage Agent</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zfzJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zfzJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!zfzJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!zfzJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!zfzJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zfzJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zfzJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!zfzJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!zfzJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!zfzJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48b44a91-8b0c-4adf-b853-418623af8188_1024x768.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Triage Agent streamlines alert prioritization with AI-driven analysis, automatically executing investigation steps and reducing MTTR through automated insights. It evaluates, prioritizes, and explains alerts. This is expected in Alpha in January 2026 so long way till it&#8217;s in the hands of all Splunk users.</p><p>This is their &#8220;AI for SOC&#8221; answer. Lots of funding has been poured into AI for SOC startups in recent years. It&#8217;ll be interesting to see Splunk&#8217;s roll-out and the industry&#8217;s reception to this.</p><div><hr></div><h4><strong>Malware Reversing Agent</strong></h4><p>Splunk's malware reversing agent unpacks malicious scripts step-by-step for clear analysis. It extracts IOCs, maps threats to MITRE ATT&amp;CK, and eliminates bottlenecks from limited coding expertise. The demo showed it analyzing PowerShell commands in real-time, constructing temporary file paths, instantiating WebClient objects, downloading MSI files from remote servers, and invoking malware installation. The agent explains each line of code, flags evasion techniques, and groups recurring behaviors.</p><p>Most SOC analysts aren't malware reverse engineers so this is pretty significant.</p><div><hr></div><h4><strong>AI SOAR Playbook Authoring</strong></h4><p>This feature converts natural language commands into SOAR playbooks. The interface shows a simple prompt like "Build a playbook to isolate a host if X alert triggers" and generates the complete workflow with custom code blocks and action blocks.</p><p>Lots of the qualms w/ SOAR is the technical complexity required to actually roll-out sophisticated playbooks. Hopefully this helps ease that thrash and reduce the need for hiring 3rd parties to build your playbooks.</p><div><hr></div><h4><strong>Detection Studio with AI Enhancement</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-B_h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-B_h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!-B_h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!-B_h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!-B_h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-B_h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-B_h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png 424w, https://substackcdn.com/image/fetch/$s_!-B_h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png 848w, https://substackcdn.com/image/fetch/$s_!-B_h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png 1272w, https://substackcdn.com/image/fetch/$s_!-B_h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ce44de-9e13-46e3-8106-8f2a65a5b63a_1024x768.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Detection Studio now includes AI-powered features that help with many steps across the detection lifecycle including ideation, testing, fine-tuning, and monitoring. The interface shows real-time detection coverage metrics, validates data source availability, and includes a Personalized Detection SPL Generator that customizes detections for unique SOC environments. You can test detections against historical data (using data replays), deploy in safe test mode, and run automated quality checks before production deployment.</p><p>The Detection studio is in Alpha stage so still may be a while till it&#8217;s generally available.</p><p><em>Read the full press release <a href="https://www.splunk.com/en_us/newsroom/press-releases/2025/cisco-elevates-the-soc-with-agentic-ai-for-faster-threat-response-and-reduced-complexity.html">here.</a></em></p><div><hr></div><h4><strong>The Cisco Data Fabric + Time Series Foundation Model</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2kAu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2kAu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png 424w, https://substackcdn.com/image/fetch/$s_!2kAu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png 848w, https://substackcdn.com/image/fetch/$s_!2kAu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png 1272w, https://substackcdn.com/image/fetch/$s_!2kAu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2kAu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png" width="1456" height="744" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:744,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2kAu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png 424w, https://substackcdn.com/image/fetch/$s_!2kAu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png 848w, https://substackcdn.com/image/fetch/$s_!2kAu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png 1272w, https://substackcdn.com/image/fetch/$s_!2kAu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45768a48-9897-45ec-8c4a-e2c1064ee6f2_1600x818.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The &#8220;data fabric&#8221; term is not new and probably dates back a decade+ at this point. However, I think Splunk is perfectly positioned to scale this out given the amount and variety (SecOps, NetOps, ITOps etc.) of telemetry they ingest + analyze. The Cisco Data Fabric will enable customers to build custom AI models with their proprietary data, unify distributed data sources for real-time insights, and power agentic workflows.</p><p>As part of this effort, they also launched a Time Series Foundation Model specifically for anomaly detection that'll hit <a href="https://huggingface.co/">Hugging Face</a> in November.</p><p>There aren&#8217;t many foundation models that exist for security and I haven't come across one that is specifically trained for SecOps use cases so this is truly a game changer. This will enable anyone to build applications and use cases on top of that model and will be helpful for correlation (events, identities, etc), anomaly detection, predictive stuff and more. Excited for this to ship!</p><p><em>Read the full press release <a href="https://www.splunk.com/en_us/newsroom/press-releases/2025/cisco-data-fabric-transforms-machine-data-into-ai-ready-intelligence.html">here.</a></em></p><div><hr></div><h4><strong>Federated Search Support for Snowflake</strong></h4><p>Snowflake integration will be in Alpha in February 2026. This will allow security teams to query Snowflake directly from Splunk. Jeetu Patel, CPO @ Cisco is calling distributed data stores "data ponds" and "data puddles". More water x data metaphors..</p><p>Federated search is great for conducting retroactive data/log analysis (i.e., threat hunting, investigations). It allows you to store data in cost-effective stores while still being able to query it from Splunk. Some security teams have adopted Snowflake for security data storage and many enterprises use it to store other business data so having access to that context directly from Splunk will be pretty dope.</p><p><em>Read the full press release<a href="https://www.splunk.com/en_us/newsroom/press-releases/2025/cisco-advances-open-data-ecosystems-with-splunk-federated-search-for-snowflake.html"> here.</a></em></p><div><hr></div><h2><strong>The Quiet Part Said Out Loud&#128176;</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XvBy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XvBy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png 424w, https://substackcdn.com/image/fetch/$s_!XvBy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png 848w, https://substackcdn.com/image/fetch/$s_!XvBy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png 1272w, https://substackcdn.com/image/fetch/$s_!XvBy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XvBy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png" width="1456" height="783" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:783,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XvBy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png 424w, https://substackcdn.com/image/fetch/$s_!XvBy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png 848w, https://substackcdn.com/image/fetch/$s_!XvBy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png 1272w, https://substackcdn.com/image/fetch/$s_!XvBy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6638bab-48b0-4ea6-9229-e0c1d27724df_1600x860.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The elephant in the room: <strong>cost</strong>. Let&#8217;s face it. Splunk is cost-prohibitive for SMBs and even larger enterprises with small security budgets. If you&#8217;ve been in the SecOps space, you&#8217;ve probably heard this more than a few times. Even Splunk presenters themselves brought up pricing concerns on multiple occasions. That's how you know it's bad.</p><p>Kudos to Splunk for addressing it head on though. Not highlighted much on the mainstage but more so in the breakout rooms is that they&#8217;re building to make Splunk less cost-prohibitive including edge processors, ingest filtering, federated search, S3 replay, and even free Cisco firewall log ingestion (is there any fine print here?).</p><div><hr></div><h2><strong>The Bottom Line &#129335;&#127997;&#8205;&#9794;&#65039;</strong></h2><p>Should you care? If you're already a Splunk customer, absolutely. If you&#8217;re a Splunk SIEM or SOAR competitor? Certainly. What about if you&#8217;re a startup building in AI for SOC, federated search or the ETL space? Maybe&#8230; You should certainly be paying attention.</p><p>The reality is that Splunk remains the enterprise default because it&#8217;s been proven at the largest of scales for decades. The world&#8217;s largest and most important enterprises rely on Splunk as their SOCs command center. While the paradigm has shifted, these latest innovations show they&#8217;re not getting complacent and are building for the long-haul.</p><p>Splunk is going deep on SecOps workflows with features like Detection Studio, recommended data onboarding plans, S3 data replay, and enhanced federated search. That paired with their AI announcements brought into one unified experience will be a game changer for customers once it&#8217;s all in place.</p><p><strong>Will Splunk still dominate enterprise SIEM in three years?</strong> &#129335;&#127997;&#8205;&#9794;&#65039; <em>I don&#8217;t have a crystal ball and as always, it&#8217;s all about execution.</em></p><p>However, I do know that the announcements made at this year&#8217;s Splunk .conf positions them well as we move into the AI era in security.</p><div><hr></div><h1><strong>Interested in sponsoring TCP?</strong></h1><p>Sponsoring TCP not only helps me continue to bring you the latest in security innovation, but it also connects you to a dedicated audience of ~7,300 CISOs, practitioners, founders, and investors across 125+ countries &#127758;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach&quot;,&quot;text&quot;:&quot;&#128073; Learn more here!&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach"><span>&#128073; Learn more here!</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cybersecurity Pulse (TCP) is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Future of Data Security: From AI Agents to Unified Platforms]]></title><description><![CDATA[A deep dive into modern data security challenges and the unified platform solution]]></description><link>https://www.cybersecuritypulse.net/p/the-future-of-data-security-from</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/the-future-of-data-security-from</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Tue, 29 Jul 2025 14:31:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!MbOI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The Cybersecurity Pulse (TCP)</strong>! I'm Darwin Salazar, Head of Growth at <strong><a href="https://www.monad.com/">Monad</a></strong> and former Detection Engineer in big tech. Each week, I dig through all the major headlines to bring you the latest security product innovation and industry news. Subscribe below for weekly updates!</em> &#128231;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MbOI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MbOI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png 424w, https://substackcdn.com/image/fetch/$s_!MbOI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png 848w, https://substackcdn.com/image/fetch/$s_!MbOI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png 1272w, https://substackcdn.com/image/fetch/$s_!MbOI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MbOI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png" width="822" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/636d4e6d-3915-4799-9220-d684db269372_822x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:822,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MbOI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png 424w, https://substackcdn.com/image/fetch/$s_!MbOI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png 848w, https://substackcdn.com/image/fetch/$s_!MbOI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png 1272w, https://substackcdn.com/image/fetch/$s_!MbOI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F636d4e6d-3915-4799-9220-d684db269372_822x600.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><strong>About the Author</strong></h4><p>Hi! &#128075; I&#8217;m <strong><a href="https://www.linkedin.com/in/darwin-salazar/">Darwin Salazar</a></strong><a href="https://www.linkedin.com/in/darwin-salazar/"> </a>and I've dealt with data security challenges up close from multiple angles, including leading <strong><a href="https://hitrustalliance.net/">HITRUST</a></strong> compliance initiatives and building medical device-to-cloud pipelines at Johnson &amp; Johnson, consulting on PCI DSS engagements for Fortune 500 clients, and crafting cloud misconfiguration detection rules at Datadog. I'm excited to share what I&#8217;m seeing in the space, where I think we&#8217;re headed, and who&#8217;s at the forefront in this space.</p><div><hr></div><h2>TL;DR &#127919;</h2><ul><li><p><strong>Proprietary data is </strong><em><strong>the</strong></em><strong> crown jewel for most organizations.</strong> For attackers, it's either the prize itself or the means to their ultimate goal. </p></li><li><p><strong>AI has fundamentally changed the way organizations think about data security.</strong> </p><ul><li><p>Think about the rate of adoption and impact of AI agents, MCP servers, Shadow AI, 3rd party AI supply chain risks. </p></li><li><p>Think GenAI generated sensitive data based off of sensitive inputs. </p></li><li><p>Think data poisoning and risks to AI model integrity.</p></li></ul></li><li><p>The traditional data security risks have not gone away. </p></li><li><p>The data security regulatory landscape has only intensified in recent years. </p></li><li><p>The difference between data security and any other domain is that data security must be horizontal by nature, spanning across identity, cloud, endpoints, and applications rather than living in any single domain.</p></li><li><p>Point solutions and traditional DLP fail to keep up with the velocity and distribution of sensitive data. </p></li><li><p>A unified platform approach helps tackle most of our previous shortcomings in data security while addressing emerging threat vectors. </p></li><li><p>We cover how <strong><a href="https://www.varonis.com/">Varonis</a></strong> is a great case study of the platform approach applied to data security due to their metadata framework, 20+ yrs of evolution, MDDR, DAM, DSPM, identity security capabilities and much more. </p></li></ul><p><strong>The bottom line:</strong> In an AI-powered world where data moves at machine speed, only unified platforms can provide the visibility, context, and automated response needed to stay ahead of traditional and emerging threats.</p><div><hr></div><h2><strong>Introduction</strong></h2><p>We spent 20 years building walls around our data. Then we gave AI the keys to nearly every door. For many organizations, their data is their moat and is what&#8217;s paving their next wave of growth as they build, adapt, and deploy AI systems across their workflows. Think about patented tech, billion dollar+ R&amp;D efforts, legally protected info, healthcare patient records, etc. Now think about just how fast consumers and enterprises are adopting the latest AI apps and integrating it across the board. The speed is mind-boggling and opens us up to many unknowns.</p><p>Take <strong><a href="https://www.varonis.com/blog/echoleak">EchoLeak</a></strong>, for example. It was a novel vulnerability type discovered in Microsoft 365 Copilot that could have allowed exfiltration of sensitive data right out of Copilot&#8217;s context window with little user interaction. Then you have enterprise AI apps and new protocols like <strong><a href="https://www.anthropic.com/news/model-context-protocol">Model Context Protocol</a></strong> (MCP) which integrate with existing tech stacks, inherit permission debt and can access sensitive data. To make things worse, it feels like AI is generating more sensitive data on a weekly basis than what humans create in a lifetime.</p><p>That said, I&#8217;m not here to spread doom and gloom. Security adapts as we always have. There are world-class security leaders that have navigated similar challenges for decades and there are vendors who have done the same. Think about the emergence of the data center, virtualization, the cloud, SaaS apps, and now AI. Each new wave introduces more complexity that stacks on top of existing challenges, yet we always adapt over time to meet them. The AI wave is different from others for many reasons, but I also have a sense of optimism about what AI can do for data security programs.</p><p>In this report, I&#8217;ll be digging into how the data security landscape has evolved in recent years, what a data security platform should look like in 2025 (using <strong><a href="https://www.varonis.com/">Varonis</a></strong> as an example), and what may lie ahead for the space. </p><div><hr></div><h2><strong>New Data Security Risks in the AI Era</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!znul!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!znul!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png 424w, https://substackcdn.com/image/fetch/$s_!znul!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png 848w, https://substackcdn.com/image/fetch/$s_!znul!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png 1272w, https://substackcdn.com/image/fetch/$s_!znul!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!znul!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png" width="1200" height="474.1875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:2529,&quot;width&quot;:6400,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:2234931,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/169559054?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a8c314-0e21-4a30-8c46-e32dafab1839_6400x3881.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!znul!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png 424w, https://substackcdn.com/image/fetch/$s_!znul!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png 848w, https://substackcdn.com/image/fetch/$s_!znul!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png 1272w, https://substackcdn.com/image/fetch/$s_!znul!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45353779-755d-4daf-8528-b5ccbaafb5f7_6400x2529.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>AI Agents</strong></h3><p>Widely adopted AI agents like Microsoft 365 Copilot, Glean and Salesforce Agentforce come with large promises, but also new risks. Many of these AI agents<a href="https://www.varonis.com/blog/salesforce-agentforce-security#:~:text=,are%20used%20properly%20and%20responsibly"> inherit their creator&#8217;s user permissions by default</a>, which means if your users have more access than they actually need (most do), then the AI tools do as well. In fact, <a href="https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Files/reports/2025-varonis-state-of-data-security-report.pdf">according to Varonis&#8217; latest research</a>, <strong>99% of organizations</strong> have sensitive data unnecessarily exposed to AI.</p><p>Even more concerning: around <strong>90% of sensitive cloud data</strong> is left openly accessible to these AI apps. A simple prompt could trigger an AI to pull sensitive information from various sources, making attackers' lives much easier. Traditional DLP and DSPM controls just can&#8217;t keep up with the speed and scale at which these AI agents operate.</p><p>Modern data security platforms must see AI the way attackers do&#8212;as a privileged user with unprecedented reach. This means understanding not just where sensitive data lives, but how AI agents access it, what permissions they inherit, and whether that access aligns with business needs. When your AI can touch data across clouds, SaaS apps, databases, and file shares in milliseconds, your security must operate at the same speed and scale.</p><div><hr></div><h4><strong>MCP and New Protocols</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K3GU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K3GU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png 424w, https://substackcdn.com/image/fetch/$s_!K3GU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png 848w, https://substackcdn.com/image/fetch/$s_!K3GU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png 1272w, https://substackcdn.com/image/fetch/$s_!K3GU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K3GU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png" width="1024" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7c9877b4-4b00-4386-913e-733048787807_1024x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K3GU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png 424w, https://substackcdn.com/image/fetch/$s_!K3GU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png 848w, https://substackcdn.com/image/fetch/$s_!K3GU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png 1272w, https://substackcdn.com/image/fetch/$s_!K3GU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c9877b4-4b00-4386-913e-733048787807_1024x576.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image Credit: <a href="https://www.linkedin.com/in/norah-klintberg-sakal/">Norah Sakal</a></figcaption></figure></div><p>The emergence of Model Context Protocol (MCP) servers represents a fundamental shift in how AI agents, apps, and humans interact with organizational data. While MCP servers enable us to securely access local data sources, databases, and APIs through standardized protocols, they also introduce new attack vectors where a single compromised server could expose multiple data sources simultaneously.</p><p>While MCP gives AI superpowers, it also amplifies traditional prompt injection attacks like the EchoLeak vulnerability by allowing attackers to potentially manipulate AI agents into executing malicious commands across their MCP connections. As MCP servers aggregate access across previously isolated data silos, the principle of least privilege becomes more critical than ever. Organizations must now address this convergence of risks where infrastructure designed to enhance AI capabilities could become their weakest security link.</p><p>As seen in previous technology waves, when there is a rush to adoption, security is often an afterthought. New AI tools are not immune to the same risks that have plagued us for decades. Case in point, look at the <a href="https://www.csoonline.com/article/4009373/asanas-mcp-ai-connector-could-have-exposed-corporate-data-csos-warned.html">recent Asana MCP bug</a> or the <a href="https://thehackernews.com/2025/07/critical-mcp-remote-vulnerability.html">critical severity vuln that allowed for Remote Code Execution (RCE) in mcp-remote</a>, a popular MCP tool downloaded over 400K times. The risks don&#8217;t stop there.</p><p>While there hasn&#8217;t been a public incident where an MCP server compromise was the cause, the vulnerabilities and risks are certainly there so it may only be a matter of time.</p><div><hr></div><h4><strong>GenAI Data Leaks</strong></h4><p>GenAI has exploded across enterprises, with <strong><a href="https://www.netskope.com/netskope-threat-labs/cloud-threat-report/july-2024-ai-apps-in-the-enterprise#:~:text=,of%20all%20data%20policy">96% of organizations</a></strong> now actively using these apps&#8212;three times more than just a year ago. But there&#8217;s a downside: nearly half (<strong>46%</strong>) of recent data loss incidents involved proprietary code mistakenly shared via AI prompts. Samsung experienced this firsthand when engineers accidentally leaked confidential source code to ChatGPT leading to a full suspension of all ChatGPT use till they figured out how to secure it.</p><p>Such incidents highlight that well-intentioned employees can easily expose sensitive data by pasting it into AI prompts, effectively creating an <strong>unsanctioned data pipeline</strong> out of the business.</p><div><hr></div><h4><strong>Shadow AI</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JVb4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JVb4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png 424w, https://substackcdn.com/image/fetch/$s_!JVb4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png 848w, https://substackcdn.com/image/fetch/$s_!JVb4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png 1272w, https://substackcdn.com/image/fetch/$s_!JVb4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JVb4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png" width="807" height="418" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:418,&quot;width&quot;:807,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JVb4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png 424w, https://substackcdn.com/image/fetch/$s_!JVb4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png 848w, https://substackcdn.com/image/fetch/$s_!JVb4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png 1272w, https://substackcdn.com/image/fetch/$s_!JVb4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F117146ea-b580-4625-8be2-02ab81dfaa02_807x418.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image credit: <a href="https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Files/reports/2025-varonis-state-of-data-security-report.pdf">Varonis&#8217; 2025 State of Data Security Report</a></figcaption></figure></div><p>Then there&#8217;s Shadow AI, AI tools that employees adopt without security&#8217;s approval. <strong><a href="https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Files/reports/2025-varonis-state-of-data-security-report.pdf">98% of organizations</a></strong><a href="https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Files/reports/2025-varonis-state-of-data-security-report.pdf"> have unapproved AI apps</a> lurking within their environments &#129327;. Often, these tools integrate directly into apps like Slack or email via OAuth or browser extensions, gaining deep access to sensitive information without anyone in security even noticing.</p><p>For instance, a seemingly innocent AI-powered email assistant could access calendars, customer data, or sensitive files. If not vetted by security, this tool could expose sensitive data in a number of ways. <strong>When users adopt apps that make their jobs easier/better, they will be extremely reluctant to give them up just because security says so. </strong>They will almost always try and find a way to circumvent whatever controls are in place.</p><p>In short, while the AI revolution has delivered immense value to businesses around the world, it&#8217;s also opened up a can of worms on the data security front.</p><div><hr></div><h4><strong>3rd Party AI Supply Chain Risks</strong></h4><p><a href="https://medium.com/@limbagoa/securing-the-ai-supply-chain-051f8d43c5c4">The third-party AI supply chain</a> introduces another layer of complexity and builds on our Shadow AI + GenAI Data Leak sections. Many enterprise AI apps are essentially wrappers around foundational models like GPT, Claude or even DeepSeek in some instances. The key here is that some vendors, especially startups, are not always transparent about it.</p><p>This creates hard-to-track data patterns where sensitive data might be processed, cached, or stored across multiple vendors without clear visibility. When an employee connects an AI writing assistant to your email, that tool might be sending your data through nested API calls to various AI providers, each with their own retention policies and security practices (or lack thereof). You lose the chain of custody for your data, which could be exposed through a vulnerability in any link of this AI supply chain. Even the most mature security teams have trouble keeping up with this which is why an AI governance plan + proper tooling is crucial, especially in heavily regulated industries.</p><div><hr></div><h2><strong>Traditional Threats Haven't Disappeared</strong></h2><h4><strong>Sensitive Data is Everywhere</strong></h4><p>In 2025, sensitive data lives everywhere: on-prem file shares, cloud platforms, productivity tools, employee devices, and even shadow AI applications. It's become incredibly easy to deploy new resources across multi-cloud and hybrid environments, often using just a few lines of code. This ease significantly complicates visibility and governance. App-to-app and AI-to-AI integrations only make matters worse by exponentially expanding the potential attack surface and letting sensitive data move freely.</p><div><hr></div><h4><strong>Insider Threats</strong></h4><p>Malicious insiders, careless users, and compromised accounts all fall under this category. Insiders often already have broad access, so if their account goes rogue or if they upload sensitive data to a shady AI app, it can eventually constitute as a data breach. We&#8217;ll discuss how to combat this in following sections.</p><div><hr></div><h4><strong>Ransomware and Supply Chain Attacks</strong></h4><p>Ransomware attacks can cripple operations and expose a company&#8217;s sensitive data. Take the <a href="https://energycommerce.house.gov/posts/what-we-learned-change-healthcare-cyber-attack">Change Healthcare breach</a> for example, it devastated medical supply chains across US, leading to some medical practices temporarily shutting down and people not being able to receive their medication from pharmacies.</p><p>Just as ransomware can impact physical supply chains, it can come by way of your digital supply chain. Your data doesn't only live in systems you directly control. Partners, vendors, contractors, and SaaS providers often store or can access your sensitive information. A breach in your supply chain can be as devastating as one in-house. Recent years have shown us numerous examples of attackers exploiting weaker links ( i.e., a supplier, an IT service provider, a cloud tool) to get to the ultimate target.</p><div><hr></div><h2><strong>The Evolving Regulatory Landscape</strong></h2><p>New regulations are pushing companies to prioritize security with increasing urgency. Here's what's driving compliance requirements today:</p><h4><strong>Global Privacy Laws</strong></h4><ul><li><p>GDPR enforcement has escalated (<a href="https://www.exabeam.com/explainers/gdpr-compliance/gdpr-fines-structure-and-the-biggest-gdpr-fines-to-date/#:~:text=data%20for%20advertising%20purposes">Meta's &#8364;1.2B fine in 2023</a>)</p></li><li><p>Similar laws spreading globally mean stringent data protection is required almost everywhere</p></li></ul><h4><strong>Industry-Specific Frameworks</strong></h4><ul><li><p>PCI DSS 4.0 and HITRUST now emphasize continuous compliance over periodic checks</p></li><li><p>Healthcare and finance face the strictest requirements with severe penalties</p></li></ul><h4><strong>AI and Disclosure Requirements</strong></h4><ul><li><p><a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai">EU AI Act (fully enforceable 2026)</a> classifies AI systems by risk level</p></li><li><p><a href="https://www.sec.gov/newsroom/speeches-statements/gerding-cybersecurity-disclosure-20231214">SEC mandates 4-day cyber incident disclosure </a>for public companies</p></li><li><p>Board-level accountability is now standard</p></li></ul><h4><strong>U.S. State Laws</strong></h4><ul><li><p><a href="https://oag.ca.gov/privacy/ccpa">California's CPRA</a> and similar state laws require "reasonable security" measures</p></li><li><p>Focus on encryption and breach impact mitigation</p></li></ul><div><hr></div><h2><strong>The Shift to Data-Centric Security and Unified Platform Approaches</strong></h2><p><strong>Traditional perimeter-based security fails when sensitive data spans multiple cloud platforms, SaaS applications, AI apps, and on-prem environments.</strong> Data-centric security is an approach that shifts focus from securing access points to protecting the data itself, wherever it resides. This requires answering critical questions that most organizations struggle with:</p><ol><li><p>Where is our sensitive data located? What are our crown jewel data stores?</p></li><li><p>Who has access, and is that access right-sized?</p></li><li><p>How is data classified and encrypted?</p></li><li><p>How do we know when certain data usage or activity is anomalous or risky?</p></li></ol><p>DSPM tools have become table stakes because they continuously discover, classify, and monitor sensitive data exposures across your entire environment. While DLP capabilities are still key, as a standalone product, it simply generates too much noise. The broader challenge here is trying to address AI agents, MCP vulnerabilities, shadow AI, insider threats, and compliance requirements with disconnected tools. Without visibility and correlation across the activity taking place with your critical identities, environments, and crown jewel data stores, you&#8217;re pretty much flying blind.</p><p><strong>Modern data security requires a platform approach</strong> that provides unified visibility across identity, data access, AI usage, and user behavior. You need detection and that understands context and automated response + prevention that acts at AI speed. Without integrated coverage across IAM, AI security, cloud + on-prem, UEBA, and detection &amp; response, organizations are often left with blind spots. </p><p><strong>The difference between data security and any other domain is that data security must be horizontal by nature, spanning across identity, cloud, endpoints, and applications rather than living in any single domain. </strong>It&#8217;s clear that as data security becomes more complex, point solutions will have trouble keeping up.</p><p>In this next section, we'll dive deeper into how Varonis addresses these challenges through their unified platform approach and why they're uniquely positioned as a leader in the AI era.</p><div><hr></div><h2><strong>Why Varonis?</strong></h2><p>I don't partner with vendors lightly, especially for reports of this gravity. I decided to collaborate with Varonis on this report because after monitoring the data security space for years, they consistently stood out, not only for their product innovation velocity, but also how they stay ahead of emerging threats while solving real problems security teams face today. Their research team is also continuously finding vulns in critical enterprise apps like the <a href="https://www.varonis.com/blog/counter-strike-servicenow">recent data inference vuln in Service Now</a>.</p><div class="pullquote"><p><em><strong>Disclaimer</strong></em></p><p>This isn't a sales pitch or a recommendation to buy Varonis. However, to me, they exemplify what the right approach to data security should look like in 2025 and beyond.  Whether you choose Varonis or another solution, the principles and capabilities outlined here represent the baseline for data security strategies in the AI era.</p></div><p>Varonis has been doing data security for<strong> over 20 years</strong>, long before it was trendy. They're the established market leaders with the<a href="https://www.varonis.com/customer-stories"> customer base</a> (i.e., <a href="https://www.varonis.com/customer-stories">NASA, Lowe&#8217;s, and Stryker</a>) and industry recognition to prove it. But <strong>unlike many legacy vendors, they haven't gotten complacent</strong>. Instead, they've doubled down on their original vision to account for AI and emerging threats while maintaining their core strength in data security. <strong>This collaboration made sense because Varonis has been building the future of data security for decades.</strong> After spending years helping Fortune 500 organizations navigate similar challenges, I wanted to work with the vendor that's at the forefront of data security.</p><div><hr></div><h2><strong>Inside Varonis: A Leader's Approach to Data Security</strong></h2><h4><strong>The Foundation: Understanding Data Relationships at Scale</strong></h4><p>At the core, <a href="https://www.varonis.com/blog/varonis-in-the-cloud">Varonis built their platform</a> around a simple but powerful idea: you need to inventory and understand the relationships between users, permissions, and data before you can protect anything. <a href="https://www.varonis.com/data-security-platform">Their unified data security platform</a> takes a holistic approach to data security, combining the capabilities needed to stop data breaches and ensure compliance &#8212; all with minimal effort from you.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!INCT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!INCT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png 424w, https://substackcdn.com/image/fetch/$s_!INCT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png 848w, https://substackcdn.com/image/fetch/$s_!INCT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png 1272w, https://substackcdn.com/image/fetch/$s_!INCT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!INCT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png" width="1456" height="672" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:672,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!INCT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png 424w, https://substackcdn.com/image/fetch/$s_!INCT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png 848w, https://substackcdn.com/image/fetch/$s_!INCT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png 1272w, https://substackcdn.com/image/fetch/$s_!INCT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdce6e61f-1bc9-442b-8b0c-c33bded0cec6_1600x739.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What this means in practice is that the platform knows where sensitive data is stored, on what assets, the asset&#8217;s configuration, who can access what, how they got that access, and whether they're actually using it. Taking this approach, they&#8217;re able to provide a holistic view across on-prem file shares, cloud storage, databases, email, collaboration platforms, and now AI tools. Everything is connected in one view.</p><p>Since many breaches result from attackers leveraging existing accounts and permissions or from misconfigured data stores, having a real-time view of the nuances of your data is critically important.</p><div><hr></div><h3><strong>AI-Powered Classification Built on Two Decades of Experience</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dsN_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dsN_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png 424w, https://substackcdn.com/image/fetch/$s_!dsN_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png 848w, https://substackcdn.com/image/fetch/$s_!dsN_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png 1272w, https://substackcdn.com/image/fetch/$s_!dsN_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dsN_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png" width="924" height="504" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:504,&quot;width&quot;:924,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dsN_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png 424w, https://substackcdn.com/image/fetch/$s_!dsN_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png 848w, https://substackcdn.com/image/fetch/$s_!dsN_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png 1272w, https://substackcdn.com/image/fetch/$s_!dsN_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a6cd3e3-6625-457e-bea4-25408dd9d5c9_924x504.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Varonis has been doing data classification since before it was cool &#8212; over 20 years now. While most vendors still use basic <a href="https://en.wikipedia.org/wiki/Regular_expression#:~:text=A%20regular%20expression%20(shortened%20as,strings%2C%20or%20for%20input%20validation.">RegEx</a> patterns to find credit cards and SSNs. Varonis leverages proprietary AI/ML approaches (not just GPT wrappers) to bring world-class data classification to its customers.</p><p><strong>Their three-tier classification engine combines:</strong></p><ul><li><p>Traditional ML for known patterns (leveraging 20+ years of refinement)</p></li><li><p>LLMs (GPT-4 models via Azure) for contextual understanding</p></li><li><p>Compliance rules for regulatory requirements</p></li><li><p>Incremental scanning (only processing what's changed)</p></li></ul><p>This approach ensures that it knows the difference between a SSN in an HR document versus a sample one being used in a dev environment for testing. Same pattern, completely different risk profile. This contextual understanding reduces false positives and helps teams with prioritization and remediation.</p><p><a href="https://www.varonis.com/blog/ai-data-classification">Their "Three Cs" approach</a> is crucial to securing the full data lifecycle. <strong>Complete</strong> scans with no blind spots, <strong>Contextual</strong> understanding of data exposure and threats, and <strong>Current</strong> real-time visibility. Beyond basic pattern matching, it performs sentiment analysis, proximity matching (multiple indicators = higher confidence), and even <a href="https://aws.amazon.com/what-is/ocr/">OCR</a> for images.</p><p>Another thing I appreciate is <a href="https://www.varonis.com/trust/responsible-ai">their commitment to privacy and transparency when it comes to AI use</a>. They don't train ML models on customer data, only public and licensed datasets. Plus, the explainable AI provides actual reasoning when someone asks why data was flagged as sensitive, not just a black box decision.</p><div><hr></div><h3><strong>The World&#8217;s First Agentic MDDR</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Fgol!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Fgol!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png 424w, https://substackcdn.com/image/fetch/$s_!Fgol!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png 848w, https://substackcdn.com/image/fetch/$s_!Fgol!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png 1272w, https://substackcdn.com/image/fetch/$s_!Fgol!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Fgol!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png" width="1456" height="806" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:806,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Fgol!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png 424w, https://substackcdn.com/image/fetch/$s_!Fgol!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png 848w, https://substackcdn.com/image/fetch/$s_!Fgol!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png 1272w, https://substackcdn.com/image/fetch/$s_!Fgol!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b677af0-eb51-4a87-a416-5458a450654a_1600x886.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://www.varonis.com/blog/threat-detection-with-agentic-ai">Varonis built the first MDDR service that uses AI agents to investigate threats</a> before human analysts see them Traditional vendors that stop at alerting, but Varonis combines AI-powered investigation with human expertise.</p><p>How it works:</p><ul><li><p>Anomalous activity triggers AI investigation</p></li><li><p>AI agents correlate user behavior, peer groups, access patterns, and device info for full context</p></li><li><p>Only escalates to human analysts when it's a true threat</p></li></ul><p><strong>SLAs + Response times:</strong> 30 minutes for ransomware, 120 for everything else.</p><p>Having the vendor provide MDDR solves the expertise gap. Most orgs can't hire and retain data security experts who understand these platforms deeply. With Varonis MDDR, you get analysts who live and breathe this stuff, backed by AI that's learning from thousands of deployments. <strong>Nobody else in data security offers this combination.</strong></p><div><hr></div><h3><strong>UEBA Built Specifically for Data Threats</strong></h3><p>Most UEBA tools watch endpoints, cloud, and user activity. <a href="https://www.varonis.com/platform/data-centric-ueba">Varonis built theirs from the ground up specifically for data security</a>.<strong> </strong>The platform creates <strong>behavioral baselines</strong> for every user and device, learning what's normal across your entire data estate. It uses hundreds of ML threat models trained on anonymized data from their full customer base, not just your environment.</p><p><strong>Detection coverage spans the full attack chain:</strong></p><ul><li><p><strong>Data-layer threats: </strong>Unusual access patterns, permission changes, mass deletion/encryption</p></li><li><p><strong>Identity threats:</strong> Privilege escalation, geo-hopping, impossible travel</p></li><li><p><strong>Advanced TTPs: </strong>Data staging, exfiltration attempts, lateral movement (MITRE ATT&amp;CK)</p></li><li><p><strong>Endpoint visibility:</strong> Via Microsoft Defender and SentinelOne integrations</p></li><li><p><strong>Full-stack coverage:</strong> Data, identity, network, cloud apps - all in one view</p></li></ul><p>This data-centric UEBA helps Varonis catch what others miss. While traditional tools alert on suspicious network connections or atypical login location, <a href="https://www.varonis.com/solutions/insider-risk-management">Varonis alerts when that same user suddenly accesses sensitive data they've never touched before</a>.</p><p>The system enriches every alert with full context &#8212; who did what, to which data, how sensitive it was, and whether this behavior matches known attack patterns. This is another massive value add for security leaders and differentiator from other solutions.</p><div><hr></div><h3><strong>Modern-Day Database Monitoring</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wt0h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wt0h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png 424w, https://substackcdn.com/image/fetch/$s_!Wt0h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png 848w, https://substackcdn.com/image/fetch/$s_!Wt0h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png 1272w, https://substackcdn.com/image/fetch/$s_!Wt0h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wt0h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png" width="598" height="474.6625" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/adf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:889,&quot;width&quot;:1120,&quot;resizeWidth&quot;:598,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Identity protection access illustration&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Identity protection access illustration" title="Identity protection access illustration" srcset="https://substackcdn.com/image/fetch/$s_!Wt0h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png 424w, https://substackcdn.com/image/fetch/$s_!Wt0h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png 848w, https://substackcdn.com/image/fetch/$s_!Wt0h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png 1272w, https://substackcdn.com/image/fetch/$s_!Wt0h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf91eaf-81c0-4ae8-91a1-85986e1de5a7_1120x889.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The <a href="https://www.varonis.com/blog/varonis-to-acquire-cyral-database-activity-monitoring">2025 Cyral acquisition</a> transformed Varonis' database coverage. While traditional DAM requires agents, performance hits, and endless configuration, Varonis/Cyral deploys in an agentless fashion without touching your databases.</p><p><strong>Comprehensive coverage across every database type:</strong></p><ul><li><p><strong>Traditional:</strong> Oracle, SQL Server, MySQL, PostgreSQL</p></li><li><p><strong>Cloud-native: </strong>Aurora, DynamoDB, CosmosDB, BigQuery, Snowflake</p></li><li><p>Universal connector for future databases</p></li></ul><p>The architecture is elegantly simple: stateless proxies that see everything without impacting performance. It runs on the same Metadata Framework, so database activity connects to file access, identity events, and cloud behavior in one unified view.</p><p>Built-in compliance mapping (NIST, HIPAA, SOX, GDPR, PCI) and <a href="https://www.varonis.com/coverage/databases">real-time ransomware detection</a> watches for database-specific indicators like disabling automatic backups, mass data exports, and snapshot deletions.</p><p>The key differentiator is that <a href="https://www.varonis.com/platform/database-activity-monitoring">the DAM capabilities</a> are integrated within their full platform.</p><div><hr></div><h3><strong>Automated Remediation That Won't Break Production</strong></h3><p>Automated remediation has been a controversial topic ever since I started in security. The main concern I always hear is that humans/machines/automation often make mistakes and those mistakes could lead to key system downtime and business disruption.</p><p>Think of an automated flow taking down the payments system production Kubernetes cluster because it closed down a critical port due to missing context of a compensating control. That would suck wouldn&#8217;t it? Scenarios like this are a key reason why our industry has been hesitant to adopt automated remediation. In the most critical cases, having a human in the loop to make the decision is a non-negotiable.</p><p>However, the world is moving toward an automated future and there are smart people with massive R&amp;D budgets working on making automated remediation a reality with minimal friction.</p><p>Varonis is achieving this today in real-world environments across multiple domains to secure sensitive data. The key is the simulation, rollback, and multi-engine capabilities:</p><p><strong>Multi-Engine Architecture:</strong></p><ul><li><p><strong>File systems:</strong> Multi-threaded distributed commit engine</p></li><li><p><strong>Cloud: </strong>Policy automation for SaaS/IaaS configurations</p></li><li><p>Intelligent decision-making about actual access needs</p></li><li><p>Automatic rollback if something breaks</p></li></ul><p><strong>Access cleanup:</strong> <a href="https://www.varonis.com/solutions/policy-automation">Removes global access groups ("Everyone"), stale users</a>, <a href="https://www.varonis.com/blog/automating-permissions-cleanup">excessive permissions</a>, dead collaboration links, and risky third-party apps. The ML-powered recommendations mean you're not guessing what's safe to remove.</p><p><strong>Data protection:</strong> <a href="https://www.varonis.com/blog/data-masking">Real-time masking for Redshift, BigQuery, and Snowflake</a> that's role-aware and classification-driven. Automatic labeling through Microsoft Purview integration ensures consistency across platforms.</p><p>What makes this different is the intelligence behind it. The system understands who actually needs access based on usage patterns, business context, dependencies between systems, and when to roll back versus push through.</p><p>Their approach enables continuous reduction of attack surface without business disruption. Simulation lets you preview impact before committing changes. The distributed architecture means you can remediate at scale.</p><p>Huge kudos to Varonis for being one of the only vendors deeply investing in and actually realizing automated remediation.</p><div><hr></div><h3><strong>Securing AI Agents</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!No6_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!No6_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png 424w, https://substackcdn.com/image/fetch/$s_!No6_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png 848w, https://substackcdn.com/image/fetch/$s_!No6_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png 1272w, https://substackcdn.com/image/fetch/$s_!No6_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!No6_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png" width="1096" height="671" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:671,&quot;width&quot;:1096,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!No6_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png 424w, https://substackcdn.com/image/fetch/$s_!No6_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png 848w, https://substackcdn.com/image/fetch/$s_!No6_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png 1272w, https://substackcdn.com/image/fetch/$s_!No6_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F947523c1-3f3d-4e27-89fa-6115d67190a1_1096x671.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When deployed without security oversight, AI agents are essentially superusers with API access to everything. While everyone's rushing to deploy Copilot, ChatGPT Enterprise, and Salesforce Agentforce, most haven't figured out the security implications. Varonis has been at the forefront of handling this challenge every step along the way.</p><p><strong>Below is how they handle security for some of the most popular AI agents:</strong></p><p><strong>For<a href="https://www.varonis.com/coverage/salesforce-agentforce"> Salesforce Agentforce</a>:</strong></p><ul><li><p>Real-time visibility into how agents access, create, and edit Salesforce data</p></li><li><p>Automatic flagging when sensitive data gets exported</p></li><li><p>Policy enforcement that prevents data leakage before it happens</p></li></ul><p><strong>For<a href="https://www.varonis.com/blog/chatgpt-enterprise"> ChatGPT Enterprise</a>:</strong></p><ul><li><p>Parses every prompt and response for sensitive data</p></li><li><p>Catches users pasting PII into prompts</p></li><li><p>Comprehensive audit logs for compliance</p></li><li><p>Automatic access revocation when risk thresholds are exceeded</p></li></ul><p><strong>For<a href="https://www.varonis.com/coverage/microsoft-365-copilot"> Microsoft 365 Copilot</a>:</strong></p><ul><li><p>Dashboard showing exactly what sensitive data Copilot can access</p></li><li><p>Automatic lockdown of over-permissive folders</p></li><li><p>Prompt-level auditing with<a href="https://www.varonis.com/blog/nist-csf-microsoft-365-copilot"> NIST CSF 2.0 alignment</a></p></li><li><p>Full integration with SharePoint, OneDrive, and Teams security</p></li></ul><p>This coverage is integrated with Varonis' existing classification, UEBA, and remediation engines. When Copilot accesses sensitive data it shouldn't see, the platform knows immediately because it already classified that data and baselined normal behavior.</p><p>AI agents need the same security controls as human users, plus additional monitoring and governance for their unique risks. Varonis delivers both, which is why I&#8217;d say they&#8217;re even ahead of most pure play AI security vendors.</p><div><hr></div><h3><strong>Identity Protection &#8211; Uniting Identity and Data Security</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2Pff!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2Pff!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png 424w, https://substackcdn.com/image/fetch/$s_!2Pff!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png 848w, https://substackcdn.com/image/fetch/$s_!2Pff!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png 1272w, https://substackcdn.com/image/fetch/$s_!2Pff!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2Pff!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png" width="688" height="530" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:530,&quot;width&quot;:688,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2Pff!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png 424w, https://substackcdn.com/image/fetch/$s_!2Pff!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png 848w, https://substackcdn.com/image/fetch/$s_!2Pff!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png 1272w, https://substackcdn.com/image/fetch/$s_!2Pff!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8851cd7b-f074-467c-be87-3aded223d1b1_688x530.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Most orgs manage identity and data security separately, creating a significant blind spot. Identity tools verify logins but can't see data access patterns. Data security tools monitor file access but lack context about whether that access is normal for that user. Attackers exploit this gap by using valid credentials and moving laterally while appearing legitimate to separate identity and data security solutions.</p><p>Varonis&#8217; recent <a href="https://www.varonis.com/blog/varonis-identity-protection">Identity Protection launch</a> addresses this disconnect by unifying identity and data security in one platform. This gives security teams visibility into the identity layer, enabling them to correlate authentication activity with actual data access patterns.</p><p>Varonis is the first platform to fully integrate ITDR capabilities with data security, catching MFA bypasses, lateral movement, and suspicious logins while understanding what data is actually at risk. Traditional identity tools stop at "did they log in successfully?" Varonis asks, "What are they doing with that access?"</p><div><hr></div><h2><strong>The Path Forward</strong></h2><p>The data security landscape has <strong>fundamentally changed</strong>. Enterprises and consumers now leverage GenAI and agentic AI on a daily basis, while this accelerates innovation it also, unprecedented security risk. Traditional security approaches that segment identity, cloud, data, endpoints, and AI into separate domains have never kept up, and certainly won't moving forward. Organizations need <strong>unified platforms</strong> that can correlate activity and anomalies across multiple domains and give teams governance capabilities simultaneously.</p><p>We're watching AI evolve at breakneck speed, from GenAI assistants to MCP-enabled agents, with quantum computing threats and opportunities landing in the next couple of years. The future of data security must be unified, automated, and <em>adaptive.</em></p><p>The winners in this new landscape will be those who recognize that <strong>data security isn't just another security domain</strong>. It's the foundation upon which all other security efforts must build. In a world where AI agents can access terabytes of data in milliseconds, where shadow AI proliferates faster than policies can be written, and where traditional perimeters have dissolved entirely, data-centric security is pretty much one of the final frontiers.</p><p>Organizations that are proactive in their data security programs in the AI era will thrive. AI is a massive enabler, and the last thing we want to do as an industry or as a security leader is to bottleneck that because we couldn&#8217;t keep up. The future of data security is unified.</p><div><hr></div><h2>&#128231; Subscribe for More &#128231;</h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you enjoyed this post, subscribe below for our weekly digest delivered straight to your inbox! &#128640;</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="pullquote"><p><strong>Disclaimer</strong></p><p>This report is for informational purposes only and does not constitute a recommendation to purchase Varonis or any vendor solution, nor should it be considered financial or investment advice. While Varonis serves as a case study for modern data security capabilities, organizations should conduct their own assessments to determine which solutions best meet their specific needs. </p></div>]]></content:encoded></item><item><title><![CDATA[Wiz’s $32B Sales Engine: From Founder-Led to Channel-Led Growth (Part II)]]></title><description><![CDATA[Inside Wiz&#8217;s transition to 100% channel sales, global blitzscaling, and how a top-down sales strategy helped them conquer the Fortune 100.]]></description><link>https://www.cybersecuritypulse.net/p/wizs-32b-sales-engine-from-founder</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/wizs-32b-sales-engine-from-founder</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Wed, 09 Apr 2025 11:31:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tMXE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The Cybersecurity Pulse (TCP)</strong>! I'm Darwin Salazar, Head of Growth and Marketing at <strong><a href="https://www.monad.com/">Monad</a></strong> and former Detection Engineer in big tech. Each week, I dig through all the major headlines to bring you the latest security product innovation and industry news. Subscribe below for weekly updates!</em> &#128231;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tMXE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tMXE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tMXE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tMXE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tMXE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tMXE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Wiz auf X: &#8222;&#128680;BREAKING NEWS&#128680; Wiz just took over the NYSE trading floor!  &#127881;&#127882; Celebrating our $300M series D funding round at a $10B valuation,  we're honored to have this incredible opportunity.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Wiz auf X: &#8222;&#128680;BREAKING NEWS&#128680; Wiz just took over the NYSE trading floor!  &#127881;&#127882; Celebrating our $300M series D funding round at a $10B valuation,  we're honored to have this incredible opportunity." title="Wiz auf X: &#8222;&#128680;BREAKING NEWS&#128680; Wiz just took over the NYSE trading floor!  &#127881;&#127882; Celebrating our $300M series D funding round at a $10B valuation,  we're honored to have this incredible opportunity." srcset="https://substackcdn.com/image/fetch/$s_!tMXE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tMXE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tMXE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tMXE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5573bc-b751-4b77-bad2-c53692d0b13d_2048x1366.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>At the time of acquisition, <strong>Wiz was generating ~$17M in enterprise value every. single. day</strong><a href="https://www.onlycfo.io/p/32b-wiz-acquisition-very-rich-employees">.</a> $32B divided by 1825 days (5 years) equals $17.5M. Not too shabby. </p><p>In <a href="https://www.cybersecuritypulse.net/p/wizs-32b-gtm-playbook-unpacking-the">Part I of our blog series</a>, I covered Wiz&#8217;s journey to product-market fit (PMF) and how they designed a winning brand. Both were integral to the success that followed. Once they had PMF and their founders sold their first couple million in annual recurring revenue (ARR), they hit the gas pedal and invested heavily in their GTM motions.</p><p>In this post, I&#8217;ll be dissecting their approach to sales, channel, and alliances and attempt to provide practical takeaways other GTM teams can apply. Below are the areas I&#8217;ll cover:</p><ul><li><p>Sales org structure and key hires</p></li><li><p>Top-down sales strategy</p></li><li><p>Channel: Cloud marketplaces, resellers, alliances</p></li><li><p>Regional and international expansion</p></li></ul><p><strong>Note:</strong> I&#8217;m taking a black box approach and mostly leveraging public sources like leadership interviews, press, and case studies to dissect Wiz&#8217;s approach at each stage of its journey.</p><div><hr></div><h2>Tl;dr </h2><p>There&#8217;s an immense amount of value and important context throughout the post so I encourage you to read til the end. However, if you&#8217;re in a time crunch, here are the biggest takeaways for founders and GTM operators: </p><ul><li><p><strong>Start with Founder-Led Sales until $1-3M in ARR </strong></p></li><li><p><strong>Once PMF, hire world-class revenue leaders early</strong></p></li><li><p><strong>Grow ahead of demand, not behind it.</strong></p></li><li><p><strong>Build a layered channel &amp; partner strategy (Resellers, MSSPs, Tech alliances, etc)</strong></p></li><li><p><strong>Go top-down from day one. Go for massive deals v. SMB </strong>(if you have the choice)</p></li><li><p><strong>Continuously iterate on Time-to-Value (TTV).</strong></p></li><li><p><strong>Align with how customers want to buy. Be flexible on timelines + transaction methods.</strong></p></li><li><p><strong>Treat cloud marketplaces as strategic channels. Nurture and invest. </strong></p><ul><li><p>Off topic, but on topic: <a href="https://www.channelfutures.com/security/crowdstrike-hits-1-billion-mark-aws-marketplace">CrowdStrike sold $1 billion in revenue on AWS Marketplace in 2024</a> &#129327;</p></li></ul></li><li><p><strong>Ask questions, sit back. Listen more than what you speak during customer conversations.</strong></p></li></ul><div class="pullquote"><p><strong>Fall in love with your security logs again. Detect &amp; respond like a boss.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!03Jd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!03Jd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png 424w, https://substackcdn.com/image/fetch/$s_!03Jd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png 848w, https://substackcdn.com/image/fetch/$s_!03Jd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png 1272w, https://substackcdn.com/image/fetch/$s_!03Jd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!03Jd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png" width="352" height="103.69426751592357" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/129437fb-8337-4421-a4e4-4f1e466859af_628x185.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:185,&quot;width&quot;:628,&quot;resizeWidth&quot;:352,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!03Jd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png 424w, https://substackcdn.com/image/fetch/$s_!03Jd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png 848w, https://substackcdn.com/image/fetch/$s_!03Jd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png 1272w, https://substackcdn.com/image/fetch/$s_!03Jd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129437fb-8337-4421-a4e4-4f1e466859af_628x185.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Here's the hard truth: traditional SIEM and logging tools are struggling under today's massive log volumes, with costs quickly escalating to six or seven figures per year. That's why teams are searching for better alternatives. But there's a catch: these alternatives often require significant data engineering work to maintain.</p><p>That's where Scanner.dev comes in - Our platform transforms how you SIEM. Just load your raw log data into S3 buckets, and let our schemaless indexing engine take care of the rest. With Scanner.dev, querying is a breeze thanks to our free text search, which processes data at blazing speeds up to 10TB/sec &#129327;. Plus, you have the flexibility to use our default detection rules or customize your own and sync them from GitHub.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://scanner.dev/?&amp;utm_source=cybesecurity_pulse&amp;utm_medium=newsletters&quot;,&quot;text&quot;:&quot;&#128073; Check out their playground here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://scanner.dev/?&amp;utm_source=cybesecurity_pulse&amp;utm_medium=newsletters"><span>&#128073; Check out their playground here</span></a></p></div><h2><strong>Sales Org Structure and Talent</strong></h2><p>Wiz leaned heavily on founder-led sales in the early stages. Once they discovered how to position and sell the product to their core ICPs (cloud+infra security, CISOs), they then had a repeatable sales motion of sorts which laid the groundwork for seasoned sales leaders to build upon.</p><p>People are more likely to buy from people they like and trust. This is <em>especially</em> true in cybersecurity. So the <strong>first few sales hires are crucial</strong> for establishing and scaling a winning team and culture.</p><h3><strong>Bringing in a World-Class Sales Leader</strong></h3><div id="youtube2-yDS8xKlAeXw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yDS8xKlAeXw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yDS8xKlAeXw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>With early traction on tap, Wiz poured gasoline on the fire by hiring <a href="https://www.linkedin.com/in/colin-jones-972a2311/">Colin Jones</a>, a world-class revenue leader who previously spent 6 years at <a href="https://duo.com/">Duo</a>. Colin joined as CRO in February 2021, just three months after Wiz came out of stealth with $100M in funding, tasked with driving growth from $0 to $100M ARR. In this podcast interview with SaaStr CRO Confidential, Colin discusses the early days scaling Wiz&#8217;s sales org. Here are my key takeaways:</p><ul><li><p><strong>Playbooks are prisons:</strong> Instead of leveraging his playbook from Duo, Colin onboarded by going on a <strong>&#8220;listening tour&#8221; </strong>by joining as many customer calls as possible to get acclimated with Wiz&#8217;s value proposition. He encouraged new hires to do the same.</p></li><li><p><strong>Customer-driven GTM shifts:</strong> In 2023, Wiz went from hybrid direct/channel model to <strong>100% channel</strong> since this is what customers were demanding at the time.</p></li><li><p><strong>On scaling: </strong>Wiz was hiring GTM based on forecasted growth numbers. They erred on the side of over-hiring to meet demand. In other words, they &#8216;<a href="https://hbr.org/2016/04/blitzscaling">Blitzscaled</a>&#8217;.</p></li><li><p><strong>Listen first:</strong> Always listen first. Ask questions more than you speak.</p></li><li><p><strong>Network and trust: In security, your network and trust is earned over an extended period of time. Cybersecurity is not a transactional field. It&#8217;s a trust-based one.</strong></p></li><li><p><strong>Leveraging network for critical hires:</strong> Colin was introduced to Wiz CEO, Assaf Rappaport, by the investor network at Index Ventures and Sequoia Capital.</p></li><li><p><strong>A players attract A players:</strong> Demand outpaced time and resources. Wiz had to build product, sell, and scale talent simultaneously. Colin was critical in recruiting more sales leaders.</p></li><li><p>&#8220;The only way to figure out how great you can be is to fall short of it.&#8221; &#128293;</p></li></ul><p>Great interview that&#8217;s worth a full listen. Skip to minute 5 + listen on 1.5x speed to save precious time.</p><p><strong>Note:</strong> Colin is no longer at Wiz. He&#8217;s recently joined <a href="https://sublime.security/">Sublime Security</a>, an email security startup taking the world by storm.</p><div><hr></div><h3><strong>Blitzscaling the Sales Org</strong></h3><p>Aside from bringing in a notable CRO, they <a href="https://www.reuters.com/technology/security-startup-wiz-adds-former-zscaler-coo-plans-hiring-spree-2024-02-05/#:~:text=Founded%20in%20Israel%20and%20now,responses%20powered%20by%20artificial%20intelligence">brought in former Zscaler executives like Dali Rajic,</a> who joined as Wiz&#8217;s first President/COO in 2024. By early last year, Wiz&#8217;s global workforce had reached approximately 900 employees, with an additional 400 planned hires, largely focused on sales and go-to-market roles. The sales org structure evolved into regional teams covering Americas, EMEA, and APAC, headed by experienced VPs.<br><br>After hiring Dali, Wiz <a href="https://www.crn.com/news/security/2024/wiz-aims-for-huge-channel-push-with-exec-hires-partner-recruitment#:~:text=company%20last%20week%20hired%20Tom,channels%20at%20cybersecurity%20giant%20Zscaler">brought on two more notable former Zscaler sales folks</a> including their former Americas sales SVP, Mike Earnest, as VP of Worldwide Sales and Tom Henderson as new VP of Channels &amp; Alliances who was brought in to formalize partner strategy. By scaling up talent and leadership quickly, Wiz ensured it had the bandwidth to engage Fortune 100 customers globally and not lose deals due to capacity.</p><div><hr></div><h3><strong>Talent + Culture Impact</strong></h3><p>Wiz&#8217;s sales momentum became a virtuous cycle, attracting top talent and new customers alike. Prospective employees were drawn to Wiz&#8217;s evident market leadership and potential for substantial rewards, making recruitment easier and reinforcing growth.</p><p>From the outside looking in, Wiz&#8217;s incentive structures were probably aligned with its GTM goals, offering competitive compensation, equity incentives, and clear alignment to encourage enterprise deals and channel-driven revenue growth. Incentives were probably also great for product, eng., ops and all other functions at the company. <br><br>Everyone wants to be part of a rocketship &#128640;</p><div><hr></div><h2><strong>Top of the Top-Down Sales Strategy</strong></h2><p>From the beginning, Wiz combined aggressive outbound top-down sales with strategically engineered inbound interest via marketing efforts. Unlike typical SaaS growth models in crowded categories, Wiz <strong>skipped freemium and self-service trials</strong>, focusing from day one on top-down selling to Fortune 500 CISOs. By 2024,<a href="https://www.timesofisrael.com/backed-by-softbank-investment-wiz-pushes-plans-for-expansion-in-asia/#:~:text=Headquartered%20in%20New%20York%2C%20the,BMW%2C%20DocuSign%2C%20Plaid%20and%20Agoda"> 40% of the Fortune 100 were customers</a>.</p><p>How did they do it?</p><ul><li><p><strong>Outbound, Big-Deal Focus:</strong> Wiz&#8217;s sales team went straight after the Fortune 100 and large enterprises, rather than &#8220;starting mid-market&#8221; like most startups. Early wins included<em> Bridgewater</em>, <em>Morgan Stanley, DocuSign, Slack, BMW,</em> and others as customers. By targeting the biggest &#8220;whales&#8221; with acute cloud security pain, Wiz closed large annual contracts that rapidly boosted their ARR. Sales cycles that normally take 12&#8211;18 months in cybersecurity were compressed dramatically because their agentless platform could deploy in <strong>minutes</strong> and showed value almost immediately.</p></li><li><p><strong>Rapid Proof-of-Value (PoV): </strong>Wiz&#8217;s product enabled rapid, frictionless evaluations, demonstrating significant security findings within minutes. This immediate "time-to-value" (TTV) turned prospects into eager customers and generated powerful <strong>word-of-mouth among CISOs</strong>. One Fortune 100 CISO said Wiz&#8217;s demo "felt like magic" in how quickly it exposed issues. This led to fast-tracked purchases. As a result, Wiz rapidly built a roster of blue-chip customers, and by publicly announcing ARR milestones, it created a perception of inevitability: <strong>everyone is buying Wiz.</strong> This momentum pulled in even more customers and boxed out slower-moving competitors. Check out their 'Customer Stories' page for examples: https://www.wiz.io/customers</p></li><li><p><strong>Early Inbound via Network and Marketing: </strong>Wiz benefited from investor-driven referrals and world-class marketing that created strong industry buzz (expanding on this in Part III). Their investments and execution in marketing meant that by the time a sales rep engaged a new prospect, they had likely already heard of Wiz as the hot new solution for cloud security.</p></li></ul><div><hr></div><h2>Channel, Cloud, Resellers and Tech Alliances</h2><p>In 2023, Wiz made the decision to go 100% pure channel sales and doubled down on hiring experienced channel leadership. This was a strategic decision to remove friction in the purchasing process and tap into existing customer budgets and relationships. Over its lifecycle, Wiz&#8217;s channel strategy evolved from opportunistic use of cloud marketplaces to a fully structured partner program by 2024. </p><p>&#128161; For clarity, <strong>channel = 3rd parties that help you sell your product.</strong></p><div><hr></div><h3><strong>Cloud Marketplaces</strong></h3><p>Nearly every Wiz deal had the option to transact via the major cloud marketplaces (AWS, Microsoft Azure, and Google Cloud). In fact, <em><a href="https://medium.com/@anupamr/forget-the-32b-exit-wizs-meteoric-rise-to-500m-arr-is-a-masterclass-in-enterprise-gtm-ce89d22d1602#:~:text=They%20went%20where%20the%20customers,dollars%20already%20earmarked%20for%20cloud">99% of Wiz sellers closed at least one deal through AWS, Azure, or GCP marketplaces</a></em>. By aligning with the <strong>cloud marketplaces</strong>, Wiz unlocked enterprise funds <strong>already earmarked for cloud</strong>. Many large companies commit spend to AWS/Azure as part of their cloud contracts; purchasing Wiz through the marketplace allowed clients to draw down those pre-committed budgets. It also simplified vendor onboarding and billing. Seems like<a href="https://tackle.io/resources/customer-story/wiz-cloud-gtm/"> Wiz partnered with a company called Tackle.io</a> to help cloud marketplace selling.</p><p>Many deals today happen on cloud marketplaces. <a href="https://www.channelfutures.com/security/crowdstrike-hits-1-billion-mark-aws-marketplace">CrowdStrike did $1 billion</a> in sales just on the AWS Marketplace in 2024 &#129327; </p><div><hr></div><h3><strong>Resellers and VAR Partnerships</strong></h3><p>Beyond cloud marketplaces, Wiz built relationships with security resellers and integrators (often called VARs or channel partners). Early on, these were ad-hoc. For example, <a href="https://www.crn.com/news/security/2024/wiz-aims-for-huge-channel-push-with-exec-hires-partner-recruitment#:~:text=For%20IT%20consultancy%20powerhouse%20Trace3%2C,on%20CRN%E2%80%99s%20Solution%20Provider%20500">Trace3, a major IT solutions provider, became one of Wiz&#8217;s first U.S. partners and helped introduce Wiz to joint customers</a>. Seeing the value, Wiz decided to put much more resources into partner-driven growth in 2024. This meant enabling and rewarding partners for sourcing and co-selling deals. </p><p>Wiz provided training, attractive margins, and marketing support to top channel partners. In return, partners like Trace3, Optiv, and Big Four consulting firms started bringing Wiz into large &#8220;cloud transformation&#8221; projects. By leaning into the channel, Wiz could reach many more customers, especially in regions or verticals where using a trusted local reseller is key. As CEO <a href="https://www.crn.com/news/security/2024/wiz-aims-for-huge-channel-push-with-exec-hires-partner-recruitment#:~:text=%E2%80%9CIn%20cybersecurity%20partners%20are%20super%2C,founder%20at%20Wiz">Assaf Rappaport explained</a>, &#8220;In cybersecurity, partners are super, super important&#8230;we&#8217;ve always seen huge potential&#8230;and there is so much more we can do&#8221; by aligning with them. This partner-first mindset became a priority as Wiz scaled. Key to note that Palo Alto Networks also leaned in heavily in to channel sales on their path to $100B valuation. </p><div><hr></div><h3><strong>MSSPs and Managed Service Providers</strong></h3><p>Wiz also forged alliances with managed security service providers (MSSPs) as well. A notable partnership was with <strong><a href="https://expel.com/">Expel</a></strong>, a Managed Detection &amp; Response (MDR) provider. In 2024, <a href="https://www.msspalert.com/news/wiz-expel-integration-powers-cloud-security-for-mssps-msps">Wiz and Expel announced an integration</a> enabling Expel&#8217;s SOC analysts to natively ingest Wiz&#8217;s cloud risk findings. This effectively lets MSSPs include Wiz&#8217;s cloud security as part of their monitoring services. <em>&#8220;The unique value MSSPs get from this partnership is the coupling of Wiz&#8217;s cloud detection with Expel&#8217;s analysis,&#8221;</em> noted an Expel spokesperson. </p><p>By partnering with MSSPs, Wiz extended its reach to smaller enterprises that use outsourced security, without having to sell to each one directly. It gave MSSPs a differentiator (advanced cloud visibility via Wiz), creating a win-win. Wiz also made sure its product could integrate with other MSSP tools and multi-tenant management, smoothing adoption in that channel. The end result is that <strong>Wiz became a popular choice for MSSPs</strong> looking to bolster their cloud protection offerings. This &#8220;channel on steroids&#8221; meant even organizations without in-house security teams became Wiz customers via service providers.</p><div><hr></div><h3><strong>Technology Alliances and OEMs</strong> </h3><p>Wiz created a <a href="https://www.wiz.io/integrations">strategic technology partnerships program called &#8216;WIN&#8217;</a> which set the stage for bidirectional integrations that augmented partner solutions and ultimately, gave customers a more unified view of their security landscape. For example, Wiz partnered with <a href="https://www.msspalert.com/news/wiz-expel-integration-powers-cloud-security-for-mssps-msps#:~:text=Wiz%20partners%20with%20notable%20cloud,cloud%20security%20with%20endpoint%20protection">CrowdStrike to integrate Wiz&#8217;s cloud findings with CrowdStrike&#8217;s Falcon endpoint platform</a>. This unified view helped joint customers correlate cloud and endpoint threats. It also opened cross-sell opportunities. A win-win.</p><p>In summary, Wiz smartly leveraged partnerships at every level: cloud hyperscalers, channel partners, resellers, and other security vendors. These alliances gave Wiz scale and credibility far beyond what its size would suggest, enabling them to punch above their weight and become the security darling of the world with an ecosystem rallying around it.</p><h2><strong>Regional Expansion and International GTM Efforts</strong></h2><p>To quickly sum this section up, Wiz combined centralized GTM strategy with regional execution. Wiz&#8217;s core value proposition &#8211; <strong>multi cloud security with quick and painless time-to-value</strong> &#8211; was universal. This meant the same product and messaging resonated globally, allowing the central team to roll out campaigns that regional teams could execute.</p><p>Wiz established hubs in key markets like the U.S., EMEA, and APAC. They opened a European HQ in London, expanded aggressively in Asia (Japan, Singapore, and Australia primarily) with <a href="https://www.timesofisrael.com/backed-by-softbank-investment-wiz-pushes-plans-for-expansion-in-asia/">SoftBank&#8217;s backing</a>, and leveraged their Israeli R&amp;D base for product, eng. and vulnerability research.</p><p><a href="https://www.theguardian.com/business/article/2024/aug/15/cybersecurity-firm-wiz-to-open-european-headquarters-in-london#:~:text=Wiz%20offers%20a%20service%20that,Microsoft%20Azure%20for%20security%20risks">Wiz landed key European customers</a> like <em>Shell (Netherlands), BMW (Germany), LVMH (France), ASOS and Bank of England (UK)</em> which certainly helped build a strong presence in the region. They also didn&#8217;t let off the gas in the US while they were expanding. They invested heavily in their public sector arm as evident by their <a href="https://www.wiz.io/blog/wiz-achieves-fedramp-moderate-authorization">FedRAMP Moderate authorization</a>.</p><p>The result of their expansion efforts was global penetration. Wiz&#8217;s international GTM efforts contributed significantly to its hypergrowth; by not being U.S.-only, it tapped into budgets from London to Sydney, exponentially accelerating its ARR climb.</p><h2><strong>Regional Expansion and International GTM</strong></h2><p>To quickly sum this section up, Wiz combined centralized GTM strategy with regional execution. Wiz&#8217;s core value proposition &#8211; <strong>multi cloud security with quick and painless time-to-value</strong> &#8211; was universal. This meant the same product and messaging resonated globally, allowing the central team to roll out campaigns that regional teams could execute.</p><p>Wiz established hubs in key markets like the U.S., EMEA, and APAC. They opened a European HQ in London, expanded aggressively in Asia (Japan, Singapore, and Australia primarily) with <a href="https://www.timesofisrael.com/backed-by-softbank-investment-wiz-pushes-plans-for-expansion-in-asia/">SoftBank&#8217;s backing</a>, and leveraged their Israeli R&amp;D base for product, eng. and vulnerability research.</p><p><a href="https://www.theguardian.com/business/article/2024/aug/15/cybersecurity-firm-wiz-to-open-european-headquarters-in-london#:~:text=Wiz%20offers%20a%20service%20that,Microsoft%20Azure%20for%20security%20risks">Wiz landed key European customers</a> like <em>Shell (Netherlands), BMW (Germany), LVMH (France), ASOS and Bank of England (UK)</em> which certainly helped with word of mouth. They also didn&#8217;t let off the gas in the US while they were expanding. They invested heavily in their public sector arm as evident by their <a href="https://www.wiz.io/blog/wiz-achieves-fedramp-moderate-authorization">FedRAMP Moderate authorization</a>.</p><p>The result of their global expansion efforts was global penetration. Wiz&#8217;s international GTM efforts contributed significantly to its hypergrowth; by not being U.S.-only, it tapped into budgets from London to Sydney, exponentially accelerating its ARR climb.</p><div><hr></div><h2><strong>Conclusion</strong></h2><p>Wiz&#8217;s success is not just about a great product meeting a market need. Many things had to go right for them grow as fast and as well as they did. They <strong>executed a once-in-a-generation GTM strategy with near-perfect timing and intensity</strong>. The company built a sales organization that combined veteran leadership with creative, hungry talent. It pursued an unabashedly enterprise-focused approach. Selling top-down to the CISO and skipping the conventional &#8220;grow slow&#8221; wisdom &#8211; and proved that big deals can close fast when the value is clear. Wiz aligned itself with how customers wanted to buy, turning channels and cloud marketplaces into an advantage rather than an afterthought. By forging key partnerships (from AWS to Expel to SoftBank), Wiz extended its reach globally and was able to sell to customers of all types.</p><p>There is so much to learn from Wiz&#8217;s astronomical rise For founders and GTM leaders, here are the biggest lessons to take away:</p><ul><li><p><strong>Start with Founder-Led Sales until $1-3M in ARR (or PMF)</strong></p></li><li><p><strong>Go top-down from day one. Go for massive deals v. SMB.</strong></p></li><li><p><strong>Once PMF, hire world-class revenue leaders early</strong></p></li><li><p><strong>Grow ahead of demand, not behind it.</strong></p></li><li><p><strong>Build a layered channel &amp; partner strategy (Resellers, MSSPs, Tech alliances, etc)</strong></p></li><li><p><strong>Continuously iterate on Time-to-Value (TTV).</strong></p></li><li><p><strong>Align with how customers want to buy. Be flexible.</strong></p></li><li><p><strong>Treat cloud marketplaces as strategic channels.</strong></p></li><li><p><strong>Ask questions and listen more than you speak during customer convos.</strong></p></li></ul><div class="pullquote"><p><em><strong>Interested in sponsoring an issue of The Cybersecurity Pulse?<br></strong>This includes reaching an audience of ~6,000, ranging from CISOs, Security Engineers, and world-class investors across 100+ countries!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach&quot;,&quot;text&quot;:&quot;Learn more here &#128072;&#127996;&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach"><span>Learn more here &#128072;&#127996;</span></a></p></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[2025 RSAC Innovation Sandbox Finalists Announced]]></title><description><![CDATA[A look at this year's RSAC Innovation Sandbox Finalists]]></description><link>https://www.cybersecuritypulse.net/p/2025-rsac-innovation-sandbox-finalists</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/2025-rsac-innovation-sandbox-finalists</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Tue, 08 Apr 2025 18:01:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xCIH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The Cybersecurity Pulse (TCP)</strong>! I'm Darwin Salazar, Head of Growth + Marketing at <strong><a href="https://www.monad.com/">Monad</a></strong> and former detection engineer in big tech. Each week, I dig through all the major headlines to bring you the latest security product innovation and industry news. Subscribe below for weekly updates!</em> &#128231;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xCIH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xCIH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xCIH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xCIH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xCIH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xCIH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg" width="800" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;No alternative text description for this image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="No alternative text description for this image" title="No alternative text description for this image" srcset="https://substackcdn.com/image/fetch/$s_!xCIH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xCIH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xCIH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xCIH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5ad34d-9f99-4ff4-8aae-b0770197f5b2_800x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The RSA Conference (RSAC) Innovation Sandbox (ISB) top 10 finalists were <strong><a href="https://www.prnewswire.com/news-releases/finalists-announced-for-20th-annual-rsac-innovation-sandbox-contest-2025-302422487.html">just announced this morning</a></strong>. Now in it&#8217;s 20th year, they&#8217;ve added a new component of a <strong>$5 million</strong> investment via an <em>uncapped</em> <strong><a href="https://www.cakeequity.com/guides/safe-notes">Simple Agreement for Future Equity (SAFE)</a> </strong>note from <strong><a href="https://crosspointcapital.com/">Crosspoint Capital Partners</a> </strong>for <em>all</em> finalists<strong>. </strong>I have many questions + concerns about this including that <strong><a href="https://www.rsaconference.com/library/press-release/rsa-conference-2025-innovation-sandbox-contest-celebrates-20th-anniversary">the announcement post</a></strong> doesn&#8217;t mention whether finalists can decline the investment. <br><br>In any case, being an ISB finalist carries a lot of weight and helps open up doors for rising startups. Also, it&#8217;s great to see that only 4 of 10 focus on AI security during an era that has been consumed by AI. </p><p>Anyhow, let&#8217;s take a look at this year&#8217;s finalists! </p><div class="pullquote"><p><em><strong>Interested in sponsoring an issue of The Cybersecurity Pulse?</strong></em></p><p><em>This includes reaching an audience of ~6,000, ranging from CISOs, Security Engineers, and world-class investors across 100+ countries!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach&quot;,&quot;text&quot;:&quot;Learn more here &#128072;&#127996;&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach"><span>Learn more here &#128072;&#127996;</span></a></p></div><h2>The 2025 Finalists</h2><p>The finalists (in alphabetical order) are:</p><p><strong><a href="https://aurascape.ai/">Aurascape</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1-JU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1-JU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png 424w, https://substackcdn.com/image/fetch/$s_!1-JU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png 848w, https://substackcdn.com/image/fetch/$s_!1-JU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png 1272w, https://substackcdn.com/image/fetch/$s_!1-JU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1-JU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png" width="712" height="410.247619047619" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:363,&quot;width&quot;:630,&quot;resizeWidth&quot;:712,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A user interface displaying a conversation log with categories like Work Related, Biz, Software Code, and PII, along with timestamps.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A user interface displaying a conversation log with categories like Work Related, Biz, Software Code, and PII, along with timestamps." title="A user interface displaying a conversation log with categories like Work Related, Biz, Software Code, and PII, along with timestamps." srcset="https://substackcdn.com/image/fetch/$s_!1-JU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png 424w, https://substackcdn.com/image/fetch/$s_!1-JU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png 848w, https://substackcdn.com/image/fetch/$s_!1-JU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png 1272w, https://substackcdn.com/image/fetch/$s_!1-JU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9cdc281-ed1b-4041-a983-f7f91d95ebbb_630x363.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Aurascape believes AI has the potential to supercharge how society works. However, unchecked use of AI, Generative AI, and AI Agents does bring risks. Aurascape gives security and AI leaders the protection they need to confidently embrace AI.</p><div><hr></div><p><strong><a href="https://calypsoai.com/">CalypsoAI</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2ZhY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2ZhY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png 424w, https://substackcdn.com/image/fetch/$s_!2ZhY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png 848w, https://substackcdn.com/image/fetch/$s_!2ZhY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png 1272w, https://substackcdn.com/image/fetch/$s_!2ZhY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2ZhY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png" width="1232" height="805" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:805,&quot;width&quot;:1232,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:231170,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/160869154?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2ZhY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png 424w, https://substackcdn.com/image/fetch/$s_!2ZhY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png 848w, https://substackcdn.com/image/fetch/$s_!2ZhY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png 1272w, https://substackcdn.com/image/fetch/$s_!2ZhY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0389bebd-8410-4974-a8ab-63e543f9e625_1232x805.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>CalypsoAI secures applications and agents through its Inference Platform &#8212; protecting AI at runtime with customizable defensive controls, agentic red-teaming, remediation, governance, and observability solutions &#8212; helping enterprises safely scale AI.</p><div><hr></div><p><strong><a href="https://www.cmdzero.io/">Command Zero</a></strong><br>Command Zero is an autonomous and AI-assisted investigations platform, built to transform security operations. It empowers analysts to run advanced investigations and threat hunts in complex environments. The platform reduces mean time to understand and respond &#8212; delivering expert outcomes at scale.</p><div><hr></div><p><strong><a href="https://www.eqtylab.io/">EQTY Lab AG</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XZuS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XZuS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png 424w, https://substackcdn.com/image/fetch/$s_!XZuS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png 848w, https://substackcdn.com/image/fetch/$s_!XZuS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png 1272w, https://substackcdn.com/image/fetch/$s_!XZuS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XZuS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png" width="1456" height="841" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5c8df746-5086-4037-8433-810123d2d748_2412x1394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:841,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;EQTY Lab&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="EQTY Lab" title="EQTY Lab" srcset="https://substackcdn.com/image/fetch/$s_!XZuS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png 424w, https://substackcdn.com/image/fetch/$s_!XZuS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png 848w, https://substackcdn.com/image/fetch/$s_!XZuS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png 1272w, https://substackcdn.com/image/fetch/$s_!XZuS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c8df746-5086-4037-8433-810123d2d748_2412x1394.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>EQTY Lab pioneers solutions that accelerate trust in AI. The AI Integrity Suite applies cryptography to ensure that the governance of AI agents is accountable and verifiable. With applications in the public sector, life sciences, and finance, EQTY Lab is at the forefront of enabling AI innovation.</p><div><hr></div><p><strong><a href="https://www.knostic.ai/">Knostic</a> &#11088;</strong><br>Knostic provides need-to-know based access controls for LLMs. With knowledge-centric capabilities, Knostic enables organizations to accelerate the adoption of LLMs and drive AI-powered innovation without compromising value, security, or safety. <strong><a href="https://www.knostic.ai/blog/knostic-wins-first-place-in-black-hat-conference-startup-spotlight-competition">Winner of the 2024 Blackhat Startup Spotlight competition.</a></strong><a href="https://www.knostic.ai/blog/knostic-wins-first-place-in-black-hat-conference-startup-spotlight-competition"> </a></p><div><hr></div><p><strong><a href="https://www.metalware.com/">Metalware</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LLNQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LLNQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png 424w, https://substackcdn.com/image/fetch/$s_!LLNQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png 848w, https://substackcdn.com/image/fetch/$s_!LLNQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png 1272w, https://substackcdn.com/image/fetch/$s_!LLNQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LLNQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png" width="1202" height="809" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:809,&quot;width&quot;:1202,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:180723,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/160869154?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LLNQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png 424w, https://substackcdn.com/image/fetch/$s_!LLNQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png 848w, https://substackcdn.com/image/fetch/$s_!LLNQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png 1272w, https://substackcdn.com/image/fetch/$s_!LLNQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd887926c-4a15-49d9-8394-3c7e32970eeb_1202x809.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Metalware helps enterprises and governments secure critical infrastructure firmware at scale. Its binary fuzzing platform automates the traditionally complex process of firmware testing, enabling customers to detect and remediate vulnerabilities in embedded systems before deployment.</p><div><hr></div><p><strong><a href="https://mind.io/">MIND</a></strong><br>MIND is a data security platform that puts Data Loss Prevention (DLP) and Insider Risk Management (IRM) programs on autopilot to deliver both posture and prevention. MIND discovers and classifies sensitive data, fixes data security issues, and stops sensitive data leaks.</p><div><hr></div><p><strong><a href="https://projectdiscovery.io/">ProjectDiscovery</a></strong><br>ProjectDiscovery.io equips security teams with open-source tools to find and fix vulnerabilities fast. Powered by Nuclei, the platform automates attack surface monitoring and vulnerability management &#8212; helping organizations stay ahead of real-world threats.</p><div><hr></div><p><strong><a href="https://smallstep.com/">Smallstep</a></strong><br>Smallstep ensures only company-owned devices can access sensitive resources. Co-developers of ACME Device Attestation with Google and Apple, the Device Identity Platform solves the "other half" of Zero Trust by securing Wi-Fi, VPNs, ZTNA, SaaS apps, and cloud APIs with hardware-bound credentials.</p><div><hr></div><p><strong><a href="https://www.twinesecurity.com/">Twine Security</a></strong><br>Twine builds AI digital employees who execute tasks from A to Z to help cyber teams close the talent gap. The company's first AI digital employee, Alex, learns, understands and takes away the burden of identity management tasks &#8212; proactively completing the organization's cyber objectives.</p><p><strong>Source:</strong> <a href="https://www.prnewswire.com/news-releases/finalists-announced-for-20th-annual-rsac-innovation-sandbox-contest-2025-302422487.html">PR Newswire</a></p><h2>The Future of Security</h2><p>Whether or not they take home the &#8220;Most Innovative Startup&#8221; crown, all ten finalists are certainly worth watching. In fact, some ISB runners-up have skyrocketed in years following the contest (Case in point: Wiz, <strong><a href="https://www.esecurityplanet.com/trends/2021-rsac-innovation-contest/">which lost to winner Apiiro in 2021</a></strong>, was recently <strong><a href="https://techcrunch.com/2025/03/18/google-is-buying-wiz-for-32b-to-beef-up-in-cloud-security/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAJmv7B0DBplphfgqXO0AtclmaliCYiSy4exmNnyISmXpcT2MWqU5XoWJx8UxyUgax59r5NLKWAb4nUy2X1QPMEm_9_NcALrZHXD4hpTBvJbC0At8vsJdR8WgBlX0iSiKfZqaxGg-FeJI8hVkiK3KwGunL6WZcdcsUBmCphwtZB4G">acquired by Google for $32B</a></strong>) and some have even IPO&#8217;d (SentinelOne, Imperva, Sumo Logic, and Sourcefire). </p><p>Out of the 10, I&#8217;m most bullish on <strong>Metalware</strong>, <strong>EQTY Lab</strong>, and <strong>CalypsoAI</strong>. Who are you most excited about? &#128064;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/2025-rsac-innovation-sandbox-finalists/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/p/2025-rsac-innovation-sandbox-finalists/comments"><span>Leave a comment</span></a></p>]]></content:encoded></item><item><title><![CDATA[Wiz’s $32B GTM Playbook: Unpacking the Formula (Part I)]]></title><description><![CDATA[From Finding PMF to Nailing Branding]]></description><link>https://www.cybersecuritypulse.net/p/wizs-32b-gtm-playbook-unpacking-the</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/wizs-32b-gtm-playbook-unpacking-the</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Tue, 25 Mar 2025 11:57:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AugY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The Cybersecurity Pulse (TCP)</strong>! I'm Darwin Salazar, Head of Growth and Marketing at <strong><a href="https://www.monad.com/">Monad</a></strong> and former Detection Engineer in big tech. Each week, I dig through all the major headlines to bring you the latest security product innovation and industry news. Subscribe below for weekly updates!</em> &#128231;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AugY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AugY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp 424w, https://substackcdn.com/image/fetch/$s_!AugY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp 848w, https://substackcdn.com/image/fetch/$s_!AugY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp 1272w, https://substackcdn.com/image/fetch/$s_!AugY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AugY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Wiz at Re:Inforce 2023 | Wiz Blog&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Wiz at Re:Inforce 2023 | Wiz Blog" title="Wiz at Re:Inforce 2023 | Wiz Blog" srcset="https://substackcdn.com/image/fetch/$s_!AugY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp 424w, https://substackcdn.com/image/fetch/$s_!AugY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp 848w, https://substackcdn.com/image/fetch/$s_!AugY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp 1272w, https://substackcdn.com/image/fetch/$s_!AugY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3d2f02-573e-4ef2-9d63-d7931e0bbf22_4032x3024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://www.nytimes.com/2025/03/18/technology/google-alphabet-wiz-deal.html">Google just acquired Wiz for $32B</a></strong>, 5 years after it&#8217;s founding. If you haven&#8217;t been watching closely, you may be asking yourself &#8220;How on earth did they achieve that?&#8221;. It&#8217;s an unprecedented, historic feat that will be talked about and studied for decades.  </p><p>Sure they had many factors working in their favor from inception, but to me, the x-factor (aka &#8220;Secret Sauce&#8221;), was their Go-To-Market (GTM) strategy. <strong>I&#8217;d argue that they&#8217;ve had a greater GTM run than any other B2B company in recent history, except for maybe Salesforce.</strong></p><p>As a former competitor to Wiz, a current tech partner through Monad, a market analyst with TCP, and a friend to several Wizards, I've had an up close look at their meteoric rise. </p><p>In this series, I&#8217;ll try to decode the exact growth and marketing tactics behind Wiz's historic exit. In this installment, we&#8217;ll dissect their journey from finding Product-Market Fit (PMF) to how they nailed branding that set them apart in a hyper competitive segment with well-established incumbents. </p><p><strong>Curious about what growth + marketing hacks Wiz employed and how you can apply them to your own strategy?</strong> This series should act as some sort of guide for that! </p><div class="pullquote"><p><em><strong>Interested in sponsoring an issue of The Cybersecurity Pulse?</strong></em></p><p><em>This includes reaching an audience of ~6,000, ranging from CISOs, Security Engineers, and world-class investors across 100+ countries!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach&quot;,&quot;text&quot;:&quot;Learn more here &#128072;&#127996;&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/p/partner-with-tcp-maximize-your-reach"><span>Learn more here &#128072;&#127996;</span></a></p></div><h2>Perspective</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7FZH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7FZH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png 424w, https://substackcdn.com/image/fetch/$s_!7FZH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png 848w, https://substackcdn.com/image/fetch/$s_!7FZH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png 1272w, https://substackcdn.com/image/fetch/$s_!7FZH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7FZH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png" width="724" height="344.1967213114754" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:319,&quot;width&quot;:671,&quot;resizeWidth&quot;:724,&quot;bytes&quot;:71113,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybersecuritypulse.net/i/159443835?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7FZH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png 424w, https://substackcdn.com/image/fetch/$s_!7FZH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png 848w, https://substackcdn.com/image/fetch/$s_!7FZH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png 1272w, https://substackcdn.com/image/fetch/$s_!7FZH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eb5f8ac-ed74-4fff-8fac-fad8159b2cd3_671x319.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Wiz achieved <strong><a href="https://www.wiz.io/blog/100m-arr-in-18-months-wiz-becomes-the-fastest-growing-software-company-ever">$100M in annual recurring revenue (ARR) in August 2022</a></strong>, just 18 months after launch, making it <strong>the fastest software company to reach this milestone</strong> at the time. By <strong><a href="https://finance.yahoo.com/news/wiz-soars-heights-startup-10-171611883.html?guccounter=1">May 2023, ARR reached $200M</a></strong>, and <strong><a href="https://www.calcalistech.com/ctechnews/article/sjgjl00r96">by February 2024, it was $350M</a></strong>, with a <strong><a href="https://www.calcalistech.com/ctechnews/article/sjgjl00r96">target of $1B ARR and a future Initial Public Offering </a>(IPO)</strong>. </p><p>In July 2024, <strong><a href="https://techcrunch.com/2024/07/22/wiz-walks-away-from-googles-23b-acquisition-offer-read-the-ceos-note-to-employees/">rumors swirled that Google had extended a $23B buyout offer which was confirmed after Assaf sent a company-wide email</a></strong><a href="https://techcrunch.com/2024/07/22/wiz-walks-away-from-googles-23b-acquisition-offer-read-the-ceos-note-to-employees/"> </a>stating they&#8217;ve turned the offer down to pursue an IPO. Their historic ascent ultimately culminated in a <strong><a href="https://www.wiz.io/blog/wiz-joining-google">$32B acquisition by Google on March 17th, 2025.</a></strong> </p><p><strong>Side note:</strong> Deal is pending regulatory scrutiny and approval. EU + UK government review led to the <strong><a href="https://www.theverge.com/2023/12/18/24005996/adobe-figma-acquisition-abandoned-termination-fee">Figma x Adobe $20B deal falling through.</a></strong> Market and political conditions are different in 2025 + the dynamics of this deal are more synergistic/constructive than the Figma deal so &#129335;&#127997;&#8205;&#9794;&#65039;</p><div><hr></div><h2>Time Machine </h2><p>Let&#8217;s rewind back to 2020 before Wiz was founded. Cloud Security Posture Management (CSPM) had been a product category for 5+ years. The term &#8216;CNAPP&#8217; didn&#8217;t exist. Companies like Palo Alto Networks, Aqua, Sysdig, and Checkpoint controlled the cloud security space. </p><p>So how did Wiz come in, kick the doors down, and capture enough market share to go from 0 to $32B in just 5 years? How did they dethrone incumbents and become <em>the</em> security darling of the world? </p><p>Of course, in retrospect, Wiz had many key ingredients working in their favor: </p><ul><li><p>Strong, proven founding team (<strong><a href="https://blogs.microsoft.com/blog/2015/09/08/microsoft-acquires-adallom-to-advance-identity-and-security-in-the-cloud/">Adallom founders</a></strong> + <strong><a href="https://www.sequoiacap.com/article/wiz-and-google-securing-the-cloud/">Microsoft Cloud Security Leadership</a></strong>) </p></li><li><p>Great, sticky product </p></li><li><p>Solving deeply felt pain point(s)  </p></li><li><p>Timing (founded just as the world goes remote due to COVID-19 + cloud boom)</p></li><li><p>Legendary investors + network effects (<strong><a href="https://www.sequoiacap.com/">Sequoia Capital</a></strong>, <strong><a href="https://cyberstarts.com/">Cyberstarts</a></strong>, <strong><a href="https://www.indexventures.com/">Index Ventures</a></strong> etc.) </p></li><li><p>Lots of early funding (<strong><a href="https://www.securityweek.com/cloud-security-company-wiz-raises-250-million-6-billion-valuation/#:~:text=Wiz%20on%20Monday%20announced%20raising,security%20company%20to%20%24600%20million">$480M+ within a year of emerging from stealth</a></strong> &#129327;)</p></li><li><p>Relentless execution</p></li></ul><p>However, they weren&#8217;t first to market and they didn&#8217;t necessarily build a magic shield to stop all cyber attacks forever. While many of the stars seemingly aligned for Wiz, it wasn&#8217;t just luck or perfect timing.</p><p>So, how did they do it? </p><div><hr></div><h2>&#129668;Finding PMF</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hyg5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hyg5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp 424w, https://substackcdn.com/image/fetch/$s_!Hyg5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp 848w, https://substackcdn.com/image/fetch/$s_!Hyg5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp 1272w, https://substackcdn.com/image/fetch/$s_!Hyg5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hyg5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp" width="1456" height="698" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/afbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:698,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Hyg5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp 424w, https://substackcdn.com/image/fetch/$s_!Hyg5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp 848w, https://substackcdn.com/image/fetch/$s_!Hyg5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp 1272w, https://substackcdn.com/image/fetch/$s_!Hyg5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbf81fc-95e3-4749-8eac-1c82149dd4ac_8192x3930.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Wiz Security Graph. 2023 Edition. </figcaption></figure></div><p>None of this happens without PMF, so let&#8217;s start there. What made Wiz different in <strong><a href="https://www.gartner.com/reviews/market/cloud-security-posture-management-tools">a sea of 30+ cloud security tools</a></strong> is that they transformed a fragmented cloud security market of point solutions (CSPM, CWPP, CIEM, IaC scanning etc.) into a <strong>unified, user-friendly platform</strong> called Cloud-Native Application Protection Platform (CNAPP). A term they coined and championed which eventually <strong>became a new product category. </strong></p><p>Their unified platform paired with their agentless approach made it <strong>super simple and fast to get value</strong>. Most cloud workload protection platforms required deploying and maintaining agents on workloads which added additional overhead. Wiz&#8217;s agentless approach removed this friction. Wiz also placed heavy emphasis on <strong>contextualization of security issues</strong> which led to their highly successful <strong><a href="https://www.wiz.io/blog/the-anatomy-of-a-toxic-combination-of-risk">Wiz Security Graph and &#8216;Toxic Combinations</a>&#8217;</strong> visualizations.</p><p>This unified and contextualized solution allowed security teams to easily onboard, prioritize the most important stuff, and gain a <strong>holistic view of potential impact</strong> with much <strong>less overhead</strong> than traditional cloud security tools.</p><p>This fresh approach is what landed them PMF. Once they had PMF, they tripled down on sales and marketing. </p><p><strong>Dig deeper &#8594; <a href="https://www.sequoiacap.com/article/wiz-spotlight-with-a-little-help-from-their-friends/?itm_medium=related-content&amp;itm_source=sequoiacap.com">This Sequoia Capital post</a></strong> offers a deeper look at their PMF journey.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gdTN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gdTN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp 424w, https://substackcdn.com/image/fetch/$s_!gdTN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp 848w, https://substackcdn.com/image/fetch/$s_!gdTN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp 1272w, https://substackcdn.com/image/fetch/$s_!gdTN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gdTN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp" width="1456" height="515" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:515,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:41290,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!gdTN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp 424w, https://substackcdn.com/image/fetch/$s_!gdTN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp 848w, https://substackcdn.com/image/fetch/$s_!gdTN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp 1272w, https://substackcdn.com/image/fetch/$s_!gdTN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faea2db3c-644a-437e-ace0-45c0e0cc2614_1596x564.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The Wiz Security Graph covering from Code to Cloud to Runtime. 2025 Edition.</figcaption></figure></div><div><hr></div><h4>PMF Journey from CMO&#8217;s Perspective</h4><div id="youtube2-vnW3zIkrOvY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;vnW3zIkrOvY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/vnW3zIkrOvY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>This podcast with <strong><span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Lenny Rachitsky&quot;,&quot;id&quot;:1849774,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/afba5161-65bb-4d99-8d6b-cce660917fa1_1540x1540.png&quot;,&quot;uuid&quot;:&quot;4c27714c-297d-4c81-bbe9-6ca01d3e1d61&quot;}" data-component-name="MentionToDOM"></span></strong> (&#128016;) and Raaz Herzberg, CMO at Wiz, dives into their early days and is an inside look into their journey to PMF. </p><p><strong>Key takeaways below:</strong> </p><ul><li><p><strong>Stealth Days -</strong> Wiz was initially founded as &#8220;Beyond Networks&#8221; with the intent to build a network security product. 10-15 calls a day (&#129327;) with security leaders led to realization that network security was not a burning pain point. </p><ul><li><p>The founder&#8217;s and investor&#8217;s deep networks certainly played a key role in the 10-15 calls a day.</p></li></ul></li><li><p><strong>The Magical &#8220;Pull&#8221; &#10024; -</strong> A strong indicator that you&#8217;re headed in the right direction is when feedback goes from &#8220;Cool idea, not sure if we have a need for it right now&#8221; to &#8220;<strong>When can we start a PoV/PoC?</strong>&#8221;.</p></li><li><p><strong>Early Sales -</strong> Founding team closed &#8216;a couple million&#8217; in ARR before bringing on their first salesperson. </p><ul><li><p>Major lesson here is that if the founding team can&#8217;t sell the product repeatably end-to-end, it&#8217;s wishful thinking that bringing in a salesperson would be able to crack the PMF code for you. </p></li></ul></li><li><p><strong>Product messaging</strong> -  Must be crystal clear. Abstract it to a level where beginners or outsiders can understand the problem you&#8217;re solving and how. Ditch the acronyms. Have a &#8216;dummy explanation&#8217;. </p></li><li><p><strong>CMO Success Factors</strong> </p><ul><li><p>Trust from founding team</p></li><li><p>Deep connection to the product (First-hand experience of the problem being solved goes a long way)</p></li><li><p>Deep connection to the market (Helps w/ positioning, differentiating etc.) </p></li></ul></li><li><p><strong>Experimentation -</strong> &#8220;Let&#8217;s try everything and try to make noise&#8221; approach played  a huge role in their marketing success. </p><ul><li><p>Marketing is unlike product or engineering where decisions can directly negatively impact the user experience. </p></li><li><p>Unless you&#8217;re doing cringe marketing like <strong><a href="https://www.securityweek.com/all-hail-ambulance-chasers-security/">ambulance chasing</a></strong>, let your creativity run wild with campaigns and channels. Worst that can happen is the post or campaign flops and you move onto the next one. </p></li></ul></li><li><p><strong>Field Marketing -</strong> Raaz&#8217;s goal for big conferences was to <strong>make the Wiz booth as weird as possible </strong>in order to stand out from the rest. This led to a <strong>5x increase in booth traffic</strong> compared to previous years.</p><ul><li><p><strong><a href="https://www.wiz.io/blog/behind-the-scenes-at-the-wiz-booth-how-to-create-a-memorable-expo-experience">This post from Roy Katz</a></strong>, their Head of Brand, breaks down their methodology for their booth approach and includes a checklist other companies could reuse to nail their booth game. </p></li></ul></li></ul><p><strong>Side note:</strong> <strong><span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Lenny's Newsletter&quot;,&quot;id&quot;:10845,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/lenny&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/441213db-4824-4e48-9d28-a3a18952cbfc_592x592.png&quot;,&quot;uuid&quot;:&quot;662475ea-c395-4e89-8aa7-039cc4405c52&quot;}" data-component-name="MentionToDOM"></span></strong> and podcast are goldmines of resources for product builders <strong>&#128081;</strong> </p><p><strong>Dig Deeper:</strong> <strong><a href="https://openviewpartners.com/blog/category-creation-wiz-hit-100m-arr-in-only-18-months/">This OpenView write-up</a></strong> covers how covers how Wiz became synonymous with the term CNAPP (Cloud-native Application Protection Platform) which is what made them break away from the rest of the cloud security providers.</p><div><hr></div><h2>&#128296; Nailing Branding </h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!03nF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!03nF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp 424w, https://substackcdn.com/image/fetch/$s_!03nF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp 848w, https://substackcdn.com/image/fetch/$s_!03nF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp 1272w, https://substackcdn.com/image/fetch/$s_!03nF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!03nF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp" width="1456" height="773" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:773,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!03nF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp 424w, https://substackcdn.com/image/fetch/$s_!03nF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp 848w, https://substackcdn.com/image/fetch/$s_!03nF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp 1272w, https://substackcdn.com/image/fetch/$s_!03nF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdfbb9ff-d735-4a13-a877-804f392fcea8_3745x1988.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>How do you stand out as the new kid on the block in a hyper competitive space?</strong> Branding plays a massive role in that, and it bleeds through many key facets of the GTM machine. Branding is the identity of the company and it has a TON to do with human psychology. </p><p>Wiz&#8217;s branding starts with it&#8217;s name, short for &#8220;Wizard&#8221; and indicating magic. In an industry where fear, loss, and urgency are top of their customer&#8217;s mind. Wiz designed a fun, light-hearted brand with magic as the central theme. <strong>What comes to your mind when you think about magic?</strong> </p><p>To me, it&#8217;s defying universal laws. Evoking a sense of wonder and of anything being possible which is key for cultivating an innovative culture and product. From their logo, to their color palettes (royal blue, white, pink hues), to their messaging, Wiz chose optimism over fear.</p><p>This one decision to choose &#8220;Magic&#8221; as the center of it&#8217;s branding shows that Wiz understands their audience/<strong><a href="https://blog.hubspot.com/customers/ideal-customer-profiles-and-buyer-personas-are-they-different">ICP</a></strong>. It set the tone for their culture, GTM machine, how customers interact with them, product UX/UI and everything in between.  </p><p><strong><a href="https://www.wiz.io/blog/the-magic-of-branding">This blog post</a></strong><a href="https://www.wiz.io/blog/the-magic-of-branding"> </a>written by Roy Katz peels back the curtains on the <em><strong>How</strong></em> and <em><strong>Why</strong> </em>of their branding. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!__Og!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!__Og!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp 424w, https://substackcdn.com/image/fetch/$s_!__Og!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp 848w, https://substackcdn.com/image/fetch/$s_!__Og!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp 1272w, https://substackcdn.com/image/fetch/$s_!__Og!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!__Og!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp" width="1456" height="582" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:582,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!__Og!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp 424w, https://substackcdn.com/image/fetch/$s_!__Og!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp 848w, https://substackcdn.com/image/fetch/$s_!__Og!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp 1272w, https://substackcdn.com/image/fetch/$s_!__Og!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe180f8ad-b102-4078-a99a-f90b1a042b69_2482x992.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Their branding style was applied even across the smallest of details. </figcaption></figure></div><h3>Key Branding Takeaways</h3><ul><li><p><strong>Emotional Connection First</strong> &#8211; Be extremely thoughtful in the feelings you want your brand to evoke.  Prioritize inspiring hope over fear.</p><ul><li><p>Cybersecurity often uses fear to drive urgency. This can overwhelm customers. Wiz&#8217;s "magic" and optimism show you can address threats while empowering customers, building trust through confidence, not scare tactics or ambulance chasing.</p></li></ul></li><li><p><strong>Color Palette</strong> &#8211; Use colors and designs to signal reliability in a high-stakes industry.</p><ul><li><p>Wiz&#8217;s blue palette symbolizes trust, loyalty, and wisdom, paired with clean, intuitive design. Choose colors that reassure customers and ensure your product UX feels as reliable as your brand.</p></li></ul></li><li><p><strong>Unique Brand Theme</strong> &#8211; Great brands have themes. </p><ul><li><p>Wiz&#8217;s "magic" theme turns a technical product into an approachable experience. Pick a theme that aligns with your values, then weave it into messaging, UX, and every touchpoint for a cohesive identity.</p></li></ul></li><li><p><strong>Playful Yet Professional</strong> &#8211; Wiz&#8217;s branding is very playful and indicates that the company likes to have fun. This helped build customer and community affinity for the brand. </p><ul><li><p>Wiz uses pink accents and magical imagery but grounds it with blue and clean design.</p></li></ul></li><li><p><strong>Branding Consistency</strong> - Wiz ensured consistency across website, product UI, conference booths, swag and everything in between. </p></li></ul><h3>Dig Deeper</h3><ul><li><p><strong><a href="https://www.wiz.io/blog/the-magic-of-branding">The Magic of Branding: &#8203;Creating an Optimistic Identity for a Security Product</a> - </strong>Roy Katz</p></li><li><p>&#8220;<strong><a href="https://www.amazon.com/Conquer-Your-Rebrand-Customers-Competitors/dp/1544538987">Conquer Your Rebrand</a></strong>&#8221; by Bill Kenney, Founder + CEO at <strong><a href="https://dribbble.com/BillSKenney">Focus Lab</a>,</strong> is an A-Z masterclass on branding. </p></li><li><p>Wiz Brand team Instagram: <strong><a href="https://www.instagram.com/wiz.style/">@wiz.style</a></strong></p></li></ul><h3>Conclusion</h3><p>There is so much to be learned from Wiz&#8217;s acquisition. It&#8217;s a masterclass in category creation and proving that a bold GTM strategy, a sticky product, and a magical brand can turn a startup into an industry darling (and $32B) in just five years.</p><p>Success leaves clues. <strong>How can the rest of us apply Wiz&#8217;s playbook to redefine our own respective categories?</strong></p><p>Stay tuned for the next installment. We&#8217;re just warming up! ~ </p><h3>For More</h3><p>There&#8217;s a ton of fantastic analysis dissecting the deal end-to-end and what it may mean for our industry. Below are a few of my favorites: </p><ul><li><p><strong><a href="https://strategyofsecurity.com/w-is-for-wiz-alphabets-audacious-acquisition/">W is for Wiz: Alphabet&#8217;s Audacious Acquisition</a> </strong>- <em>Cole Grolmus</em></p></li><li><p><strong><a href="https://softwareanalyst.substack.com/p/looking-beyond-the-google-and-wiz">Looking Beyond The Google &amp; Wiz Acquisition: The Future Of Cloud Security</a></strong> - <em><span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Software Analyst Cyber Research&quot;,&quot;id&quot;:114363,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/softwareanalyst&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c9b7f1c9-9f34-4227-9c42-0aa5b4b03587_512x512.png&quot;,&quot;uuid&quot;:&quot;a163bca0-2696-486c-addd-ab5726d23c33&quot;}" data-component-name="MentionToDOM"></span></em> </p></li><li><p><strong><a href="https://www.linkedin.com/feed/update/urn:li:activity:7308968304319111168/">Pramod Gosavi&#8217;s LinkedIn Posts</a></strong> &#128293;</p></li></ul><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[BlackHat Innovators & Investors Quick Hits]]></title><description><![CDATA[Notes from this year's I&I summit]]></description><link>https://www.cybersecuritypulse.net/p/blackhat-innovators-and-investors</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/blackhat-innovators-and-investors</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Wed, 07 Aug 2024 13:05:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TTRs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to&nbsp;<strong>The Cybersecurity Pulse</strong>! I'm Darwin Salazar, Product Manager at <strong><a href="https://www.monad.com/">Monad</a></strong> and a former Detection Engineer. Each week, I distill the latest in cybersecurity innovation into digestible, bite-sized updates. If you&#8217;re serious about staying at the forefront of the latest in security products and industry news make sure to hit the &#8220;Subscribe&#8221; button below to get my insights delivered straight to your inbox every week &#128233; &#128640;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TTRs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TTRs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!TTRs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!TTRs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!TTRs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TTRs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1433393,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TTRs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!TTRs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!TTRs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!TTRs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6850fae5-74ad-49a4-aa14-901b0bca063b_4032x3024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>GM! &#128640;<br><br>While BlackHat 2024 officially kicks off today, yesterday was a jam-packed day with 1-day summits for<a href="https://www.blackhat.com/us-24/ciso-summit.html"> </a><strong><a href="https://www.blackhat.com/us-24/ciso-summit.html">CISOs</a></strong>, <strong><a href="https://www.blackhat.com/us-24/ai-summit.html?trk=public_post_comment-text">AI</a></strong>, <strong><a href="https://www.blackhat.com/us-24/omdia-analyst-summit.html">Analysts</a></strong>, and <strong><a href="https://www.blackhat.com/us-24/innovators-summit.html">Innovators &amp; Investors (I&amp;I)</a></strong>. </p><p>I had the opportunity to spend time at the I&amp;I summit (thanks, Coleen!) and was impressed by the programming, presenters, attendees, and the startup pitch competition. </p><p>While it&#8217;s 440am here and I still haven&#8217;t had my dbl shot espresso, I&#8217;ll attempt to put together my key takeaways and quick hits from the summit before going off and throwing iron around with some friends at the Lair &#128009;</p><p>Before moving on though, why the f*ck is there not a spot serving coffee 24/7 in the Mandalay Bay towers!?!?!?!?? </p><p>Anyway.. I&amp;I quick hits. </p><div><hr></div><h1><strong>Quick Hits</strong></h1><h3>George Kurtz &amp; Resilience &#128737;&#65039;</h3><p>Even after all the Crowdstrike-caused outages, threats, $10 gift cards, and lawsuits, George Kurtz still pulled through on his Blackhat commitments and faced the music with his head high and chest out. This is not something most people would do today, but its exemplary leadership and how Crowdstrike has handled it will be under the microscope for years to come. Kudos to Mr. Kurtz for taking this straight on. </p><p>The star-studded panel covered how to get your startup acquired + how to approach IPO. Industry staples like Barmak Meftah, Chenxi Wang, and Andrew Peterson also shared many gems for builders and investors. </p><div><hr></div><h3>Building Trust w/ CISOs &#129777;&#127997;&#8205;&#129778;&#127995;</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Styc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Styc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!Styc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!Styc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!Styc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Styc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:935305,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Styc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!Styc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!Styc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!Styc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db7a523-79d5-48aa-bdba-4aac2fcc593d_4032x3024.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is the one I had been looking forward to the most and it did not disappoint! Fredrick Lee aka &#8220;Flee&#8221;, CISO at Reddit, John Flynn aka &#8220;Four&#8221; VP of Security at Google Deepmind, and Christina Cacioppo, Founder &amp; CEO at Vanta had tremendous amounts of gems for founders, investors, and GTM teams. </p><div class="pullquote"><p><strong>Disclaimer:</strong> While I&#8217;ll share detailed notes from talks and panels, statements can&#8217;t be officially attributed to anyone given that I don&#8217;t record who said what. This is on purpose.</p></div><p>Anyhow, below are my raw notes from the panel: </p><ul><li><p>Get deep into problems and platformize them; too many tools in security stack</p></li><li><p>Software supply chain is a massive burning pain point for enterprises today</p><ul><li><p>Open source + 3rd party</p></li></ul></li><li><p>Security startups should prioritize transparency and not BS about where they are in their security journey</p></li><li><p>Security startups should understand that bringing them on as a vendor is expanding their attack surface</p></li><li><p>"We want to be a <em><strong>partner</strong></em>; not a vendor"</p><ul><li><p>Help build and extend their security team</p></li><li><p>Building something WITH you; not for YOU</p></li></ul></li><li><p>They appreciate founders who are passionate about the problem and not just the money</p></li><li><p>Establish and chase your north star; don't just hunt down customer requests</p><ul><li><p>Saying "Yes" too much is a real problem from a product perspective</p></li></ul></li><li><p>"Internalize the problem you are solving; take it personally"</p></li><li><p>Security is rarely a technical problem; it is more of a workflow/biz ops/people problem</p><div><hr></div></li></ul><h3>Identifying &amp; Attracting the Right Investors&#128176;</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6OP_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6OP_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!6OP_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!6OP_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!6OP_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6OP_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/acf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1067387,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6OP_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!6OP_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!6OP_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!6OP_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf4536c-4389-460d-a09c-2bd39fb0310b_4032x3024.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This was the panel after lunch but it still delivered. How could it not? Look at the panelists. Anyhow, my notes aren&#8217;t as detailed for this one but here you go: </p><ul><li><p>&#8220;Bootstrapping is not as hard as ppl make it seem. Put your head down and build for as long as you financially can without outside help&#8221; </p><ul><li><p><strong>Counter:</strong> There aren't a lot of bootstrappers that do FedRAMP or other expensive problems to solve.</p></li></ul></li><li><p>Security categories are becoming meaningless. Marketing BS. Thanks, Gartner!!!! </p></li><li><p>Majority of companies coming out are 1 feature companies.</p></li><li><p>Overlapping telemetry and functionality across tools.</p></li><li><p>Risk reduction + prioritization &gt; Visibility</p><ul><li><p><strong>THE INDUSTRY DOES NOT NEED MORE VISIBILITY</strong></p></li></ul></li><li><p><strong>On doing discovery:</strong> Ask buyers where their biggest problems are; don't tell them what you're building and if that would work for them.. Don't even tell them what you're building. Just listen to what&#8217;s plaguing them the most at the moment.</p></li></ul><p>There were many other amazing, star-studded panels throughout the day but I didn&#8217;t capture any notes for those. Suffice it to say the summit was a hit. Now onto the Startup Spotlight! </p><div><hr></div><h1>Startup Competition &#127942;</h1><p>While Knostic brings the hardware home, the other 3 startups, which I wrote about <strong><a href="https://www.cybersecuritypulse.net/p/startup-spotlight-finalists-at-blackhat">here</a></strong>, delivered amazing pitches and are solving truly hard problems. Kudos to the other finalists and congratulations to Sounil and Gadi for the big W! </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!phnZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!phnZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png 424w, https://substackcdn.com/image/fetch/$s_!phnZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png 848w, https://substackcdn.com/image/fetch/$s_!phnZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png 1272w, https://substackcdn.com/image/fetch/$s_!phnZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!phnZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png" width="884" height="1328" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1328,&quot;width&quot;:884,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1347570,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!phnZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png 424w, https://substackcdn.com/image/fetch/$s_!phnZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png 848w, https://substackcdn.com/image/fetch/$s_!phnZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png 1272w, https://substackcdn.com/image/fetch/$s_!phnZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F146fd399-c6f4-46da-8e65-4b9cd6d3c447_884x1328.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong><a href="https://www.knostic.ai/about-us">Knostic</a></strong></h2><p><strong>Leadership: <a href="https://www.linkedin.com/in/sounil/">Sounil Yu</a>, </strong>Co-Founder &amp; CTO; <strong><a href="https://www.linkedin.com/in/gadievron/">Gadi Evron</a></strong>, Co-Founder &amp; CEO </p><p><strong>Problem Space:</strong> GenAI Security</p><p><strong>Solution:</strong> Need-to-know based access control for LLMs to prevent oversharing of sensitive information. Their product analyzes existing permissions and roles to derive need-to-know levels across organizations, guiding employees and customers to the information they need while preventing access to unnecessary details.</p><p>One key area of focus for them seems to be Microsoft Copilots which are a privacy mess in and of themselves. </p><p><strong>Founded in:</strong> 2023</p><p><strong>HQ:</strong> Tel Aviv, IL </p><p><strong>Total raised:</strong> $3.3M USD pre-seed  </p><p><strong>Website:</strong> <strong><a href="https://www.knostic.ai/about-us">Knostic.ai</a></strong></p><h1>Bye For Now!</h1><p>I&#8217;ll be back next week with TCP #56 encapsulating all key product and feature releases for the week. Until then, if you see me in LV, say hello! And if you&#8217;re not here, thank the heavens and keep it cool. <br><br>Hasta la proxima! &#9992;&#65039;</p>]]></content:encoded></item><item><title><![CDATA[The Security Data Fabric Shift Explained: Why Zscaler Paid $350M for Avalor And What It Means For The Security Industry]]></title><description><![CDATA[Security Data Fabrics Explained]]></description><link>https://www.cybersecuritypulse.net/p/the-security-data-fabric-shift-explained</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/the-security-data-fabric-shift-explained</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Tue, 16 Apr 2024 11:59:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZCL3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to a special edition of TCP! I'm Darwin Salazar, Product Managerr at <strong><a href="https://www.monad.com/">Monad</a></strong> and a former Detection Engineer. Each week, I distill the latest and most exciting developments in cybersecurity innovation into digestible, bite-sized updates. If you&#8217;re serious about staying at the forefront of the latest in security products, attacker techniques, and industry news make sure to hit the &#8220;Subscribe&#8221; button below to get my insights delivered straight to your inbox every week &#128233; </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZCL3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZCL3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png 424w, https://substackcdn.com/image/fetch/$s_!ZCL3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png 848w, https://substackcdn.com/image/fetch/$s_!ZCL3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png 1272w, https://substackcdn.com/image/fetch/$s_!ZCL3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZCL3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png" width="908" height="855" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:855,&quot;width&quot;:908,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:403359,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZCL3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png 424w, https://substackcdn.com/image/fetch/$s_!ZCL3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png 848w, https://substackcdn.com/image/fetch/$s_!ZCL3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png 1272w, https://substackcdn.com/image/fetch/$s_!ZCL3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0a21b47-63f7-41a0-b00d-17e22e0fe0df_908x855.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Zscaler's recent acquisition of Avalor has the industry buzzing with many folks, including seasoned practitioners and VCs, scratching their heads. Why did Zscaler drop ~$350M on a data fabric geared towards vulnerability management? Isn't Zscaler a network security, CNAPP, and zero trust player? What even is a data fabric? Zscaler CEO, Jay Chaudhry, states that it's an AI play. What does this all really mean? <br><br>The acquisition also seems to have served as a catalyst for Avalor-like companies to make moves. Below is a timeline of what transpired after the acquisition was finalized:</p><ul><li><p><strong>March 14th:</strong> <a href="https://www.zscaler.com/press/zscaler-expands-its-zero-trust-exchange-ai-powered-cloud">Zscaler finalizes Avalor acquisition</a> for $350M.</p></li><li><p><strong>March 19th:</strong> Sentinel One's venture arm, <a href="https://www.sentinelone.com/blog/s-ventures-invests-in-auguria-to-solve-secops-overload/">S Ventures, invests in Auguria</a>.</p></li><li><p><strong>March 21st:</strong> <a href="https://www.securityweek.com/tarsal-raises-6-million-for-security-data-movement-platform/">Tarsal raises $6M seed</a> and appoints Barrett Lyon as CTO.</p></li><li><p><strong>March 22nd:</strong> <a href="https://leen.dev/post/leen-funding-annoucement">Leen.dev</a> announces their $2.8M pre-seed.</p></li><li><p><strong>March 26th:</strong> <a href="https://www.prnewswire.com/news-releases/abstract-security-emerges-from-stealth-raises-8-5m-to-forge-the-complete-ai-powered-data-streaming-platform-for-security-302098879.html">Abstract Security</a> emerges from stealth with $8.5M seed funding.</p></li></ul><p>All of this activity comes on the heels of the <a href="https://www.linkedin.com/posts/nikesh-arora-02894670_i-know-we-have-sparked-a-debate-around-platformization-activity-7166581847525707776-XsOE?utm_source=share&amp;utm_medium=member_desktop">"best-of-breed vs. platform" debate</a> Palo Alto Network's most recent earnings report sparked. In some way, this is all connected and in this post, I'll attempt to make sense of it. This is one of my lengthier posts so feel free to skip through the sections. </p><p><strong>Here's what we'll be covering:</strong></p><ul><li><p>Security Data Fabric v. Security Data ETL</p></li><li><p>What Zscaler and Avalor do</p></li><li><p>Why the acquisition makes sense</p></li><li><p>What it means for the industry</p></li></ul><h3>Security Data Fabric v. Security Data ETL </h3><p>It&#8217;s easy to conflate data fabrics with data ETL processes so let&#8217;s clearly define these before moving forward. </p><h4>Security Data Fabric</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1f4-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1f4-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png 424w, https://substackcdn.com/image/fetch/$s_!1f4-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png 848w, https://substackcdn.com/image/fetch/$s_!1f4-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png 1272w, https://substackcdn.com/image/fetch/$s_!1f4-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1f4-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png" width="860" height="633" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:633,&quot;width&quot;:860,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Data-Fabric-Architecture&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Data-Fabric-Architecture" title="Data-Fabric-Architecture" srcset="https://substackcdn.com/image/fetch/$s_!1f4-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png 424w, https://substackcdn.com/image/fetch/$s_!1f4-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png 848w, https://substackcdn.com/image/fetch/$s_!1f4-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png 1272w, https://substackcdn.com/image/fetch/$s_!1f4-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0678c96-e3e1-401d-9579-6e6ef9be10da_860x633.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Gartner. </figcaption></figure></div><p>A security data fabric is the infrastructure and processes that create an integrated layer across many nodes (or data sources). Data fabrics often leverage advanced analytics and machine learning to identify relationships and patterns among disparate data sources, enabling real-time, data-driven decision-making. </p><p>This is what Avalor does, for vulnerability management. </p><h4>Security Data ETL</h4><p>On the other hand, security data ETL (Extract, Transform, Load) is a specific process that focuses on extracting data from various sources, transforming it into a clean, standardized format, and loading it into a central repository for analysis. ETL ensures data consistency and accuracy but it does not include the analytical nor relational aspects of a data fabric. </p><p>While a security data fabric enables an integrated, flexible, and analytics-driven approach to managing security data, ETL processes are what set the foundations for a data fabric. </p><p>Now, let&#8217;s take a look at Zscaler and Avalor.. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3mwM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3mwM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png 424w, https://substackcdn.com/image/fetch/$s_!3mwM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png 848w, https://substackcdn.com/image/fetch/$s_!3mwM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png 1272w, https://substackcdn.com/image/fetch/$s_!3mwM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3mwM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png" width="1200" height="627" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:627,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Avalor + Zscaler&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Avalor + Zscaler" title="Avalor + Zscaler" srcset="https://substackcdn.com/image/fetch/$s_!3mwM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png 424w, https://substackcdn.com/image/fetch/$s_!3mwM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png 848w, https://substackcdn.com/image/fetch/$s_!3mwM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png 1272w, https://substackcdn.com/image/fetch/$s_!3mwM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13bf086d-bd7f-4c23-9248-cf81bf0662da_1200x627.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Zscaler</strong></h3><p>At a high level, Zscaler is a market leader in the <a href="https://www.gartner.com/en/information-technology/glossary/security-service-edge-sse">Security Service Edge (SSE)</a> space, a key cloud security contender with their <a href="https://medium.com/@cloud_tips/cnapp-gartner-definition-4f75c2bd5027">Cloud-native application protection platform (CNAPP)</a>, and they also market a '<a href="https://www.zscaler.com/platform/zero-trust-exchange#our-platform">Zero Trust Exchange</a>' platform. Ultimately, Zscaler has bundled many traditionally stand-alone products like a CSPM, CASB, CWPP, CIEM, firewalls, and web gateways into these various core <strong>platform</strong> offerings.</p><p>With <a href="https://finance.yahoo.com/news/zscaler-reports-second-quarter-fiscal-210500951.html">nearly 3,500 customers</a> and a wide array of offerings, I'd imagine Zscaler ingests, processes, and correlates at least a few petabytes of data per day. For reference, <a href="https://www.linkedin.com/posts/jaychaudhry_i-am-excited-to-announce-that-zscaler-has-activity-7174063048108695556-D29v?utm_source=share&amp;utm_medium=member_desktop">Chaudhry states</a> that they process 400 billion cloud 'transactions' per day. You can only imagine how much they're doing on the SSE and Zero Trust Exchange side. <br><br>Lastly, Zscaler is no small fry. They're a publicly traded company with a market cap. of ~$29B.</p><h3><strong>Avalor</strong></h3><p>Avalor describes itself as a Data Fabric for Security with it's use case being vulnerability management. What this means is that Avalor extracts data from a customer's security solutions, normalizes and cross-pollinates findings from those solutions in order to surface highest-risk issues and then presents them to the customer. Avalor also has remediation assistance workflows so its not like they're solely surfacing vulns, but also helping with remediation. <br><br>Aside from having a robust correlation engine that factors in the context (i.e., environment, reachability, exploitability, resource tags) that influence potential vulnerability impact, they also seem to have highly performant data infrastructure that enables the above, at scale. Avalor also has 150+ 3rd party integrations which include some of Zscaler's competitors.</p><p><strong>Note:</strong> While founded in 2022, <a href="https://www.avalor.io/post/avalor-data-fabric-series-a-announcement">Avalor came out of stealth in April 2023</a> with $30M in Series A funding. Backed by <a href="https://cyberstarts.com/">Cyberstarts</a>, <a href="https://www.tcv.com/">TCV</a>, and <a href="http://www.salesforceventures.com/">Salesforce Ventures</a>.</p><h3><strong>Why the acquisition makes sense</strong> </h3><p><strong>Simply put, the acquisition makes sense because it enables Zscaler to accelerate the implementation of AI into their products and it provides the infrastructure needed to correlate massive volumes of data across their offerings.</strong> This cross-correlation of data allows Zscaler to surface higher fidelity and prioritized findings to their customers, providing a level of precision and context that they weren&#8217;t previously able to. <br><br>In the past couple of years, we&#8217;ve seen vendors double down on contextualizing security issues, because without context, everything is seemingly on fire all the time and security teams struggle with deciding what to prioritize. I&#8217;m a firm believer that Wiz has eaten much of PANWs market share due to <a href="https://www.wiz.io/blog/uniting-builders-and-defenders-a-new-vision-for-cloud-security">their attack path analysis</a> and other contextual features. Without data infra to support cross-pollination of data sources, it&#8217;s nearly impossible to add context to security issues. This is why the Avalor acquisition gives Zscaler an upper hand in the near-term. </p><p>Building the data infra to power both AI and large-scale data correlation at Zscaler's scale is a tall and hairy engineering challenge. It requires processing petabytes of data from millions of endpoints, billions of daily transactions, and numerous different data sources. The data pipelines and storage systems must be highly scalable, secure, and optimized for real-time correlation and AI applications.</p><p><strong>Avalor's data fabric offers a turnkey solution to this challenge</strong>. It can cleanse, normalize, and enrich data from Zscaler's various products to create a unified data asset that can be used for both training AI models and correlating security findings. For example, robust data infra can enable Retrieval-Augmented Generation (RAG) techniques to dynamically retrieve relevant snippets or context from the data fabric to inform AI-generated security recommendations. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7V2n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7V2n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png 424w, https://substackcdn.com/image/fetch/$s_!7V2n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png 848w, https://substackcdn.com/image/fetch/$s_!7V2n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png 1272w, https://substackcdn.com/image/fetch/$s_!7V2n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7V2n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png" width="1303" height="1074" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1074,&quot;width&quot;:1303,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:161831,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7V2n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png 424w, https://substackcdn.com/image/fetch/$s_!7V2n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png 848w, https://substackcdn.com/image/fetch/$s_!7V2n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png 1272w, https://substackcdn.com/image/fetch/$s_!7V2n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52875bb-3abb-483e-9cb4-60acf42c78f5_1303x1074.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Sample set of Avalor&#8217;s integrations.</figcaption></figure></div><p><br><strong>With the acquisition, Zscaler gains access to Avalor's 150+ integrations,</strong> which allow the ingestion of diverse data from various sources, including Zscaler competitors. This rich dataset is <strong>INVALUABLE</strong> for training AI models and gives Zscaler a unqiue advantage in the market.</p><p>However, this also means that Zscaler now has a backdoor to competitor data through Avalor's integrations, which makes for a tricky situation. Maintaining these integrations require ongoing partnerships for API updates, troubleshooting etc. so it&#8217;ll be interesting to see how this all plays out. </p><p>Lastly, <strong>the acquisition also allows Zscaler to enter the vulnerability management space</strong> with a differentiated, mature product that is eating market share from incumbents. Another big win. </p><p>By acquiring Avalor, Zscaler has:</p><ol><li><p>Accelerated its AI roadmap by years. I expect a Zscaler copilot later this year.</p></li><li><p>Enhanced its ability to deliver high-fidelity, prioritized security findings.</p></li><li><p>Acquired a next-gen vulnerability management solution.</p></li><li><p>Inherited 150+ integrations with visibility into competitor&#8217;s data models. </p></li></ol><p>In my opinion, this acquisition positions Zscaler extremely well moving forward. At the end of the day, integrating codebases, products and backends is not easy so the value left to be realized will come down to how well Zscaler can execute. </p><h3><strong>What it tells us about where we're headed</strong> </h3><h4>For Incumbent Vendors</h4><p>The security industry has lagged other industries in adopting big data, ML and AI, but this acquisition highlights that security is finally becoming more data-driven. </p><p>To be competitive in the new security landscape, vendors need a robust data strategy. This includes data collection pipelines that can handle terabytes of data per day, scalable storage systems for petabyte-scale data lakes, stream and batch processing to derive real-time and historical insights, and schema management to impose structure on disparate data sources. </p><p>If you're a vendor with multiple products in your portfolio going for a platform play, <em><strong>you need a data fabric to deliver an integrated user experience</strong></em>. A data fabric enables normalizing data models across products, linking entities, and providing unified APIs and UIs. This is especially important for vendors who have grown via acquisition and have disparate backends. </p><p>Here are some security vendors investing in data fabrics:</p><ul><li><p><strong>Crowdstrike:</strong> <a href="https://www.crowdstrike.com/falcon-platform/">Falcon Platform</a> and their <a href="https://www.crowdstrike.com/falcon-platform/threat-graph/">threat graph</a>.</p></li><li><p><strong>Microsoft:</strong> <a href="https://medium.com/@maarten.goet/what-is-this-microsoft-intelligent-security-graph-everybody-is-talking-about-d18d0072ea1b">In 2019, Microsoft launched their Intelligent Security Graph</a> which connects signals across their security ecosystem. I&#8217;d imagine their security copilot leverages this graph. </p></li><li><p><strong>F5:</strong> <a href="https://siliconangle.com/2024/02/07/f5-debuts-new-api-security-ai-features/">Recently launched an AI data fabric</a> to that powers their AI copilot.</p></li><li><p><strong>SentinelOne:</strong> <a href="https://www.sentinelone.com/platform/">Singularity Platform</a> and data lake depicted below. </p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JbZL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JbZL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JbZL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JbZL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JbZL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JbZL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Platform Graphic&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Platform Graphic" title="Platform Graphic" srcset="https://substackcdn.com/image/fetch/$s_!JbZL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JbZL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JbZL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JbZL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F675a866f-7b5d-4777-94fc-768d935a6043_2560x1440.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>For Startups</h4><p>If you're a security startup looking to differentiate, a 3rd party data fabric can provide access to a diversity of data sources to power unique insights. By leveraging a data fabric, startups can focus on building innovative analytics and AI capabilities on top of a comprehensive dataset, rather than spending valuable resources on data integration and normalization.</p><p>This can help them quickly bring differentiated offerings to market that draw insights from a wider range of security signals.</p><h4>For Security Teams </h4><p>Security teams that are adopting a best-of-breed approach can leverage fabrics and ETL products to have harmonize, normalize, enrich, cross-correlate and move data on their own terms rather than on the terms of a vendor. </p><p>Every organization has a different risk profile and business environment. It&#8217;s impossible for platform vendors to account for this variability. Taking on a best-of-breed approach with a fabric or ETL solution, enables security teams to build tailor-made security strategies and solutions though it requires more work. </p><p>Security leaders can also leverage this tooling to create richer, continuous, and custom KPIs spanning multiple data sources rather than going the spreadsheet route. By optimizing data before feeding it into a SIEM, data lake, long-term storage etc., teams can save on compute, ingest, and storage costs.</p><p>In essence, security data fabrics and ETL products enable teams to own their data, maximize the value of their best-of-breed tools, streamline security operations, and create tailored KPIs while potentially reducing their massive SIEM costs. This approach puts the power back in the hands of security teams, rather than relying too much on vendors.</p><h3><strong>Conclusion</strong></h3><p>Zscaler's $350M acquisition of Avalor is evidence of the growing importance of data and AI in cybersecurity. By inheriting Avalor&#8217;s proven data fabric and differentiated vuln management solution into their portfolio, Zscaler has positioned itself extremely well for the next 5 years. </p><p><strong>As the best-of-breed vs. platform debate rages on, one thing is clear: both approaches can benefit from a data fabric.</strong> </p><p>As more vendors invest in data fabrics and AI, the writing on the wall becomes more prominent. Data and AI will be the driving forces shaping the next decade of cybersecurity innovation.</p><h3>Feedback? </h3><p>Have any feedback or would like to keep the discussion going? Feel free to drop a comment, subscribe and share with friends! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/the-security-data-fabric-shift-explained?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/p/the-security-data-fabric-shift-explained?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="pullquote"><p><strong>Disclaimer:</strong> The views and opinions expressed are solely my own and do not reflect the views of my employer.</p></div>]]></content:encoded></item><item><title><![CDATA[PANW Sell-Off An Overreaction? Or Is Market Choosing Best Of Breed Approach? ]]></title><description><![CDATA[A look at what today's PANW sell-off may be telling us about the security industry.]]></description><link>https://www.cybersecuritypulse.net/p/panw-sell-off-an-overreaction-or</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/panw-sell-off-an-overreaction-or</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Thu, 22 Feb 2024 03:51:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xdt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The</strong>&nbsp;<strong>Cybersecurity Pulse</strong>! I'm Darwin Salazar, Product Manager at <strong><a href="https://www.monad.com/">Monad</a></strong> and a former Detection Engineer. Each week, I distill the latest and most exciting developments in cybersecurity innovation into digestible, bite-sized updates. If you&#8217;re serious about staying at the forefront of the latest in security products, attacker techniques, and industry news make sure to hit the &#8220;Subscribe&#8221; button below to get my insights delivered straight to your inbox every week &#128233; &#128640;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xdt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xdt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xdt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xdt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xdt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xdt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg" width="750" height="422" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:422,&quot;width&quot;:750,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Palo Alto Networks CEO Nikesh Arora goes one-on-one with Jim Cramer&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Palo Alto Networks CEO Nikesh Arora goes one-on-one with Jim Cramer" title="Palo Alto Networks CEO Nikesh Arora goes one-on-one with Jim Cramer" srcset="https://substackcdn.com/image/fetch/$s_!xdt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xdt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xdt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xdt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead59709-8b49-48bc-b71c-ff982b63f5a0_750x422.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">August 21, 2023</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X_pG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X_pG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png 424w, https://substackcdn.com/image/fetch/$s_!X_pG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png 848w, https://substackcdn.com/image/fetch/$s_!X_pG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png 1272w, https://substackcdn.com/image/fetch/$s_!X_pG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X_pG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png" width="1456" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:299145,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!X_pG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png 424w, https://substackcdn.com/image/fetch/$s_!X_pG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png 848w, https://substackcdn.com/image/fetch/$s_!X_pG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png 1272w, https://substackcdn.com/image/fetch/$s_!X_pG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa441d9f4-3868-4bb9-91bb-fd5eec4b3fa3_2196x1228.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">February 21st, 2024</figcaption></figure></div><h3>FUD on Wall St.? &#129656;&#128059;</h3><p>FUD = Fear, Uncertainty, and Doubt</p><p><strong><a href="https://www.linkedin.com/feed/#">Palo Alto Networks</a></strong>, which was overbought, got 28% of its market cap shaved off in trading hours today due to a strategic GTM shift + lowered full year guidance. It&#8217;s clear that PANW is aiming to be the go-to security platform, especially w/ recent acquisitions of <strong><a href="https://www.linkedin.com/feed/#">Talon (by Palo Alto Networks)</a></strong> and <strong><a href="https://www.linkedin.com/feed/#">Dig Security (acquired by Palo Alto Networks)</a></strong>, but I guess hearing that on an earnings call spooked analysts who don't understand the space well.</p><h3>Platform v. Best of Breed Approach?</h3><p>The debate of one security platform vs. best of breed for each security domain is one that's been hotly debated for over a decade. As with anything else, one size doesn't fit all.</p><p>Resource-strapped (talent+$$) security orgs benefit from platformization, but give up control, pipe-fitted security coverage, and flexibility.</p><p>More mature and well-funded security teams will always tend to shy away from platformization. They want the best of breed solutions that will give them the best fighting chance against attackers.</p><p>While it may cost more and take longer to properly set the systems in place to make sense of the signals (i.e., telemetry, logs, alerts, threat intel, vulns etc.) coming from all the different point solutions, they're able to conjure up a security strategy that is best suited for their business.</p><p>This is why data-driven security, <strong>#SecurityDataMesh</strong>, <strong>#SecDataOps</strong> etc. has gained more traction in recent years. Mature security teams dislike vendor lock in. It often leaves them with blindspots and the inability to correlate or enrich signal with those of other solutions.</p><p><strong>Mature security teams want full control over their security data so that they can cross-pollinate (analytics, hunting, enrichment, etc) signal from their different solutions in order to prioritize what makes most sense for them at the time.</strong></p><p>What is <strong>#1</strong> security priority for one business may not be the same for the other and this is where one-stop-shop security platforms fall short.</p><h3>Conclusion</h3><p>In any case, with PANW beating top + bottom line expectations, doubling down on AI security, and <strong><a href="https://www.linkedin.com/feed/#">Nikesh Arora</a></strong>'s killer track record as CEO, I have a feeling the platformization move + new GTM strategy will reap rewards in certain market segments.</p><p>Btw, many vendors are going after the consolidation/platformization play.. Maybe not as aggressively as PANW, but look at the product suites of <strong><a href="https://www.linkedin.com/feed/#">Zscaler</a></strong>, <strong><a href="https://www.linkedin.com/feed/#">Netskope</a></strong>, <strong><a href="https://www.linkedin.com/feed/#">Tenable</a></strong>, <strong><a href="https://www.linkedin.com/feed/#">Wiz</a></strong>, <strong><a href="https://www.linkedin.com/feed/#">Rapid7</a></strong>, <strong><a href="https://www.linkedin.com/feed/#">Fortinet</a></strong>, <strong><a href="https://www.linkedin.com/feed/#">CrowdStrike</a></strong>... You name it. Many are going after the consolidation play. As primary and biggest pure play public security co, PANW absorbs the hit, others take the lessons.</p><p>You can access the full earnings report transcript <strong><a href="https://finance.yahoo.com/news/palo-alto-networks-inc-nasdaq-140901407.html">here</a></strong> and check out Nikesh Arora&#8217;s CNBC interview w/ Jim Cramer <strong><a href="https://www.youtube.com/watch?v=NSQRi9O9Emc">here</a></strong>. </p><div class="pullquote"><p><em>Disclaimer: None of this is financial advice nor express the views of my employer. Just a snapshot of what I've seen first-hand in the security industry! If you enjoyed today&#8217;s post, subscribe and share to receive future updates! </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Next-Gen Offensive Security: 5 Service Trends to Watch in 2024]]></title><description><![CDATA[A deep-dive into 2024's top trends]]></description><link>https://www.cybersecuritypulse.net/p/next-gen-offensive-security-5-service</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/next-gen-offensive-security-5-service</guid><dc:creator><![CDATA[Mike Dame]]></dc:creator><pubDate>Tue, 30 Jan 2024 13:30:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!J_lO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J_lO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J_lO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png 424w, https://substackcdn.com/image/fetch/$s_!J_lO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png 848w, https://substackcdn.com/image/fetch/$s_!J_lO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png 1272w, https://substackcdn.com/image/fetch/$s_!J_lO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J_lO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png" width="839" height="376" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:376,&quot;width&quot;:839,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!J_lO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png 424w, https://substackcdn.com/image/fetch/$s_!J_lO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png 848w, https://substackcdn.com/image/fetch/$s_!J_lO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png 1272w, https://substackcdn.com/image/fetch/$s_!J_lO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F033b6b97-48dc-49d0-8ec3-e24e6157e305_839x376.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Hey! I'm <strong><a href="https://www.linkedin.com/in/mike-dame?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAC2HRh4B7BV71uXiGjr7MYtzlgqwLRS1_K0&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3B5PahetvtSWOBQRlF3%2Be7Nw%3D%3D">Mike Dame</a></strong>, and I have 5+ years of experience in Offensive Security, working for Fortune 50 enterprises and more recently, consulting across multiple industries. I hold the <strong><a href="https://en.wikipedia.org/wiki/Offensive_Security_Certified_Professional">OSCP</a>, <a href="https://training.zeropointsecurity.co.uk/pages/red-team-ops-exam">CRTO</a>, <a href="https://certifications.tcm-sec.com/pnpt/">PNPT</a></strong>, and <strong><a href="https://aws.amazon.com/certification/certified-security-specialty/">AWS Security Specialty</a></strong> certifications to name a few. Though new to the TCP community, Darwin and I go way back to our days on Ford Motor&#8217;s Red Team. Fun times &#128013;&#128308;</p><p>Throughout my career, I&#8217;ve dedicated most of my focus to offensive security which has allowed me to gain a firm grasp on how systems, networks, and infrastructures can be abused. My goal in my professional and personal career is to inspire growth and bring about positive change in everyone I meet. That said, I'm excited to connect with you and continue sharing what I've learned during my time in the industry.</p><p>When Darwin shot me the idea for this post, I was enthused to share some of the recent trends I&#8217;ve been noticing, especially considering how quickly things are now moving with the recent AI boom. That said, today I&#8217;ll be sharing Trends in Offensive Security Offerings and Services to keep an eye out for in 2024.</p><h2><strong>Defining Offensive Security Services and Offerings</strong></h2><p>These are the tactics and tools used by offensive security teams and consulting firms to test the defenses of a target. Whether it&#8217;s a penetration test or a full-blown red team engagement, methods have changed over the past couple of years and they will continue to as the security landscape progresses. Let&#8217;s take a look at where directions are headed and who are the ones blazing the trail.&nbsp;</p><h2>Overview&nbsp;</h2><ol><li><p><strong>Automated Penetration Testing Tools</strong></p></li><li><p><strong>Advancements in Cloud Penetration Testing and Cloud Red Teaming</strong></p></li><li><p><strong>&#8220;Continuous&#8221; for Penetration Tests and Vulnerability Scanning</strong></p></li><li><p><strong>Assumed Breaches</strong></p></li><li><p><strong>Client Portal Reporting</strong></p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LCyS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LCyS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!LCyS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!LCyS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!LCyS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LCyS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LCyS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!LCyS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!LCyS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!LCyS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e691cf1-7440-4cc0-b2fc-fca07302dbc5_1024x1024.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Automated Penetration Testing Tools&nbsp;</strong></h2><p>Though many were skeptical of automated penetration testing (Pentest) tools at first, they&#8217;ve proven to be a valuable addition to the arsenal as their capabilities have matured. Automated pentest tools take the repetitive tasks that we&#8217;re all familiar with in a pentesting methodology and executes them on a recurring basis. This saves practitioners a ton of time, allowing them to focus on finding more advanced exploits and attack chains.&nbsp;</p><p>The types of attacks that can be automated include:</p><ul><li><p>Poisoning and sniffing to capture credentials with Adversary in the Middle (AITM) attacks.</p></li><li><p>Cracking hashes or passing the hash.</p></li><li><p>Exploiting common CVE POCs like EternalBlue and Log4j.&nbsp;</p></li><li><p>Enumerating a host once a foothold has been established and extracting additional hases.</p></li><li><p>Spraying found credentials to compromise additional hosts across the network.</p></li></ul><p>While these tools are still in a stage where there's room for improvement, and manual exploitation is still a requirement for now, automated penetration testing tools can significantly reduce the workload for your offensive security team. This saving of valuable time during a client engagement or internal assessment enables you to concentrate on more in-depth dives, research, or chase rabbits to your heart's desire.</p><p>Below are a few notable products blazing the trail for automated pentesting:&nbsp;</p><ul><li><p><strong><a href="https://www.horizon3.ai/nodezero/">NodeZero from Horizon3 AI</a></strong></p></li><li><p><strong><a href="https://pentera.io/platform/">Pentera Surface + Core</a></strong></p></li><li><p><strong><a href="https://www.vonahi.io/services/network-penetration-testing">Vonahai&#8217;s vPentest</a></strong></p></li><li><p><strong><a href="https://bishopfox.com/platform">BishopFox Cosmos</a></strong></p></li></ul><p>They all offer free trials to corporate accounts. Check them out and see what works best for you!</p><h2><strong>Advancements in Cloud Pentesting and Cloud Red Teaming</strong></h2><p>As traditional on-premises networks transition to the cloud, and with an increasing utilization of cloud resources each year, the cloud remains a prominent attack surface. This area is one where the industry is in desperate need of more security experts. From an offensive security perspective, stay vigilant for advancements in attacker tactics and techniques with resources such as:</p><ul><li><p><strong><a href="https://training.hacktricks.xyz/courses/arte">HackTricks Cloud</a></strong></p></li><li><p><strong><a href="https://hackingthe.cloud/">HackingTheCloud</a></strong></p></li><li><p><strong><a href="https://github.com/redskycyber/Cloud-Security/tree/main">Red Sky Cyber</a></strong></p></li></ul><p>And the progression of exploitation toolkits. Check out their Github repos for new additions to be made. Some have come out more recent than others:</p><ul><li><p><strong><a href="https://github.com/dafthack/GraphRunner">Graph Runner</a></strong> (Azure)</p></li><li><p><strong><a href="https://github.com/Azure/Stormspotter">Storm Spotter</a></strong> (Azure)</p></li><li><p><strong><a href="https://github.com/BishopFox/cloudfox">CloudFox</a></strong> (AWS + Azure)</p></li><li><p><strong><a href="https://github.com/RhinoSecurityLabs/pacu">Pacu</a></strong> (AWS)</p></li></ul><p>Unfortunately, I&#8217;ve not come across a GCP exploitation framework. Is this something we&#8217;ll finally see in 2024? If you&#8217;ve come across one, please reach out! It definitely seems to be a space that is trailing behind.</p><h2><strong>&#8220;Continuous&#8221; for Penetration Tests and Vulnerability Scanning</strong></h2><p>Another trend I've noticed is that teams are increasingly adopting a continuous offensive security approach, shifting from point-in-time assessments to more frequent, sometimes daily assessments. This change, often enabled by automation, helps identify security issues as they arise versus relying on annual or quarterly assessments. While there are limitations and trade-offs, this proactive approach is becoming more common due to its effectiveness in promptly uncovering and addressing vulnerabilities as they appear.&nbsp;</p><p>I don't believe point-in-time assessments are becoming obsolete. There is significant value in a assessment at a specific point in time because it delves deeper than what automated tools or scanners may provide. The manual approach is where the real fun and creative exploits emerge. However, with continuous vulnerability scanning, increased frequency of penetration testing, and ongoing red teaming engagements (lasting for months attempting to breach an enterprise), <strong>we can more effectively mimic real threat actors and provide multiple assessments for the price of one.</strong>&nbsp;</p><p>Considering that external assets are constantly scanned on the internet, and threat actors have unlimited time and resources to discover these flaws, offensive security professionals need to keep up. That's why I believe this trend will continue.</p><h2><strong>Assumed Breaches</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9FAJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9FAJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9FAJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9FAJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9FAJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9FAJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9FAJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9FAJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9FAJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9FAJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f0bbd38-d81c-437a-b258-0e48d713e822_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In my years focusing on offensive security, the term "Assumed Breaches" has resonated more deeply with me, especially as attacks have become more sophisticated. This approach, which I've increasingly integrated into my practices, operates on the principle that breaches are not just possible; they're inevitable.</p><h4><strong>Why I Advocate for the Assumed Breach Approach</strong></h4><p>To me, adopting an "Assumed Breach" approach requires a mindset shift. It's about acknowledging that our defenses will be breached and focusing instead on how we prepare for, respond to, and recover from these incidents. By simulating malicious access to various parts of our network, we're not just testing our defenses; we're proactively preparing for real-world scenarios. This method allows us to uncover vulnerabilities that traditional assessments might miss.</p><h4><strong>Tailoring the Simulation</strong></h4><p>In my practice, the starting point for an assumed breach scenario is rarely the same. It's carefully chosen to reflect the unique nature of the environment that I&#8217;m targeting. For example, if a company's core operations revolve around development, I'll start with developer credentials and workstations. This approach ensures that the pentesting is as relevant and insightful as possible, mirroring potential real-world attack vectors that could be exploited by actual threat actors.</p><h4><strong>Looking Ahead</strong></h4><p>As we step into 2024, I'm convinced that the "Assumed Breaches" methodology will only become more relevant.&nbsp;</p><h2><strong>Client Reporting Portal</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DQ0P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DQ0P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!DQ0P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!DQ0P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!DQ0P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DQ0P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DQ0P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!DQ0P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!DQ0P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!DQ0P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc369e2-c77e-46f7-85c9-6b9cb2950aa5_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Are traditional pentest reports becoming obsolete? From a consulting perspective, I certainly hope so.</p><p>There are rumors of a trend gaining traction within some teams. Bug and remediation tracking tools, such as JIRA for internal security teams, have evolved into the concept of an interactive dashboard. This dashboard can notify and display findings in real-time to a client, offering several advantages:</p><ol><li><p>Speeds up the notification time.</p></li><li><p>Facilitates easier tracking and remediation.</p></li><li><p>Allows for comments and communications about findings in one place.</p></li><li><p>Enables a simpler export or attestation that confirms the penetration test was conducted and items were remediated.</p></li></ol><p>If you take a step back and consider a primary purpose of offensive security services, it's to identify, exploit, and demonstrate the impact of vulnerabilities as well as provide this information to security teams, enabling them to understand the issue and remediate it as quickly as possible. With that in mind, having a faster, more iterative and more interactive method to deliver these results, such as a client reporting portal, just makes sense.</p><p><strong><a href="https://plextrac.com/solutions/client-portal/">PlexTrac</a></strong> and <strong><a href="https://www.precursorsecurity.com/penetration-testing-online-portal">Precursor Security</a></strong> are two companies that I&#8217;ve found are leading the charge in this space. Have you come across any? Please let me know in the comments!&nbsp;</p><h2>Conclusion</h2><p>Those are the top trends I think will continue to be hot in 2024. Thanks for reading! If you have any predictions for what we might see more of in Offensive Security services in 2024 or have any questions about the topics I covered, feel free to <strong><a href="https://www.linkedin.com/in/mike-dame/">message me on LinkedIn</a></strong> or leave a comment on this post! You can also follow <strong><a href="https://github.com/redskycyber/Cloud-Security/tree/main">my Github</a></strong><a href="https://github.com/redskycyber/Cloud-Security/tree/main"> </a>where I&#8217;ll be posting more resources around penetration testing and red teaming! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/next-gen-offensive-security-5-service?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/p/next-gen-offensive-security-5-service?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Introducing "The Cybersecurity Professor" GPT 🪄🐐✨]]></title><description><![CDATA[Now available on the OpenAI's GPT Store!]]></description><link>https://www.cybersecuritypulse.net/p/introducing-the-cybersecurity-professor</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/introducing-the-cybersecurity-professor</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Sun, 14 Jan 2024 23:28:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Wldd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s no secret that ChatGPT has been an amazing tool for learning new topics and having the superpower of having an advisor/tutor at your fingertips 24/7. As someone who is mostly self-taught in cybersecurity and has taught others, it&#8217;s clear that Generative AI (GenAI) has changed the education landscape <em>forever</em>. It might even be what&#8217;s needed to help bridge the talent shortage plaguing our industry. The recent <a href="https://media.isc2.org/-/media/Project/ISC2/Main/Media/documents/research/ISC2_Cybersecurity_Workforce_Study_2023.pdf?rev=28b46de71ce24e6ab7705f6e3da8637e&amp;hash=CE6762D811935593F5C04AAB49DF33DF">2023 ISC2 Global Workforce Study</a> found that there are nearly 4 million open security roles across the globe. This number seems to only be increasing. We simply are not producing enough defenders at the necessary rate. Lack of access to proper security education and career guidance are major reasons why. </p><p>However as new technologies like GenAI emerge, I think we have a strong opportunity to close this gap. Just imagine being able to ask ChatGPT to explain how firewalls work, ask it to explain using analogies, and if there is anything you don&#8217;t understand, you can just continue to ask it &#8220;Why?&#8221; or &#8220;How?&#8221; until you fully comprehend the topic at hand. You can also ask it for a hands-on project using open-source solutions and it&#8217;ll generate one for you with instructions and then guide you through how to perform certain actions on your project or lab environment! </p><p>It&#8217;s insane how under-leveraged GenAI is as an educational tool and this is why I&#8217;m excited to introduce &#8220;<strong><a href="https://chat.openai.com/g/g-MBHMXBUB8-the-cybersecurity-professor">The Cybersecurity Professor&#129668;&#128016;&#10024;&#8221; GPT</a></strong>. </p><h3>What is &#8220;The Cybersecurity Professor&#8221; GPT? </h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wldd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wldd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png 424w, https://substackcdn.com/image/fetch/$s_!Wldd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png 848w, https://substackcdn.com/image/fetch/$s_!Wldd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png 1272w, https://substackcdn.com/image/fetch/$s_!Wldd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wldd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png" width="970" height="562" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:562,&quot;width&quot;:970,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:132545,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Wldd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png 424w, https://substackcdn.com/image/fetch/$s_!Wldd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png 848w, https://substackcdn.com/image/fetch/$s_!Wldd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png 1272w, https://substackcdn.com/image/fetch/$s_!Wldd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F991d8cdd-ec9b-4317-9240-4b29eb36b853_970x562.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Cybersecurity Professor (TCP) GPT, is a GPT agent that I rigorously tested, fine-tuned, and designed to make learning cybersecurity concepts accessible, relatable, and practical for aspiring professionals. It&#8217;s been configured to take on the role of a Stanford-level educator with 25+ years of cybersecurity experience in big tech and the U.S. National Security Agency (NSA). The agent is also fine-tuned to provide career advice including detailing the different types of security roles, certification study plans, and how to prepare for interviews. </p><p>Below are some of the additional features of the TCP GPT:  </p><ul><li><p><strong><a href="http://l">Learning Made Simple: </a></strong>Complex concepts are broken down using analogies and relatable language, making them easy to grasp.</p></li><li><p><strong><a href="http://L">Interactive and Friendly:</a></strong><a href="http://L"> </a>TCP GPT encourages users to ask questions, seek clarifications, and engage in meaningful learning.</p></li><li><p><strong><a href="http://L">Up-to-date Information:</a></strong> With access to the internet, the TCP GPT stays updated with the latest trends and information, ensuring you're learning the most current content.</p></li><li><p><strong><a href="http://L">Historical Context:</a></strong> Learn from the past to understand the present. TCP GPT provides historical context on major cyber attacks, enriching your understanding of the cybersecurity landscape.</p></li></ul><h3><strong>What Can You Do With The TCP GPT? </strong></h3><p>There are very few limits to what you can learn or do with the TCP GPT. You can leverage it to generate hands-on labs for cloud security; you can use it to dissect a novel attack; or you can use it to help you bolster your LinkedIn profile to help you land your dream role in cybersecurity. While the possibilities are seemingly endless, it&#8217;s sometimes tough to land exactly on what you&#8217;d like to ask or learn so here are some ideas to get you started:  </p><ol><li><p>&#8220;I&#8217;m a construction worker with no IT experience. How should I approach getting into cybersecurity? What are the core skills I should develop and what core concepts should I understand?&#8221;</p></li><li><p>&#8220;I&#8217;m intrigued by nation-state threat actor activity and dissecting the latest cyberattacks. What role(s) fit best with my interests and what should I learn in order to land that role. How should I go about learning these things?&#8221;</p></li><li><p>&#8220;Explain the difference between symmetric and asymmetric encryption. Please use a relatable analogy.&#8221;</p></li><li><p>&#8220;What are some key Linux commands that I should know for cybersecurity purposes?&#8221; </p></li><li><p>&#8220;Can you give me a couple of project ideas to get my hands dirty with Python and network security?&#8221;</p><ul><li><p><strong><a href="http://L">TIP</a>:</strong> As you go through these projects, use TCP GPT as a guide whenever you get stuck. Create a GitHub account and host the code to the tool and/or project(s) that you&#8217;ve worked on. </p></li></ul></li><li><p>&#8220;Provide me with a high-level explanation of how Stuxnet attack was carried out.&#8221;</p></li><li><p>&#8220;What are the most important principles in identity security?&#8221;</p></li><li><p>&#8220;What are 5 interview questions I should be prepared for for a Junior SOC Analyst role? How would you answer them if it were you being interviewed?&#8221; </p></li><li><p>&#8220;Provide me with a study plan for the CompTIA Security+ certification.&#8221; </p></li><li><p>&#8220;How can I bolster the security of my home network?&#8221; </p></li></ol><h3><strong>How to Access the TCP GPT</strong></h3><ul><li><p><strong><a href="https://chat.openai.com/auth/login">ChatGPT Plus</a></strong> required ($20/month). Worth the investment due to early access to new features, GPT Marketplace, and more. </p></li><li><p>Once you&#8217;ve got ChatGPT Plus, you can access it by clicking <strong><a href="https://chat.openai.com/g/g-MBHMXBUB8-the-cybersecurity-professor">this link</a></strong>.</p></li><li><p>You can also find it on the OpenAI marketplace by clicking &#8220;Explore GPTs&#8221; on the left-hand panel and type in &#8220;The Cybersecurity Professor&#8221; and the GPT will pop up as shown below:</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0R7D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0R7D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png 424w, https://substackcdn.com/image/fetch/$s_!0R7D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png 848w, https://substackcdn.com/image/fetch/$s_!0R7D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png 1272w, https://substackcdn.com/image/fetch/$s_!0R7D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0R7D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png" width="1186" height="366" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:366,&quot;width&quot;:1186,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:75133,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0R7D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png 424w, https://substackcdn.com/image/fetch/$s_!0R7D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png 848w, https://substackcdn.com/image/fetch/$s_!0R7D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png 1272w, https://substackcdn.com/image/fetch/$s_!0R7D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09883cea-4f3d-45b6-817e-1c73058215f6_1186x366.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>What Makes TCP GPT Better than ChatGPT? </h3><p>Fine-tuned GPT agents are often better than general-purpose ChatGPT because they focus on specific topics, avoid irrelevant details, and are less prone to errors like hallucination, ensuring more accurate and relevant responses. For the TCP GPT, I rigorously tested and fine-tuned it to have he following characteristics: </p><ul><li><p><strong><a href="http://L">Specialized Training:</a></strong> Fine-tuned with an extensive collection of cybersecurity-related data, covering historical incidents, technical methodologies, and industry trends.</p></li><li><p><strong><a href="http://L">Expertise Emphasis:</a></strong> Strong focus on real-world scenarios and specific roles within cybersecurity, such as SOC and GRC Analysts, to offer relevant and practical advice.</p></li><li><p><strong><a href="http://L">Interactive Learning Design:</a></strong> TCP is configured to foster interaction and encourage questions, enhancing the engagement and effectiveness of the learning experience.</p></li><li><p><strong><a href="http://L">Accessibility Focus:</a></strong> Tuned to place special emphasis on the ability to demystify complex topics, utilizing analogies and relatable language to make cybersecurity concepts accessible to learners at all levels.</p></li></ul><h3>Blooper&#129760;</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xZLD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xZLD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png 424w, https://substackcdn.com/image/fetch/$s_!xZLD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png 848w, https://substackcdn.com/image/fetch/$s_!xZLD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png 1272w, https://substackcdn.com/image/fetch/$s_!xZLD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xZLD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png" width="1330" height="1360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1360,&quot;width&quot;:1330,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;D \nYou \nIllustrate the steps of a phishing attack. \nThe Cybersecurity Professor , \no \n1. Creation of fake \na faake email \n2. \ncnecnict di&amp;s \n3. Desiet Ste i masige \n2. Decestive %rmatiM \nSTAKE \n2. Tolsamntthe simate \n4. 3, fakee sitte \n3. Ceyrenis inf&#171;ma60n \n4. dasere \nHere's an illustration depicting the steps of a phishing attack. This visual guide should \nhelp you understand the sequence of events typically involved in a phishing attempt, \nfrom the creation of a fake website or email by the cybercriminal to the eventual theft \nof sensitive information. Each step is clearly labeled for easy understanding. \nRemember, awareness is key to preventing such cyber attacks! &quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="D 
You 
Illustrate the steps of a phishing attack. 
The Cybersecurity Professor , 
o 
1. Creation of fake 
a faake email 
2. 
cnecnict di&amp;s 
3. Desiet Ste i masige 
2. Decestive %rmatiM 
STAKE 
2. Tolsamntthe simate 
4. 3, fakee sitte 
3. Ceyrenis inf&#171;ma60n 
4. dasere 
Here's an illustration depicting the steps of a phishing attack. This visual guide should 
help you understand the sequence of events typically involved in a phishing attempt, 
from the creation of a fake website or email by the cybercriminal to the eventual theft 
of sensitive information. Each step is clearly labeled for easy understanding. 
Remember, awareness is key to preventing such cyber attacks! " title="D 
You 
Illustrate the steps of a phishing attack. 
The Cybersecurity Professor , 
o 
1. Creation of fake 
a faake email 
2. 
cnecnict di&amp;s 
3. Desiet Ste i masige 
2. Decestive %rmatiM 
STAKE 
2. Tolsamntthe simate 
4. 3, fakee sitte 
3. Ceyrenis inf&#171;ma60n 
4. dasere 
Here's an illustration depicting the steps of a phishing attack. This visual guide should 
help you understand the sequence of events typically involved in a phishing attempt, 
from the creation of a fake website or email by the cybercriminal to the eventual theft 
of sensitive information. Each step is clearly labeled for easy understanding. 
Remember, awareness is key to preventing such cyber attacks! " srcset="https://substackcdn.com/image/fetch/$s_!xZLD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png 424w, https://substackcdn.com/image/fetch/$s_!xZLD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png 848w, https://substackcdn.com/image/fetch/$s_!xZLD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png 1272w, https://substackcdn.com/image/fetch/$s_!xZLD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec5a5a-07a7-4886-988d-12a37483f00b_1330x1360.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While I would&#8217;ve LOVED to add diagraming and visual capabilities to the TCP GPT, the DALL-E integration is simply not mature enough as you can tell from the example above. Funny enough, this was after I tried tuning the agent to provide simpler and more accurate visuals. </p><p>However, I have no doubt that the DALL-E integration will eventually be advanced enough to generate accurate visuals and when it does, you can count on me to add it to the TCP GPT. This feature will be helpful for generating architecture diagrams, infographics, walking users through attack flows and more. </p><h3>That&#8217;s All&#8230; For Now!</h3><p>If you know someone that is interested in starting their career in cybersecurity or is at the beginning stages of their security career, please share this post with them! It has the promise to help streamline and demystify their process. Even if you&#8217;re a veteran in cybersecurity, but are considering a role change or would like to brush up on your fundamentals, TCP GPT is here for you! Lastly, if you have any feedback that can make the GPT better, please do share! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/introducing-the-cybersecurity-professor?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/p/introducing-the-cybersecurity-professor?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[2030 Agents 🤖]]></title><description><![CDATA[A look at recent progress made on ACAs]]></description><link>https://www.cybersecuritypulse.net/p/beyond-genai-the-rise-of-autonomous</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/beyond-genai-the-rise-of-autonomous</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Wed, 06 Dec 2023 16:43:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!d2Xv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to The Cybersecurity Pulse (TCP)! If you&#8217;re serious about staying at the forefront of the latest in the cybersecurity industry, make sure to hit the &#8220;Subscribe&#8221; button below to get my insights delivered straight to your inbox &#128233;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!d2Xv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!d2Xv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png 424w, https://substackcdn.com/image/fetch/$s_!d2Xv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png 848w, https://substackcdn.com/image/fetch/$s_!d2Xv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png 1272w, https://substackcdn.com/image/fetch/$s_!d2Xv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!d2Xv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png" width="610" height="470" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:470,&quot;width&quot;:610,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;RLAgent \nAction \nFaiWd \nposition ' \n&#12308; k Path \nA | PO n | \nOperations , \nGym Environment &quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="RLAgent 
Action 
FaiWd 
position ' 
&#12308; k Path 
A | PO n | 
Operations , 
Gym Environment " title="RLAgent 
Action 
FaiWd 
position ' 
&#12308; k Path 
A | PO n | 
Operations , 
Gym Environment " srcset="https://substackcdn.com/image/fetch/$s_!d2Xv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png 424w, https://substackcdn.com/image/fetch/$s_!d2Xv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png 848w, https://substackcdn.com/image/fetch/$s_!d2Xv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png 1272w, https://substackcdn.com/image/fetch/$s_!d2Xv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5479fc03-1582-42cc-a197-0bbb3054522c_610x470.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">PNNLs autonomous cyber defense framework. Source: <a href="https://arxiv.org/pdf/2302.01595.pdf">Deep Reinforcement Learning for Cyber System Defense under Dynamic Adversarial Uncertainties</a></figcaption></figure></div><h2><strong>Cybersecurity Beyond GenAI</strong></h2><p>Over the past year, Generative Artificial Intelligence (GenAI) has stolen the show as the most widely adopted type of AI in history. GenAI has had an undeniable impact on society and has changed the world forever. In cybersecurity, the introduction of GenAI has been a double-edged sword. It has enabled malicious actors to carry out sophisticated phishing campaigns at higher rates<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> while acting as a force multiplier for criminal hacker groups. On the other hand, GenAI has seen numerous use cases for defense, including security advisors, code review, and Natural Language Processing (NLP) to code generation. I wrote <strong><a href="https://www.cybersecuritypulse.net/p/demystifying-the-generative-ai-and#%C2%A7themes">a post</a></strong> earlier this year that dives into more use cases if you'd like to dive further into this area.</p><p>However, GenAI is just the appetizer. As AI and Machine Learning (ML) become increasingly integrated into cybersecurity, they open doors to even more groundbreaking possibilities. This may sound like something out of a sci-fi novel, but imagine a world where ultra-intelligent autonomous agents could single-handedly stop cyber attacks, conduct threat hunts, and/or harden your systems based on new intel. <br><br>This is where Autonomous Cyber-defense Agents (ACA) come into play. ACAs are self-sufficient agents capable of whatever they&#8217;re trained and fine-tuned to do. Given the time, cost, and talent constraints in our industry, this is an extremely attractive proposition. The burning question is <em><strong>whether we have the technical capability to build commercial, production-grade autonomous agents</strong></em>.</p><p>This is what we&#8217;ll explore today, and spoiler alert: it seems we're getting closer and closer to a major breakthrough. </p><h2><strong>What is Deep Reinforcement Learning (DRL)</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4uyG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4uyG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png 424w, https://substackcdn.com/image/fetch/$s_!4uyG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png 848w, https://substackcdn.com/image/fetch/$s_!4uyG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png 1272w, https://substackcdn.com/image/fetch/$s_!4uyG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4uyG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png" width="860" height="778" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:778,&quot;width&quot;:860,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:138289,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4uyG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png 424w, https://substackcdn.com/image/fetch/$s_!4uyG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png 848w, https://substackcdn.com/image/fetch/$s_!4uyG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png 1272w, https://substackcdn.com/image/fetch/$s_!4uyG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b11bd0-ab58-468a-b313-3daeda253b55_860x778.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Stages of Reinforcement Learning. Source: <a href="https://cset.georgetown.edu/wp-content/uploads/Autonomous-Cyber-Defense-1.pdf">CSET and CETaS</a> </figcaption></figure></div><blockquote><p>"Cyber-defense agents will stealthily monitor the networks, detect the enemy cyber activities while remaining concealed, and then destroy or degrade the enemy malware. They will do so mostly autonomously, because human cyber experts will be always scarce on the battlefield. They have to be capable of autonomous learning because enemy malware is constantly evolving. They have to be stealthy because the enemy malware will try to find and destroy them. At the time of this writing and to the best of our knowledge, autonomous agents with such capabilities remain unavailable." - Source: <strong><a href="https://apps.dtic.mil/sti/pdfs/AD1080471.pdf">Autonomous Intelligent Cyber-defense Agent Reference Architecture (AICARA) Release 2.0</a></strong> - 2019<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p></blockquote><p>Fortunately, the last sentence in the above statement is becoming less and less true every day due to advancements in machine learning, specifically in DRL. </p><p>DRL is an advanced area of machine learning that combines <strong><a href="https://en.wikipedia.org/wiki/Deep_learning">deep learning</a></strong> and <strong><a href="https://en.wikipedia.org/wiki/Reinforcement_learning">reinforcement learning</a></strong> principles. In this approach, an agent learns to make decisions by interacting with its environment. The agent receives feedback through rewards or penalties based on its actions. This feedback helps the agent to understand which actions lead to better outcomes.</p><p>In cybersecurity, DRL becomes a game-changer as it is what makes ACAs possible. It forms the foundation that will eventually enable systems to autonomously detect and respond to threats by learning from their interactions with network and system logs, telemetry, threat intel. etc. For example, a DRL agent can learn to identify patterns of different attacks, adapt to threats, and take actions to mitigate them without human intervention. Without DRL, there would be no ACA.  </p><h2><strong>The History of ACAs</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jT6b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jT6b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png 424w, https://substackcdn.com/image/fetch/$s_!jT6b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png 848w, https://substackcdn.com/image/fetch/$s_!jT6b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png 1272w, https://substackcdn.com/image/fetch/$s_!jT6b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jT6b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png" width="1150" height="672" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:672,&quot;width&quot;:1150,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Papers by Year on Reinforcement Learning for Autonomous Cyber Defense \n125 \n101 \n100 \n75 \n47 \n50 \n25 \n0000 \nCount &quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Papers by Year on Reinforcement Learning for Autonomous Cyber Defense 
125 
101 
100 
75 
47 
50 
25 
0000 
Count " title="Papers by Year on Reinforcement Learning for Autonomous Cyber Defense 
125 
101 
100 
75 
47 
50 
25 
0000 
Count " srcset="https://substackcdn.com/image/fetch/$s_!jT6b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png 424w, https://substackcdn.com/image/fetch/$s_!jT6b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png 848w, https://substackcdn.com/image/fetch/$s_!jT6b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png 1272w, https://substackcdn.com/image/fetch/$s_!jT6b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F249b7c62-6586-4469-9d0f-a6c1fc67067d_1150x672.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: &#8220;Limmen / awesome-rl-for-cybersecurity,&#8221; GitHub, <a href="https://github.com/Limmen/awesome-rl-forcybersecurity">https://github.com/Limmen/awesome-rl-forcybersecurity</a>.</figcaption></figure></div><p>The concept of ACAs has been around for a long time. Back in 2016, the same year AlphaGo beat the world's best human player, DARPA organized the <strong><a href="https://www.darpa.mil/program/cyber-grand-challenge">Cyber Grand Challenge</a></strong>. In this event, computers independently engaged in attack and defend scenarios. However, the competition saw very little use of machine learning. The strategies used were mostly human-directed and lacked true machine autonomy.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p><p>Since then, it seems like the U.S. military and its allies have been hard at work in developing ACAs, which is evidenced by the <strong><a href="https://apps.dtic.mil/sti/pdfs/AD1080471.pdf">154-page AICARA report</a></strong> released by NATO Research Task Group (RTG) IST-152.  In this report, the research group highlights ACAs applications for cyber warfare and goes in depth on the architecture and technical capabilities they found necessary to be able to create highly intelligent cyber defense agents. However, they concluded that military-grade (pun intended) ACAs were not feasible back in 2019 due to technical limitations.</p><p><em>Fast forward to 2023&#8230;</em></p><h2><strong>Are We There Yet: The Latest Research on ACAs</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ol78!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ol78!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png 424w, https://substackcdn.com/image/fetch/$s_!ol78!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png 848w, https://substackcdn.com/image/fetch/$s_!ol78!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png 1272w, https://substackcdn.com/image/fetch/$s_!ol78!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ol78!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png" width="1222" height="554" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:554,&quot;width&quot;:1222,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Playing Atari with Deep \nReinforcement Learning \nDARPA Cyber Grand \nChallenge \nAn increase in Cyber Gyms \n(FARLAND, CyberBatt1eSim, \nCybORG, CyGlL Yawning Titan) \n2013 \n2014 \n2015 \n2016 \n2017 \n2018 \n2019 \n2020 \n2021 \n2022 \n2023 \nMastering the game of Go \nwith deep neural networks \nand tree search \nPacific Northwest National \nLaboratory Cyber Gym &amp; \nDRL algorithm &quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Playing Atari with Deep 
Reinforcement Learning 
DARPA Cyber Grand 
Challenge 
An increase in Cyber Gyms 
(FARLAND, CyberBatt1eSim, 
CybORG, CyGlL Yawning Titan) 
2013 
2014 
2015 
2016 
2017 
2018 
2019 
2020 
2021 
2022 
2023 
Mastering the game of Go 
with deep neural networks 
and tree search 
Pacific Northwest National 
Laboratory Cyber Gym &amp; 
DRL algorithm " title="Playing Atari with Deep 
Reinforcement Learning 
DARPA Cyber Grand 
Challenge 
An increase in Cyber Gyms 
(FARLAND, CyberBatt1eSim, 
CybORG, CyGlL Yawning Titan) 
2013 
2014 
2015 
2016 
2017 
2018 
2019 
2020 
2021 
2022 
2023 
Mastering the game of Go 
with deep neural networks 
and tree search 
Pacific Northwest National 
Laboratory Cyber Gym &amp; 
DRL algorithm " srcset="https://substackcdn.com/image/fetch/$s_!ol78!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png 424w, https://substackcdn.com/image/fetch/$s_!ol78!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png 848w, https://substackcdn.com/image/fetch/$s_!ol78!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png 1272w, https://substackcdn.com/image/fetch/$s_!ol78!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab0df40b-a705-4101-8d1f-fdb428871178_1222x554.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Timeline Of Relevant Developments In RL For Cyber. Source: <a href="https://cset.georgetown.edu/wp-content/uploads/Autonomous-Cyber-Defense-1.pdf">CSET and CETaS</a>.</figcaption></figure></div><p>Earlier this year, researchers at the <strong><a href="https://www.pnnl.gov/">Department of Energy's Pacific Northwest National Laboratory (PNNL)</a></strong> made significant strides in cybersecurity by constructing an abstract simulation of the conflict between attackers and defenders within a network by using an OpenAI gym sandbox and DRL. They trained four different DRL neural networks, with the primary objective of the networks being to maximize rewards by preventing compromises and minimizing network disruptions.</p><p>In this simulation, the attacker agents were programmed to use a subset of tactics and techniques from the <strong><a href="https://attack.mitre.org/tactics/enterprise/">MITRE ATT&amp;CK Framework</a></strong>, including seven (7) tactics and fifteen (15) techniques. The defender agents were equipped with twenty-three (23) mitigation actions to counteract the attackers' moves and contain the attack. The defender agent&#8217;s focus was not on preventing initial access, but instead, it was programmed to assume the attacker had already infiltrated the network (aka <em><a href="https://www.forbes.com/sites/forbestechcouncil/2022/04/13/why-every-cybersecurity-leader-should-assume-breach/?sh=2549e3fed434">assume breach</a></em>). This allowes the defender agent to focus on preventing further attack progression, such as lateral movement, execution, defense evasion, and exfiltration, among other tactics.</p><p>A bit more on how the two agents were programmed and trained: </p><ol><li><p><strong>The Adversary Model</strong> was designed to simulate the behavior of cyber attackers. It outlined a step-by-step progression from initial recon to its ultimate goal of causing negative impact to critical systems or extracting data (exfiltration). In this model, each successful technique executed by the attacker enabled them to advance to the next phase. <strong>The model was flexible and adapted its approach in response to the defensive tactics they encountered</strong>. Central to this model was the assumption that attackers must exploit vulnerabilities that are either yet to be discovered or cannot be patched to advance their attack. The model also accounted for the possibility of an attack being terminated if the attackers could not bypass effective defensive measures. In short, the adversarial model was highly intelligent and always considered the various forward paths available to it. </p></li><li><p><strong>The Defense Model&#8217;s</strong> main objective was to proactively prevent the attackers from achieving their impact or exfiltration goals while ensuring minimal disruption to legitimate system operations. This model emulated some challenges faced by defenders, such as the difficulty in predicting the attackers' next step and operating with imperfect or incomplete information. <strong>To address these challenges, the defense model incorporated the use of systems that monitor API calls to determine the attackers' current position within the network.</strong> The model was trained not to take this information at face value because it might not be entirely accurate or comprehensive as is similar to the real-world limitations of today. In short, the defender agent considered a number of key factors, including the fact that it may have an incomplete picture before making its next move. </p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!97Wr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!97Wr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png 424w, https://substackcdn.com/image/fetch/$s_!97Wr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png 848w, https://substackcdn.com/image/fetch/$s_!97Wr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png 1272w, https://substackcdn.com/image/fetch/$s_!97Wr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!97Wr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png" width="1262" height="420" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:420,&quot;width&quot;:1262,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Phishing \nReconnaissance/ \nInitial Access \nUser \nExecution \nExecution \nModify \nSystem \nProcess \nAutostart \nExecution \nPersistence \nModify \nRegistry \nDeploy \nContainer \nDefense \nEvasion \nAttack \nTerminated \nEncrypted \nChannel \nRemote \nAccess \nSoftware \nCommand \n&amp; Control \nAutomated \nData \nCollection \nMan-in- \nthe-browser \nCollection \nAutomated \nExfiltration \nData \nEncryption/ \nObstruction \nEndpoint \nDos \nImpact/Exfiltration &quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Phishing 
Reconnaissance/ 
Initial Access 
User 
Execution 
Execution 
Modify 
System 
Process 
Autostart 
Execution 
Persistence 
Modify 
Registry 
Deploy 
Container 
Defense 
Evasion 
Attack 
Terminated 
Encrypted 
Channel 
Remote 
Access 
Software 
Command 
&amp; Control 
Automated 
Data 
Collection 
Man-in- 
the-browser 
Collection 
Automated 
Exfiltration 
Data 
Encryption/ 
Obstruction 
Endpoint 
Dos 
Impact/Exfiltration " title="Phishing 
Reconnaissance/ 
Initial Access 
User 
Execution 
Execution 
Modify 
System 
Process 
Autostart 
Execution 
Persistence 
Modify 
Registry 
Deploy 
Container 
Defense 
Evasion 
Attack 
Terminated 
Encrypted 
Channel 
Remote 
Access 
Software 
Command 
&amp; Control 
Automated 
Data 
Collection 
Man-in- 
the-browser 
Collection 
Automated 
Exfiltration 
Data 
Encryption/ 
Obstruction 
Endpoint 
Dos 
Impact/Exfiltration " srcset="https://substackcdn.com/image/fetch/$s_!97Wr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png 424w, https://substackcdn.com/image/fetch/$s_!97Wr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png 848w, https://substackcdn.com/image/fetch/$s_!97Wr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png 1272w, https://substackcdn.com/image/fetch/$s_!97Wr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47aae4d4-cebf-4d85-9f34-190a7f324a06_1262x420.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Multi-stage attack propagation represented with MITRE ATT&amp;CK Tactics and Techniques. (Note: A directed edge between an attack tactic and technique specifies that the attacker may try to implement that technique next after achieving the objective of the attack tactic. Bidirectional arrow represents that Defense Evasion can come before Persistence.) Source: Deep Reinforcement Learning for Cyber System Defense under Dynamic Adversarial Uncertainties</figcaption></figure></div><p>The performance of the defender agent and the different DRL variants tested highlight that we&#8217;re getting closer to production-grade ACAs. The Deep Q-Network (DQN) variant of their agent performed best out of the 4 DRL algorithms they tested. For the least sophisticated attacks, <strong>DQN stopped 79% of attacks midway through the attack stages while stopping 93% by the final stage. It stopped 57% midway and 84% by the final stage for the most sophisticated attacks. </strong>These results are fairly astounding considering that most of today&#8217;s breaches would fall under the &#8220;least sophisticated&#8221; bucket, for which this ACA would stop 93% of attacks on which it was trained. I&#8217;m not sure how this compares to humans in the same scenario, but I&#8217;d assume that ACAs take the cake on this one.</p><p>Samrat Chatterjee of PNNL says that the team's goal is to "create an autonomous defense agent that can learn the most likely next step of an adversary, plan for it, and then respond in the best way to protect the system,&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> This sounds eerily similar to what the NATO RTG IST-152 described in their cyber warfare scenario in stopping malware from spreading. </p><p>The report concludes by stating that &#8220;future work will include developing DRL-based transfer learning approaches within dynamic environments for distributed multi-agent defense systems.&#8221; Given that these agents may be ephemeral and can be effectively neutralized by attackers, it makes a ton of sense for them to focus their next phases of research on real-time knowledge transfers between agents.</p><h2><strong>Looking Ahead</strong></h2><p>The world has changed a lot since the AICARA report came out in 2019, and there have been significant technological advancements since then, as evident by the PNNL research. Though purchasing a few ACAs for distinct use cases to augment your security teams may be 3-5 years away, it&#8217;s important to keep an eye on this space as it will truly change the cybersecurity landscape forever. I won&#8217;t enumerate them here, but the potential benefits are endless. However, we must also consider the adverse effects and how attackers may leverage such agents to carry out even more sophisticated attacks. </p><h3><strong>References</strong></h3><p>Below are my footnote references:</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>https://www.msspalert.com/news/email-cyberattacks-spiked-nearly-500-in-first-half-of-2023-acronis-reports</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>https://siliconangle.com/2023/08/15/new-reports-show-phishing-rise-getting-sophisticated/</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>https://apps.dtic.mil/sti/pdfs/AD1080471.pdf</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>https://cset.georgetown.edu/wp-content/uploads/Autonomous-Cyber-Defense-1.pdf</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>https://arxiv.org/pdf/2302.01595.pdf</p><p>https://github.com/Limmen/awesome-rl-for-cybersecurity</p></div></div>]]></content:encoded></item><item><title><![CDATA[💾 TCP Byte #4: 27 Things I've Learned Throughout My Career in Cybersecurity and Product ]]></title><description><![CDATA[I recently turned 27 years old which led me to pause and reflect on all I've learned in my years of living and more specifically, my time in the cybersecurity industry.]]></description><link>https://www.cybersecuritypulse.net/p/tcp-byte-4-27-things-ive-learned</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/tcp-byte-4-27-things-ive-learned</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Fri, 10 Nov 2023 16:02:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!34jc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!34jc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!34jc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png 424w, https://substackcdn.com/image/fetch/$s_!34jc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png 848w, https://substackcdn.com/image/fetch/$s_!34jc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png 1272w, https://substackcdn.com/image/fetch/$s_!34jc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!34jc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png" width="1085" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:608,&quot;width&quot;:1085,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!34jc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png 424w, https://substackcdn.com/image/fetch/$s_!34jc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png 848w, https://substackcdn.com/image/fetch/$s_!34jc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png 1272w, https://substackcdn.com/image/fetch/$s_!34jc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27e2aeba-4da1-4ed7-876f-f5587efb2ed9_1085x608.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">MidJourney.</figcaption></figure></div><p>I recently turned 27 years old which led me to pause and reflect on all I've learned in my years of living and more specifically, my time in the cybersecurity industry. I wanted to distill this into some of the things I&#8217;ve learned and advice I would give my younger self. Before we dive in though, here's a bit about me:</p><ul><li><p>I've spoken at 7-8 security conferences including DEF CON, fwd:cloudsec, Texas Cyber Summit, and Security Weekly Unlocked. I've attended probably ~50 more.</p></li><li><p>Thanks to internships, my network, and the dynamic nature of consulting, I've spent time as a red teamer, IoT blue teamer, cloud security consultant, security public policy, GRC, business continuity, detection engineering, and most recently, product management across a slew of industries.</p></li><li><p>I've dissected tens of thousands of security articles and research reports for fun, educational purposes, and the <strong><a href="https://www.cybersecuritypulse.net/">TCP newsletter</a></strong>. I've also worked at 9x RSA award-winning podcast, <strong><a href="https://www.scmagazine.com/security-weekly">Security Weekly</a></strong>.&nbsp; Shout out to Paul, Sam, Johnny, Tyler, Larry Et. Al.</p></li><li><p>I started the cybersecurity club at my uni and taught 60+ students how to use tools like Nmap, Wireshark, and coached them for 3 seasons for the National Cyber League (NCL) competition.</p></li><li><p>Certs. I have a few including the Certified Kubernetes Admin (CKA), Azure Security Engineer (AZ-500), HITRUST Certified CSF Practitioner (CCSFP), AWS CCP, CCSK, AZ-900, Security+, FEMA ICS-000100,&nbsp; and FEMA ICS-000200.</p></li><li><p>I've scaled the <strong><a href="https://www.cybersecuritypulse.net/">TCP newsletter</a></strong> to 1.7K+ subscribers in 9 months. You can subscribe below if you haven&#8217;t already.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p></li></ul><p>In short, I've seen a lot, done a lot, and have a few takeaways that can hopefully help you wherever you are in your journey whether you're a VC, CISO, GTM, practitioner, or someone looking to land a security role.</p><h1>The Cybersecurity Practice&#129399;</h1><ol><li><p>The hacker mentality is not something that only serves offensive security professionals. As a security practitioner, you have to be able to put yourself in the shoes of an attacker and understand how they may be able to infiltrate your environment, hide their traces, exfiltrate data, etc. For malicious actors, nothing's off the table so while the MITRE ATT&amp;CK Framework is awesome at providing an understanding of attacker tactics and techniques, it's not a catch-all. Use your creativity and curiosity especially when testing out detection hypothesis and threat modeling.</p></li><li><p>As a security practitioner, grasping your engineering and business counterparts' goals and language is essential. Deep knowledge of the industry, the applications you're building, architectural decisions, tech stack, etc. is crucial. Understanding each team's motivators enhances your role as a team player and leader, ultimately leading to better-informed risk-based decisions and increasing your value.</p></li><li><p>Becoming a strong security practitioner is not easy and there are no shortcuts. You must get the fundamentals down first and understand that if there's something you're avoiding to learn, it's almost certainly something you need to dissect and master. Otherwise, you're sabotaging your progress. For example, I avoided learning how to program for the longest which was 110% removed from being considered for tons of roles I applied for. On the other hand, I doubled down on cloud + Kubernetes security and it gave me an advantage.</p></li><li><p>Whether you're a red teamer or blue teamer, being resourceful and adaptable are superpowers. It's 2023. You have the power of Generative AI, web-based virtual labs, Google, YouTube, podcasts, newsletters, books, and direct access to industry leaders on X and LinkedIn. Nothing is off-limits. There's almost no excuse for what you should be able to learn and achieve.</p></li><li><p>Though you need not be a master of all security domains, it's crucial to understand their purpose and how they relate to each other. For example, understanding how identity and access management ties into endpoint, IaaS, PaaS, and SaaS security + the impact it has on the compliance frameworks that govern your organization. This is why GRC is a great starter role, it provides you with a bird&#8217;s eye view of how the different security domains make up the bigger picture.</p></li><li><p>Never take security findings from solutions for face value, especially if the app's logic is a black box and it's a serious issue. Go to the source of truth, the logs, the said-to-be-impacted system(s), and the systems that have access to those systems. Perform your root cause analysis before jumping the gun. Many products produce false positives especially as it pertains to reachability. An API may be flagged with a critical severity vulnerability but it lives within a segmented private network with strict access controls meaning only authorized services can communicate with it. With this context, you help prevent whiplash in your team and can coordinate a more appropriate response.</p><p></p><p>Products are getting better at providing context on reachability, exploitability, and impact but there will always be blind spots and as a security practitioner, it's key to live off the land.</p><p></p></li></ol><h1>The Cybersecurity Industry &#128188;</h1><ol><li><p>Most startups that have been formed over the past decade are nothing truly groundbreaking nor solve an entirely new problem. Most, not all, try to solve a problem better than an incumbent and if they're able to execute well, they can carve out enough market share to be successful.</p></li><li><p>While many vendors say they provide a "single pane of glass" across the security domains that their offerings cover, some, sadly, do not correlate the findings from those different sources to give the user a true, comprehensive view of their security posture. This is part of the reason why best-of-breed and data-driven security is continuing to become the favored security approach.</p></li><li><p>Security marketing has gotten better but it's still broken. Traditional marketing approaches that are fear-based do not work here and it's gotten a lot of vendors bad feelings in the community.</p></li><li><p>Our industry is different than most. For one, it's still fairly small compared to other industries and we also have a strong sense of community. CISOs, practitioners, and founders congregate amongst each other in private slack groups, cigar lounges, etc., and share their war stories, lessons learned, and talk about other things humans talk about. In short, reputation in this community is more important than in other communities, whether as an individual or as a vendor.</p></li><li><p>The best resources I know of for cybersecurity industry news and opinions are <strong><a href="https://www.scmagazine.com/security-weekly">Security Weekly</a></strong>, <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Venture in Security&quot;,&quot;id&quot;:746596,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/ventureinsecurity&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/86fcb772-b0a3-43e4-ab8c-33c6bfa2378f_1181x1181.png&quot;,&quot;uuid&quot;:&quot;a371524a-9651-465b-a466-cf1eee21113c&quot;}" data-component-name="MentionToDOM"></span>, <strong><a href="https://hackervalley.com/">Hacker Valley Media</a></strong>, and <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Resilient Cyber&quot;,&quot;id&quot;:1138747,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/resilientcyber&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/71894ea3-c231-4d31-90a9-414d75111d0e_1280x1280.png&quot;,&quot;uuid&quot;:&quot;283d707c-1639-43b1-8274-36ee436ba6d4&quot;}" data-component-name="MentionToDOM"></span> .</p></li><li><p>Paying large ticket prices for a booth at the major security conferences doesn't reap the same rewards that they used to. For startups, that money is much better invested elsewhere.</p></li><li><p>Data-driven security strategy is truly a game changer. IF implemented correctly, think about all of the possibilities that having all of your identity-related data funneled into one place and in a common model/schema can provide you. You can ask the most pinpointed questions, maintain a continuous pulse on posture via dashboards and metrics, and you can prime and leverage that dataset for unique AI/ML use cases.</p></li></ol><h1>The Cybersecurity Career &#128104;&#127997;&#8205;&#128187;</h1><ol><li><p>The best ROI I've gotten on my time and efforts while in security is attending conferences and being part of the security community and its micro-communities.</p></li><li><p>This probably goes without saying but for every new technology and underlying advancements, our industry will be the one that has to secure that technology. For career advancement, it's crucial to stay on top of the latest tech such as Gen AI, ML, Quantum, Data Science, etc.</p></li><li><p>You must give back as you learn and grow in your career. Our industry is small, understaffed, and changes every day. We need more practitioners and your knowledge + experience can help close this gap. Mentoring, sponsoring, and being active with non-profits are just some of the ways you can give back to those coming into our industry. It's also an extremely fulfilling pursuit.</p></li><li><p>Personal branding is icky but regardless of what you call it, you should somehow showcase your body of work whether it be on LinkedIn, Github, Substack, YouTube, etc. The sooner, the better.</p></li><li><p><strong><a href="https://www.oreilly.com/">O'Reilly Safari Learning Platform</a></strong> is the best $500 you can ever spend. Live courses, labs, 35k+ books, and videos on various topics. Next to this, is TryHackMe. Thank me later.</p></li><li><p>Build and break stuff. It's one thing to learn, it's an entirely different thing to do. When you do things repetitively, the grooves in your brain become deeper and it eventually becomes second nature. When you solely read or watch videos about things but don't actually do them or do them sparingly, that knowledge flees you soon and you won't be able to solve problems or speak about them as well as people who are doing them do.</p></li><li><p>Certs. They help especially depending on your learning style but after the first ~2 years of your security career, they rarely matter.</p></li></ol><h1>Building Products &#9874;&#65039;</h1><ol><li><p>Attention to even the smallest details is part of what makes a great product.</p></li><li><p>Your ability to influence leadership, engineering, and design is crucial. Use data, user feedback, and market intel to aid in your decision-making and influencing abilities.</p></li><li><p>Think about user journeys and jobs to be done by the respective user persona. It'll make things much clearer.</p></li><li><p>Day-to-day operations are a grind but never lose sight of the bigger picture and always make time to think about new features or enhancements that can give you an asymmetrical advantage in the market.</p></li></ol><h1>Life &#9203;</h1><ol><li><p>Health is wealth. You can bang out 60-80hr work weeks but nutrition, fitness, and mental stability should rarely fall on the back burner.&nbsp;</p></li><li><p>Life is short and can be gone tomorrow. Think about the people who passed suddenly. Think about how unexpected events like war and COVID-19 can severely limit what you can do for extended periods. Travel, take risks, spend time with the people you love, and do stuff that you've always wanted to do.</p></li><li><p>Self-confidence is everything. I know geniuses who lack it and have limited their opportunities and impact on the world because of it. Of course, be humble and understand emotional intelligence but never doubt yourself or your abilities to accomplish something. You should be your #1 supporter.</p><p></p></li></ol><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/tcp-byte-4-27-things-ive-learned?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/p/tcp-byte-4-27-things-ive-learned?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cybersecurity Pulse &#128421;&#65039; is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[💾 TCP Bytes #3: 7 Tips for Getting the Most out of Hacker Summer Camp.. or Any Conference Really ]]></title><description><![CDATA[Introduction]]></description><link>https://www.cybersecuritypulse.net/p/7-tips-for-getting-the-most-out-of</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/7-tips-for-getting-the-most-out-of</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Tue, 01 Aug 2023 12:02:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!v4Hi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v4Hi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v4Hi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg 424w, https://substackcdn.com/image/fetch/$s_!v4Hi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg 848w, https://substackcdn.com/image/fetch/$s_!v4Hi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!v4Hi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v4Hi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg" width="780" height="520" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:520,&quot;width&quot;:780,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AFCYBER presents, participates in DEF CON 27 > Air Combat Command ...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AFCYBER presents, participates in DEF CON 27 > Air Combat Command ..." title="AFCYBER presents, participates in DEF CON 27 > Air Combat Command ..." srcset="https://substackcdn.com/image/fetch/$s_!v4Hi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg 424w, https://substackcdn.com/image/fetch/$s_!v4Hi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg 848w, https://substackcdn.com/image/fetch/$s_!v4Hi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!v4Hi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8a23866-5a7d-4781-a15c-94de8e55ed22_780x520.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">DEF CON spectators and LEGOs. Source: acc.af.mil</figcaption></figure></div><h2><strong>Introduction</strong></h2><p>It's August 1st and for many of us in the security community, that means it's time for our annual trek to Las Vegas for "Hacker Summer Camp". A jam-packed week of four major cybersecurity conferences: <strong><a href="https://www.dianainitiative.org/">The Diana Initiative</a></strong>, <strong><a href="https://defcon.org/">DEF CON</a></strong>, <strong><a href="https://www.bsideslv.org/">BSides LV</a></strong>, and <strong><a href="https://www.blackhat.com/">BlackHat</a></strong>. If you&#8217;d like to learn how it all got started and what&#8217;s at the core of Hacker Summer Camp, check out this <strong><a href="https://www.youtube.com/watch?v=3ctQOmjQyYg&amp;pp=ygUSZGVmY29uIGRvY3VtZW50YXJ5">DEF CON documentary</a></strong>! </p><p>While each conference offers its own unique perspective and value, it's crucial to approach the week with intention. Whether you&#8217;re a founder looking to source leads and get product feedback, or you&#8217;re a student excited to learn about the latest security research, the key to maximizing your experience is having a solid game plan. </p><p>With this being my 5th time attending Hacker Summer Camp and having attended around 50 conferences in total, I believe I've gathered some insights that could help anyone&#8212;from a first-timer to a seasoned attendee&#8212;make the most of their conference experience. So without further ado, let's dive in!</p><h3><strong>Tip #1: Plan Ahead</strong> </h3><p>While BSides, the Diana Initiative, and BlackHat are held in a single venue, DEF CON is not. It&#8217;s spread across three venues with over 30K attendees in the sweltering summer Las Vegas heat. For each of these conferences, there are numerous talks, workshops, villages, parties, and other activities happening simultaneously. It&#8217;s easy to get FOMO, it&#8217;s easy to become socially drained, and it&#8217;s easy to feel lost and confused. All of this can be mitigated with a plan. <br><br>Review the schedule ahead of time and prioritize the sessions you want to attend. People are releasing cutting-edge research, tools and sharing confidential hacker stories. If you&#8217;re like me, there are some talks that you just can&#8217;t miss! Planning helps ensure that you don&#8217;t. Lastly, realize that you won&#8217;t be able to do it all and leave space for impromptu meetups, networking, and rest.</p><h2><strong>Tip #2: Carry Essential Gear</strong></h2><p>What to carry on your person varies on who you are and what you're keen on doing at the conference. I always make sure to carry a backpack with a few essentials including my laptop, a notebook, pens, light snacks, a battery pack, and device chargers. I also make sure to wear comfortable clothes and shoes. Most importantly, I always keep a refillable water bottle. Staying hydrated is key, especially in the dry Las Vegas desert. </p><h2><strong>Tip #3: Network</strong> </h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zHxZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zHxZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif 424w, https://substackcdn.com/image/fetch/$s_!zHxZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif 848w, https://substackcdn.com/image/fetch/$s_!zHxZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif 1272w, https://substackcdn.com/image/fetch/$s_!zHxZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zHxZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif" width="1456" height="1285" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1285,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:7487760,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/tiff&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zHxZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif 424w, https://substackcdn.com/image/fetch/$s_!zHxZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif 848w, https://substackcdn.com/image/fetch/$s_!zHxZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif 1272w, https://substackcdn.com/image/fetch/$s_!zHxZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddb7278f-ea5d-4028-b1af-96bed0c50dfb.tif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Roger Dingledine, one of the co-founders of the Tor project, and I at my first DEF CON in 2017.</figcaption></figure></div><p>In today&#8217;s remote-first work environment, we very sparingly get the opportunity to connect with like-minded people in person so don't be shy about introducing yourself to others.  Exchange ideas, discuss the latest trends in cybersecurity, ask the presenter questions, go out for dinner with a group, go to networking events, etc. You never know, you might meet your business partner, future employer, or mentor at DEF CON. If you&#8217;re an introvert, check out <strong><a href="https://hbr.org/2015/10/how-introverts-can-make-the-most-of-conferences">this post</a></strong> for more tips.</p><h2><strong>Tip #4: Buddy Up</strong></h2><p>Hacker Summer Camp can be a whirlwind, especially for newcomers. Having a buddy along for the ride &#8211; someone to grab a meal with, check out talks, or explore events &#8211; can really elevate the whole experience. It's about enjoying good company, feeling safe in the Las Vegas madness, and sharing those memorable 'aha!' moments. On the flip side, if you see someone roaming alone that looks lost, don&#8217;t be afraid to strike up a conversation and ask if they need any help. Again, summer camp can get overwhelming and if you can help others out, please do. This is the core of the buddy system for me.</p><h2><strong>Tip #5: Explore Vendor Areas</strong></h2><p>Take time to visit the vendor areas. I know that it can be super salesy with people jumping at you from seemingly every booth to scan your badge but It's a great opportunity to learn about innovative cybersecurity products and tools. You can guarantee yourself that you&#8217;ll meet great people, pick up some nice swag, and my favorite of all, score some discounts on <strong><a href="https://nostarch.com/">NoStarchPress</a></strong> books @ DEF CON :) </p><h2><strong>Tip #6: Explore Beyond the Conferences </strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-Z-u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-Z-u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-Z-u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-Z-u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-Z-u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-Z-u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Las Vegas' Most Expensive Sports Venue: MSG Sphere&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Las Vegas' Most Expensive Sports Venue: MSG Sphere" title="Las Vegas' Most Expensive Sports Venue: MSG Sphere" srcset="https://substackcdn.com/image/fetch/$s_!-Z-u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-Z-u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-Z-u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-Z-u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08f7ff9-56d1-4508-95e9-6b7d094342fa_1500x1000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The Las Vegas Sphere, at night. Source: frontofficesports.com</figcaption></figure></div><p>If you have the time, check out what Las Vegas has to offer. My personal favorites are visiting Omega Mart in <strong><a href="https://area15.com/">Area 15</a></strong> and fitting in a trip to the spa for some decompression. This year, I&#8217;m really looking forward to seeing <strong><a href="https://ftw.usatoday.com/2023/07/videos-inside-the-las-vegas-sphere">The Sphere</a></strong> light up at night. </p><h2><strong>Tip #7: Follow the Code of Conduct</strong></h2><p>While yes, there&#8217;s a lot of fun to be had at Hacker Summer Camp, people should always follow the code of conduct for each conference. DEF CON, for example, has a strong community ethos and <strong><a href="https://defcon.org/html/links/dc-code-of-conduct.html">a code of conduct</a></strong> that attendees are expected to follow. They have goons who enforce these policies with a stiff hand. At the core of their code of conduct is respect for others' privacy and a commitment to creating a harassment-free environment. Simply put, don&#8217;t be an asshole. </p><h2><strong>Bonus: Arsenal and DEF CON Villages</strong></h2><p>BlackHat Arsenal is where researchers and the open-source community release and showcase their latest open-source tools and products in an interactive way. This is a great opportunity to learn about new tools, meet the creators, and see the tools in action. Learn more about <strong><a href="https://www.blackhat.com/us-23/arsenal-overview.html">BlackHat Arsenal here</a>.</strong><br><br>While the DEF CON main tracks have amazing talks that often make the news headlines, I think the magic really happens in the villages. There are 20+ villages that span a variety of industries and technologies, you can find the <strong><a href="https://defcon.outel.org/dcwp/dc31/activities/villages-list/">full list here</a></strong>. <br><br>This year I&#8217;m really looking forward to the AI hacking event at the AI Village. Anthropic, Google, HuggingFace, Meta, NVIDIA, OpenAI, and Stability, have all provided models for some of the world&#8217;s top red teamers and pen testers to attack and find vulnerabilities. <strong>This will be the largest AI red team effort ever</strong> and there will be observers from the White House, NIST, NSF, and the EU. I&#8217;m really looking forward to this one.</p><h2><strong>Conclusion</strong></h2><p>Prepping for Hacker Summer Camp can be exhilarating and overwhelming at the same time. There&#8217;s so much to learn, do, see, and experience and if you go in without a plan, you may not get the most out of the experience. That said, do your research, pack well, and get out of your comfort zone! I&#8217;ll be in town just for DEF CON this year so if you see me, come say hello! </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cybersecurity Pulse &#128421;&#65039; is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cybersecurity Pulse &#128421;&#65039; is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cybersecurity Pulse &#128421;&#65039; is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cybersecurity Pulse &#128421;&#65039; is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[💾 TCP Bytes #2: The Security Practitioner's Wish List: 14 Essential Characteristics of an Outstanding Security Product]]></title><description><![CDATA[Howdy!]]></description><link>https://www.cybersecuritypulse.net/p/the-security-practitioners-wish-list</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/the-security-practitioners-wish-list</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Wed, 12 Jul 2023 14:57:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vRic!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Howdy! Welcome to <strong>The Cybersecurity Pulse</strong> &#128421;&#65039;! It&#8217;s been a while since our last release but the gears are starting to turn and we will be back with our weekly programming very soon :) If you enjoy staying up to date on all the innovations occurring in the cybersecurity space, go ahead and click the subscribe button below and we&#8217;ll take care of the rest.  </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vRic!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vRic!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png 424w, https://substackcdn.com/image/fetch/$s_!vRic!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png 848w, https://substackcdn.com/image/fetch/$s_!vRic!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png 1272w, https://substackcdn.com/image/fetch/$s_!vRic!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vRic!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png" width="1200" height="672.5274725274726" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:1924900,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vRic!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png 424w, https://substackcdn.com/image/fetch/$s_!vRic!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png 848w, https://substackcdn.com/image/fetch/$s_!vRic!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png 1272w, https://substackcdn.com/image/fetch/$s_!vRic!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292b4780-262e-4dc2-96db-edf935fe6c5d_1456x816.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Midjourney - An astronaut floating through space avoiding asteroids while holding a laptop.</figcaption></figure></div><h2>Table of Contents &#128218;</h2><ul><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/introduction">Introduction</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/intelligent-security-issue-management">Intelligent Security Issue Management</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/user-experience">User Experience</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/case-management">Case Management</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/onboarding">Onboarding</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/integrations">Integrations</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/comprehensive-coverage">Comprehensive Coverage</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/scalability">Scalability </a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/user-community">User Community </a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/documentation">Documentation</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/customizability">Customizability</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/automation">Automation</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/collaboration">Collaboration</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/security-and-privacy">Security and Privacy</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/pricing-transparency">Pricing Transparency</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/133009672/conclusion">Conclusion</a></strong></p></li></ul><h2>Introduction</h2><p>Security teams often find themselves drowning in security alerts and issues across a slew of products while struggling to identify what should be prioritized. We hear it all the time and many of us have experienced it. This often leads to serious risks going unaddressed for months until the inevitable breach happens. While factors like understaffing and burnout certainly contribute, I&#8217;d say that a significant amount of this thrash stems from security products that overpromise and underdeliver, failing to provide the robust support that teams critically need. In my opinion, the best security products not only tackle their designated challenges but also function as force multipliers, effectively serving as a crucial "<strong><a href="https://www.sportslingo.com/sports-glossary/s/sixth-man/">Sixth man/woman</a></strong>" on the team.</p><p>In my journey as a security practitioner and consultant, I&#8217;ve been at the forefront of onboarding, fine-tuning, and operationalizing a variety of security tools across a broad spectrum of environments. From highly regulated environments to large-scale greenfield environments, I&#8217;ve worked with CSPMs, SIEMs, firewalls, container runtime, and K8s network security solutions. This has allowed me to develop a solid filter (hopefully) on what separates great security products from mediocre ones.</p><p>In this post, I'll highlight the top 14 features, capabilities, and characteristics that I consider crucial in security products. A few caveats before we kick off though, this isn&#8217;t a one-size-fits-all list. Security products serve diverse purposes; comparing a SIEM to a firewall is like comparing apples and oranges. Also, this list is filtered through my lens, shaped by my 6 years in the industry. These are the qualities that, in my experience, distinguish the security products that security practitioners love from the ones that they merely tolerate. My goal with this post is to provide founders, product managers, and others in the security product realm with insight into what security practitioners need from their products. Without further ado, let&#8217;s dive into the list! </p><blockquote><p><strong>Note:</strong> Security issues is a catch all term that includes alerts, vulnerabilities, findings, misconfigurations and more. </p></blockquote><h2>Intelligent Security Issue Management</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_fW0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_fW0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_fW0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_fW0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_fW0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_fW0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg" width="1120" height="586" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:586,&quot;width&quot;:1120,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Impact of Runtime Context on Vulnerability Severity&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Impact of Runtime Context on Vulnerability Severity" title="Impact of Runtime Context on Vulnerability Severity" srcset="https://substackcdn.com/image/fetch/$s_!_fW0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_fW0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_fW0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_fW0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57649d34-f070-4c03-904a-f84db9038397_1120x586.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>Source:</strong> <a href="https://www.datadoghq.com/state-of-application-security/">Datadog 2023 State of Application Security Report</a></figcaption></figure></div><p>Not all security issues are the same. Only a small fraction of them pose significant risks to production environments and/or sensitive data. The <strong><a href="https://www.datadoghq.com/state-of-application-security/">Datadog 2023 State of Application Security Report</a></strong> actually found that only 3% of critical vulnerabilities were worth prioritizing. Having a solution that does the leg work of deciphering what's worth prioritizing and actioning makes all the difference in the world. Not only does it save security teams an inordinate amount of time but it also enables them to zero in on and remediate actual risks and threats. A security product with an in-depth contextual understanding of an environment can be a force multiplier, enabling security teams to focus on keeping the organization out of the news.</p><p>Different security products aid in prioritization in various ways, depending on their nature. Examples include:</p><ul><li><p>Asset relationship graphs</p></li><li><p>Ingesting key metadata from the cloud provider such as resource tags</p></li><li><p>Conditional logic rules and alerts such as <strong><a href="https://www.splunk.com/en_us/blog/security/risk-based-alerting-the-new-frontier-for-siem.html">Splunk's risk-based alerting</a></strong> (RBA) or <strong><a href="https://www.wiz.io/product">Wiz's Toxic Combinations</a></strong></p></li></ul><h2>User Experience</h2><p>I've dealt with products with great user experience (UX) and ones with horrendous UX. The latter often consists of clunky design that requires lots of clicking around to find the information that I'm looking for or even worse, it's hidden in plain sight amongst a cluttered dashboard.</p><p>Regardless of what kind of security product we're talking about, it's easy to know what information and functionality users need from a product. Whether it's a CSPM, DSPM, KSPM, ZTSPM, or LLMSPM, it doesn't matter, <strong>the product should aim to surface the most crucial details for a security issue in a simple fashion while providing options to resolve the issue. </strong></p><p>Below are some considerations that I think about when assessing the UX of a security product:</p><ul><li><p>Is it easy to action/remediate security issues? I.e., Can I click a hotlink that will bring me over to the cloud provider and show me the resource that is at risk?</p></li><li><p>Can I share alerts, findings, and issues with my teammates?</p></li><li><p>Integrations. How easy is it to create a Jira ticket or Slack message? Does it take 1-2 clicks or 7?</p></li><li><p>Is the product presenting irrelevant or excessive information or is it summarizing and surfacing the important details that I need to address the security issue?</p></li><li><p>A great filtering experience</p></li></ul><h2>Case Management</h2><p>This one is pretty straightforward. Can users assign the finding to a teammate within the app? Can notes and status updates be added to the living security issue? Can you mark the issue as remediated? What&#8217;s the security issue lifecycle look like? </p><p>Sure, many organizations use ticketing systems like Jira or ServiceNow to achieve much of this but that requires pivoting and maintaining status across to platforms which is inefficient. If you can provide some of this functionality in-app, you save users time, headaches and aid with the remediation phase of the lifecycle. I haven&#8217;t used Cortex XSOAR in 2-3 years but it&#8217;s one product I can think of that really nailed case management. I particularly loved the <strong><a href="https://www.paloaltonetworks.com/blog/security-operations/simplify-case-management-using-cortex-xsoar/">ChatOps feature</a></strong>.<br><br>The reason why I have this functionality so high on the list is that I can't tell you the number of times I've seen security issues unresolved for weeks because one team has to get approval from another stakeholder because the remediation may impact production and by the time the next meeting comes around, nothing has been resolved and there&#8217;s another fire to put out. This happens more than you think and if a security product can do even just a smidge to mitigate this then that's a big win.</p><h2>Onboarding</h2><p>I once had a very crappy on-boarding experience with a Kubernetes network security solution and it drove me crazy. The documentation was unformatted and outdated which led to me reaching out to the product manager every other day. To cut them some slack, the solution was recently ingested through an acquisition but there is no reason that the end user, me, should have felt the thrash. </p><p>While product demos are the first impression that users get, onboarding and implementation are where the rubber really meets the road. If there are significant issues in these first few steps then the product is taking away time that practitioners could be using focusing on true security efforts and this inevitably leaves a bad taste in the user&#8217;s mouth. </p><h2>Integrations </h2><p>Security products should support integration with an organization's existing tech stack. In a world where the <strong><a href="https://www.statista.com/statistics/1233538/average-number-saas-apps-yearly/">average organization leverages 100+ SaaS solutions</a></strong>, the modern security team is forced to lock down and monitor a myriad of apps and infrastructure. The last thing a security practitioner wants is for a product to exist in a silo to the point where we have to build custom API solutions to get the data we need where we need it then properly format it and ensure that the data is getting there as comprehensively and quickly as possible. We expect out-of-the-box integrations and functionality that remove the need of having to engineer custom solutions. Supported integrations should include ticketing systems, data lakes, and best-of-breed security solutions.</p><h2>Comprehensive Coverage</h2><p>Many solutions lack comprehensive coverage and support for the not-so-common or newly released cloud services. Examples include AI/ML, IoT, and data-focused services such <strong><a href="https://aws.amazon.com/security-lake/">Amazon Security Lake</a></strong> or the <strong><a href="https://learn.microsoft.com/en-us/legal/cognitive-services/openai/data-privacy">Azure OpenAI service</a></strong>. These services are being used in many production environments today but I would bet that a majority of security solutions are not providing coverage for them. This creates a blind spot that leaves security teams to have to come up with alternatives. </p><p>While comprehensive threat and risk coverage for critical services like computing, storage, and networking is essential, I believe there are several other service types that equally warrant in-depth protection.</p><h2>Scalability</h2><p>Isn&#8217;t it lovely when you onboard a product on one AWS Account or Azure Subscription and everything is working fine and dandy but then you implement it across your entire multi-cloud estate and begin having latency issues? Or even better, the data displayed in the product is incomplete or inaccurate? <br><br>I&#8217;ve experienced this in the past and it led to a wild goose hunt with the product team which is the last thing security practitioners need. I can imagine that this has caused a number of issues for incident response teams in the past, specifically when they&#8217;re not able to find the logs for a certain timeframe. Please don&#8217;t be this vendor! Stress test your stuff in as many ways as possible to ensure that it is battle ready. </p><h2>User Community</h2><p>Another key factor that I look for from a security product, and am thrilled when I find it, is a thriving user community.  This often looks like active public community forums with support and engagement from the product&#8217;s support team. These forums are often found on Reddit, GitHub, StackOverflow or are hosted on the company site. </p><p>I can&#8217;t tell you the amount of joy I get when I run into an issue and find a forum where someone else had the same issue, and the solution is made public for all to see. I also think this aspect is key for product managers because it allows them to identify where users&#8217; biggest and most common pain points are.</p><h2>Documentation</h2><p>This one goes hand in hand with the section above but goes beyond it. Ensuring that product-related documentation and instructions are always maintained up to date is crucial. Having product training materials and how-to videos is the cherry on top as it often removes the need for users to reach out to their point of contact within the vendor organization or from having to figure it out on their own. </p><h2>Customizability</h2><p>Customizability is one of those characteristics that can make or break the product experience for a practitioner. Are users stuck with only out-of-the-box functionality or can we build our own dashboards, detection rules, data connectors, etc.? </p><p>Every environment is different and will have unique use cases that the product team may have not identified or solved for yet. If security practitioners aren&#8217;t able to solve for that edge case themselves, they will inevitably be pulled toward a product that will allow them to. </p><p>Lastly, having the capability to create our own dashboards and graphs based on our own parameters is crucial. If security leadership or an auditor wants to see how many issues we&#8217;ve remediated in the EU regions over the past 3 months, then we should be able to answer this via a customizable dashboard in minutes.</p><h2>Automation</h2><p>This should be a table-stakes feature for any security product looking to be successful in today&#8217;s saturated and hyper-competitive security landscape. Automation should be sprinkled across the user journey whether it&#8217;s automated threat response/containment, being able to auto-remediate a batch of security misconfigurations, or automagically detecting anomalous activity that deviates from a continuously auto-recorded baseline. Automation saves time and if a product requires tons of manual labor to get value from it then security practitioners will find another way to solve their challenges. </p><h2>Collaboration </h2><p>Some of the best security products that I&#8217;ve worked with enable collaboration between and across teams. For example, they allow users to save and securely share threat-hunting queries and their results with teammates. They also have great exporting and reporting options such as Excel spreadsheets with raw data, streaming data via API, or a prettified PDF that is presentable in meetings. The latter is key because it helps with reporting status and assigning security issues across teams that may not have access to the product. It also gives users the flexibility to work with the data programmatically.</p><h2>Security and Privacy</h2><p>Not so long ago it was commonplace for security products to require admin-level permissions to properly operate in an environment. After a few security incidents and tons of shaming from the security community, most vendors no longer require these excessive permissions that they didn&#8217;t need in the first place. However, there are still a few vendors out there that do and you&#8217;ll probably see them getting roasted on Twitter, BlueSky, Threads, or whatever the kids are using these days. </p><p>At the end of the day, a security product should be helping organizations become more secure, not less. This means they should have fine-grained access controls, require limited permissions, employ data encryption, provide audit logs, and should comply with required standards and regulations such as SOC 2, HIPAA, or whatever else is applicable.</p><h2>Pricing Transparency</h2><p>This is especially important given the economic times we find ourselves in. Pricing should be clear and easy to find. I shouldn&#8217;t have to contact sales or go through an extensive Q&amp;A just to get pricing. The pricing breakdown should also have a clear delineation of what features and levels of support are provided for each pricing tier. </p><h2>Conclusion</h2><p>In summary, today's security teams need products that act as force multipliers in their ever-evolving complex environments. The standout features of the best security products include intelligent issue management, a user-friendly interface, smooth onboarding, wide-ranging integrations, scalability, robust community support, customizability, automation, collaboration capabilities, strong security and privacy, and transparent pricing. These are necessities, not &#8220;nice to haves&#8221;. In conclusion, it's time to redefine our expectations of security products. We need to push for tools that are more than just features on a checklist, but rather smart, intuitive partners in defense that help bridge the security gap we&#8217;ve been experiencing for decades.</p>]]></content:encoded></item><item><title><![CDATA[Demystifying the Generative AI and LLM Buzz in Security Products: The Future or Just Grains of Salt?]]></title><description><![CDATA[A deep dive into recent implementations of Generative AI and use of LLMs for security products and a peak into the future.]]></description><link>https://www.cybersecuritypulse.net/p/demystifying-the-generative-ai-and</link><guid isPermaLink="false">https://www.cybersecuritypulse.net/p/demystifying-the-generative-ai-and</guid><dc:creator><![CDATA[Darwin Salazar]]></dc:creator><pubDate>Tue, 23 May 2023 13:06:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Hbco!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to <strong>The Cybersecurity Pulse</strong> &#128421;&#65039;! Before we dive into the exciting stuff, why not subscribe? I run <strong><a href="https://www.cybersecuritypulse.net/s/innovation-pulse">a newsletter</a></strong><a href="https://www.cybersecuritypulse.net/s/innovation-pulse"> </a>that brings you the latest from the crossroads of innovation and cybersecurity, and I also maintain an <strong><a href="https://www.cybersecuritypulse.net/p/intel-hub">Intelligence Hub</a></strong> filled with curated research and data points about the industry. Your subscription tells me that what I'm writing resonates with you and adds value to your day. Your support goes a long way!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><h2>Table of Contents &#128218;</h2><ul><li><p><strong><a href="https://www.cybersecuritypulse.net/i/121316231/introduction">Introduction</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/121316231/setting-the-stage">Context</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/121316231/themes">Themes</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/121316231/real-world-use-cases-and-implementations">Security Vendor Use Cases</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/121316231/cloud-provider-implementations">Cloud Provider Implementations</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/121316231/other-use-cases-to-consider">Additional Use Cases to Consider</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/121316231/metrics">Metrics</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritypulse.net/i/121316231/conclusion">Conclusion</a></strong></p></li></ul><div><hr></div><h2>Introduction </h2><p>Over the past several months, the generative AI hype train has spiraled out of control across every industry it seems. In the cybersecurity industry, this has manifested in an influx of vendors and cloud providers harnessing Large Language Models (LLMs) like ChatGPT, and even developing their own LLMs (i.e., <strong><a href="https://venturebeat.com/security/google-releases-security-llm-at-rsac-to-rival-microsofts-gpt-4-based-copilot/">Google Sec-PaLM LLM</a></strong> and <strong><a href="https://venturebeat.com/security/bigid-launches-bigai-a-privacy-by-design-llm-designed-to-discover-data/">BigID&#8217;s BigAI</a></strong>). Although these implementations aren't a silver bullet, they&#8217;ve become promising as force multipliers, increasing operational speed and efficiency, enhancing threat and incident response, identifying vulnerabilities in code, and more.  However, we're merely at the dawn of this transformative journey, and it's natural that there is skepticism among the security community, especially after generative AI seemed to steal the show at RSA. We must remember that <strong>no single technology is a panacea</strong>, and the complexity of cybersecurity still demands significant human intervention. </p><p>In this post, we&#8217;ll navigate the themes and different use cases seen in recent implementations of generative AI and the use of language models in security products. This post aims to demystify the recent uptick of generative AI implementations in security products while providing you with a mental framework on how to evaluate the significance of these solutions and whether they can help your organization out.</p><p>In a follow-up post, I&#8217;ll be covering the promising potential of custom in-house autonomous security agents. Now let&#8217;s get onto the fun! <br></p><div><hr></div><h2>Setting the Stage</h2><p>AI and Machine Learning (ML) have been part of the cybersecurity landscape for a while, with early implementations like <strong><a href="https://www.cisco.com/c/en/us/about/corporate-strategy-office/acquisitions/cognitivesecurity.html">Cognitive Security</a></strong>'s behavioral analysis tool dating back to 2013. However, it's been challenging to separate the wheat from the chaff, with some vendors making lofty claims about their AI-powered solutions. This has understandably led to some skepticism in the industry.</p><p>Despite our inherent skepticism of security vendors as security practitioners, the recent surge in generative AI applications in security solutions is encouraging. And while no single security solution will ever be a cure-all, there are several tools that can boost security posture and enable teams to work more efficiently and confidently. </p><div><hr></div><h3>Commonly Used Terms</h3><ul><li><p><strong>Generative AI</strong>: This subset of artificial intelligence uses machine learning techniques to create new content. It can generate text, images, or sounds that mirror the data it was trained on. <strong>In the context of cybersecurity, Generative AI can be used to simulate cyber attacks for testing purposes or to generate phishing emails for training exercises.</strong> </p></li><li><p><strong>Large Language Model (LLM)</strong>: This is a specialized form of generative AI that's trained on extensive text and code datasets. Language models (LMs) can understand, summarize, generate, and predict content. In cybersecurity products, LMs can be used to analyze and predict potential security threats based on patterns in large datasets. <strong>For example, they can help identify suspicious activities or behaviors by analyzing network traffic or system logs</strong>.</p></li></ul><div><hr></div><h3>Criteria </h3><p>There are endless ways in which a security solution can leverage AI, therefore, it's essential to discern the type of AI at play. The focus of this post is on generative AI, but how do we distinguish it from other types of AI? Here's the lens we'll use:</p><ol><li><p><strong>Content Generation:</strong> If the product generates new content, it's likely using generative AI.</p></li><li><p><strong>Data Analysis:</strong> If the product solely analyzes data for pattern identification, correlation, and/or predictive analytics, it's likely using another form of AI.</p></li><li><p><strong>Functionality:</strong> If the product is primarily creating content such as generating phishing emails for training, simulating cyber attacks for testing, crafting detailed incident reports, or even translating natural language commands into executable code, it's likely using generative AI. If it's primarily analyzing data, identifying potential threats, or making decisions based on data analysis, it's likely using another form of AI.</p></li></ol><p>For example, <strong><a href="https://siliconangle.com/2023/04/20/dataminr-ai-cybersecurity-offering-provides-actionable-intelligence-real-time-risks/">Dataminr's Pulse for Cyber Risk</a></strong> service uses deep learning and real-time detection models to analyze a wide range of data formats, including text, image, video, sound, and sensor data. It can understand text in over 150 languages, recognize images and logos, process audio, and detect anomalies. Their solution focuses on physical and cyber threats. Impressive, right? However, this isn't generative AI. The type of AI leveraged here is more about gathering, analyzing, and correlating existing data. Generative AI might create new threat scenarios based on analyzed data or write detailed reports summarizing detected threats. </p><p>This is the kind of scrutiny I applied when looking at security products claiming to use generative AI. This is the approach I used to identify the themes and use cases discussed in this post.</p><div><hr></div><h2>Themes</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hbco!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hbco!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Hbco!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Hbco!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Hbco!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hbco!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:725823,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Hbco!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Hbco!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Hbco!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Hbco!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb0d046d-f1c6-476e-9e18-fd414425cac1_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In this section, we'll explore the five key themes that have emerged in the integration of generative AI into security products. <strong>Themes</strong> are the broad areas where AI can make a significant impact. Within each theme, there are specific <strong>use cases</strong> - these are the actual real-world applications where we can leverage generative AI to solve real security challenges. Think of the themes as the big picture strategies, and the use cases as the specific tactics used to achieve those strategies and objectives.</p><h4><strong>Summarizers, Explainers, and Advisors</strong></h4><p>Generative AI and LLMs can be used to provide concise summaries, detailed explanations, and expert advice. This can greatly enhance the efficiency and effectiveness of incident response and vulnerability management.</p><ul><li><p><strong>Incident Response Post-mortems</strong>: Generative AI can analyze the details of a security incident and generate a concise, easy-to-understand summary of what happened, why it happened, and what the impact was. It can also suggest remediation steps and preventative measures to avoid similar incidents in the future.</p></li><li><p><strong>Vulnerability Explanation and Remediation Step Advisor</strong>: Generative AI can provide detailed explanations of identified vulnerabilities, including their potential impact and the conditions that make a system susceptible to them. Furthermore, it can suggest the most effective steps to remediate a vulnerability, taking into account the specific context and constraints of the situation. This dual role of explaining and advising makes it a powerful tool in vulnerability management.</p></li></ul><h4><strong>Natural Language Processing (NLP) to Code Generation</strong></h4><p>Generative AI can translate natural language (plain text) commands or descriptions into executable code, streamlining the implementation of security policies and enhancing threat detection.</p><ul><li><p><strong>Policy Enforcement</strong>: Generative AI can generate code to enforce specified security policies, translating human-readable policy descriptions into machine-executable code.</p></li><li><p><strong>Threat Detection Rule and Query Generators</strong>: Generative AI can generate rules and queries for threat detection systems based on natural language descriptions of threats, improving the speed and accuracy of threat detection.</p></li></ul><h4>Code Review and Vulnerability Detection</h4><p>Generative AI can scrutinize source code to identify potential vulnerabilities, bugs, or violations of coding standards, enhancing the security and quality of software.</p><ul><li><p><strong>Bug Detection</strong>: Generative AI can analyze code to find bugs that might have been overlooked during manual code reviews. It can also generate suggestions for bug fixes, improving overall code quality.</p></li><li><p><strong>Vulnerability Identification</strong>: Generative AI can scan code to identify potential vulnerabilities and generate patches or suggest modifications to rectify these vulnerabilities.</p></li></ul><h4><strong>Reverse Engineering</strong></h4><p>Generative AI can be used to deconstruct and analyze compiled code or hardware, often in the context of malware analysis. It can generate detailed reports on how a piece of malware functions and how to defend against it.</p><ul><li><p><strong>Malware Analysis</strong>: Generative AI can analyze malware to understand its functionality, identify its command and control servers, and determine its impact. It can also generate remediation strategies, helping to develop effective defenses.</p></li></ul><h4><strong>Prioritization</strong></h4><p>Generative AI can analyze large volumes of data to identify the most important issues or threats, generating detailed reports that help security teams focus their efforts where they're most needed.</p><ul><li><p><strong>Data and Log Sifting</strong>: Generative AI can analyze large volumes of logs and other data to identify potential threats or anomalies. It can generate alerts or reports that highlight these potential threats, effectively finding the "needle in the haystack."</p></li><li><p><strong>Vulnerability and Patch Management Prioritization</strong>: Generative AI can assess the severity and potential impact of identified vulnerabilities, generating prioritized lists of issues to address and patches to apply.</p></li></ul><div><hr></div><h2>Real-World Use Cases &amp; Implementations</h2><p>The use cases below showcase the applications of generative AI and LLMs in cybersecurity and align with the key themes identified. However, this isn't an exhaustive list. Also, I'm not affiliated with any of these vendors, nor have I tested all of these solutions. <strong>This overview is to illustrate real-world applications, not to endorse specific products.</strong> </p><p>When evaluating AI security solutions (or any solution), you should be critical of the robustness of the solution. Ask the vendor questions about accuracy, memory recall, data training and model quality, regulatory compliance, scalability, integration, compatibility, etc. This will help you root out the weaker contenders and identify solutions that leverage robust AI practices to solve real-world security challenges.</p><p>As with any security solution you onboard, you&#8217;ll want to continuously validate the findings and alerts to test the quality and accuracy of the solution. You&#8217;ll also want to ensure that your security teams have the knowledge and skills needed to get the highest ROI possible out of the solution. Now, let&#8217;s take a look at some use cases! </p><h3>Threat Detection and Analysis</h3><p>Generative AI and LLMs can be trained to understand and predict patterns in network traffic or user behavior. By processing vast amounts of data, they can identify unusual patterns, potential threats, or breaches, often more quickly and accurately than traditional methods. They can also generate reports on potential threats, explaining their potential impacts and suggesting mitigation strategies. This falls under the themes of <em>Summarizers, Explainers</em>, <em>and Advisors</em>, <em>NLP to Code Generation</em>, and <em>Prioritization</em>.</p><h4><strong>SentinelOne</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BPWN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BPWN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BPWN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BPWN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BPWN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BPWN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg" width="727.9971313476562" height="283.4988828805777" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:567,&quot;width&quot;:1456,&quot;resizeWidth&quot;:727.9971313476562,&quot;bytes&quot;:262778,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BPWN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BPWN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BPWN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BPWN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e0eff03-3e2e-4ed2-a1ad-3b2365bc752e_1909x744.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong><a href="https://www.sentinelone.com/">SentinelOne</a></strong> demonstrates AI-powered threat hunting with their release of Purple AI. It enables analysts to use prompts such as &#8220;Is my environment infected with SmoothOperator?&#8221;, or &#8220;Do I have any indicators of SmoothOperator on my endpoints?&#8221; to hunt for activity and Indicators of Compromise (IoC) related to a specific named threat. You can read more about their implementation in this <strong><a href="https://www.sentinelone.com/blog/purple-ai-empowering-cybersecurity-analysts-with-ai-driven-threat-hunting-analysis-response/">article</a></strong>.</p></li></ul><p><strong>Nozomi Networks</strong></p><ul><li><p><strong><a href="https://www.nozominetworks.com/">Nozomi Networks</a></strong> has implemented AI-powered insights with an Insights Dashboard where alerts are automatically correlated, prioritized, and supported with root-cause information. They also offer AI-based queries and analyses, allowing users to leverage natural language queries and get answers to common questions about vulnerabilities, network assets, and other environmental details. Advanced predictive monitoring provides early warnings about system behaviors that deviate from the norm. You can read more about their implementation in this <strong><a href="https://www.msspalert.com/cybersecurity-services-and-products/nozomi-networks-unveils-ai-powered-cybersecurity-analysis-response-engine/">article</a></strong>.</p></li></ul><h3>Software Supply Chain Security</h3><p>Generative AI and LLMs can be used to read and understand software code, potentially identifying areas of vulnerability that human analysts might miss. They can also generate patches or suggest modifications to rectify these vulnerabilities. This falls under the themes of <em>Code Review and Vulnerability Detection</em> and <em>Prioritization</em>.</p><h4><strong>Veracode</strong></h4><p><strong><a href="https://www.veracode.com/fix">Veracode Fix</a></strong> is another example of AI application in software supply chain security. Veracode Fix uses a generative pre-trained transformer engine to provide automatic code suggestions on how to remediate security flaws discovered after scanning software. It has been trained using Veracode&#8217;s already existing knowledge base of more than 140 trillion lines of code and its 17 years of security research. This <strong><a href="https://siliconangle.com/2023/04/18/veracode-announces-gpt-powered-find-fix-solution-software-developers/">article</a></strong> provides more details on their implementation.</p><h4><strong>Codium AI</strong> </h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FTp5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FTp5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png 424w, https://substackcdn.com/image/fetch/$s_!FTp5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png 848w, https://substackcdn.com/image/fetch/$s_!FTp5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png 1272w, https://substackcdn.com/image/fetch/$s_!FTp5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FTp5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png" width="1456" height="677" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:677,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Visual Studio Code \nCreate tests for function \n1 def gaussian_elimination \nTest code \ndef test_valid_input (self) : \ncoefficients - np.array ( [ [2, 11, [3, \nvector \&quot; np.array(([[5], [611) \nCopy All \n2 \n3 \n4 \n5 \n6 \n7 \n8 \n9 \n10 \ncoefficients: NDArrayL float64A , vector: NDArrayj floaE64f \nNDArray&#223; float641 : \nif vector \n(0, \nd typevfloat \nreturn np array \nrows, columns rip D shape coefficients) \n# augmented matrix \nresult - vector) \nassert result . all() -T np.array( [ [Q.l, \ndef (self): \ncoefficients - np.array ( [ [2, 11, [3, 41]) \nvector - np.array( [[5, 6]]) \ngaussian_elimination ( coefficients, vector) \nresult - \n&#8226; np.array ( [ ] ) . all() \nassert result. all() \ndef c reat ion (self) : \ncoefficients np.array( [ [2, 11, [3, 41]) \nvector - np.array( [[51, [6]]) \nCopy \nCopy \nCopy \naugmented_mat - create_augmented_mat rix( coefficients, vecto \nassert augmented_mat. all() np.array( 1., 5.1, 4, &quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Visual Studio Code 
Create tests for function 
1 def gaussian_elimination 
Test code 
def test_valid_input (self) : 
coefficients - np.array ( [ [2, 11, [3, 
vector &quot; np.array(([[5], [611) 
Copy All 
2 
3 
4 
5 
6 
7 
8 
9 
10 
coefficients: NDArrayL float64A , vector: NDArrayj floaE64f 
NDArray&#223; float641 : 
if vector 
(0, 
d typevfloat 
return np array 
rows, columns rip D shape coefficients) 
# augmented matrix 
result - vector) 
assert result . all() -T np.array( [ [Q.l, 
def (self): 
coefficients - np.array ( [ [2, 11, [3, 41]) 
vector - np.array( [[5, 6]]) 
gaussian_elimination ( coefficients, vector) 
result - 
&#8226; np.array ( [ ] ) . all() 
assert result. all() 
def c reat ion (self) : 
coefficients np.array( [ [2, 11, [3, 41]) 
vector - np.array( [[51, [6]]) 
Copy 
Copy 
Copy 
augmented_mat - create_augmented_mat rix( coefficients, vecto 
assert augmented_mat. all() np.array( 1., 5.1, 4, " title="Visual Studio Code 
Create tests for function 
1 def gaussian_elimination 
Test code 
def test_valid_input (self) : 
coefficients - np.array ( [ [2, 11, [3, 
vector &quot; np.array(([[5], [611) 
Copy All 
2 
3 
4 
5 
6 
7 
8 
9 
10 
coefficients: NDArrayL float64A , vector: NDArrayj floaE64f 
NDArray&#223; float641 : 
if vector 
(0, 
d typevfloat 
return np array 
rows, columns rip D shape coefficients) 
# augmented matrix 
result - vector) 
assert result . all() -T np.array( [ [Q.l, 
def (self): 
coefficients - np.array ( [ [2, 11, [3, 41]) 
vector - np.array( [[5, 6]]) 
gaussian_elimination ( coefficients, vector) 
result - 
&#8226; np.array ( [ ] ) . all() 
assert result. all() 
def c reat ion (self) : 
coefficients np.array( [ [2, 11, [3, 41]) 
vector - np.array( [[51, [6]]) 
Copy 
Copy 
Copy 
augmented_mat - create_augmented_mat rix( coefficients, vecto 
assert augmented_mat. all() np.array( 1., 5.1, 4, " srcset="https://substackcdn.com/image/fetch/$s_!FTp5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png 424w, https://substackcdn.com/image/fetch/$s_!FTp5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png 848w, https://substackcdn.com/image/fetch/$s_!FTp5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png 1272w, https://substackcdn.com/image/fetch/$s_!FTp5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb6b3b-ea65-48bf-b7fa-b4ab0913e532_1974x918.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Codium AI&#8217;s Testing Solution in Action.</figcaption></figure></div><p>TestGPT from<strong> <a href="https://www.codium.ai/">Codium AI</a></strong> is an IDE extension that enables an iterative process of generating tests and then tweaking code based on the outcomes of those tests. This interaction with the developer helps the tool understand the code better and generate more accurate and meaningful tests while guiding the developer to write better code. More about their implementation can be found in this <strong><a href="https://venturebeat.com/ai/testgpt-a-generative-ai-tool-for-ensuring-code-integrity-is-released-for-beta/">VentureBeat article</a></strong>.</p><h4><strong>GitLab</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TaZL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TaZL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png 424w, https://substackcdn.com/image/fetch/$s_!TaZL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png 848w, https://substackcdn.com/image/fetch/$s_!TaZL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png 1272w, https://substackcdn.com/image/fetch/$s_!TaZL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TaZL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png" width="1456" height="1064" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1064,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;9 Tests > webgoat \nGitLab.org > \n> Vulnerability Report > \n41857351 \nNeeds triage Detected &#8226; Apr 19, 2022, 7:02 PM in pipeline 520134833 \nImproper Restriction of XML External Entity Reference ('XXE') \nDescription \nXML External Entity (XXE) attacks can occur when an XML parser supports XML entities while processing XML rece \nSeverity: Critical \nProject: GitLab.org / security-products / Tests / webgoat \nTool: SAST \nScanner: Semgrep \nLocation \nFile: webgoat-lessons/xxe/src/main/java.org/owasp/webgoat/plugin/Comments.java:70 \nIdentifiers \nCWE-611 \n&#8226; Find Security Bugs-XXE_XMLSTREAMREADER \n@ Explain this vulnerability and how to mitigate it with Al Experiment \nThis is an experimental feature that uses Al to explain the vulnerability and provide recommendations. \nPlease provide your feedback and ideas in this issue. \nTry it out \nLinked items \nLink issues together to show that they're related. Learn more. \nExplain this vulnerability \nThis response is generated by Al. \nImproper Restriction of XML \nExternal Entity Reference \n('XXE') Vulnerability \nx \nExplanation \nThe vulnerability \&quot;Improper Restriction of XML \nExternal Entity Reference ('XXE')\&quot; occurs when an \napplication processes XML input from untrusted \nsources, allowing an attacker to read files, execute \nremote code, or perform other malicious actions on \nthe server. The vulnerability is caused by the \napplication failing to properly restrict the use of \nexternal entities in XML input. \nIn the provided code snippet, the vulnerability is \npresent in the parseXML method, where an XML \ninput is passed to the createXMLStreamReader \nmethod without proper validation. This allows an \nattacker to include external entities in the XML input, \nwhich can be used to read files or execute remote \ncode. \nExploitation \nTo exploit this vulnerability, an attacker can craft a \nmalicious XML input that includes an external entity \nthat points to a sensitive file on the server. For \nexample: \nversion=\&quot;1.O\&quot; encoding=\&quot;UTF-8 \nfoo &quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="9 Tests > webgoat 
GitLab.org > 
> Vulnerability Report > 
41857351 
Needs triage Detected &#8226; Apr 19, 2022, 7:02 PM in pipeline 520134833 
Improper Restriction of XML External Entity Reference ('XXE') 
Description 
XML External Entity (XXE) attacks can occur when an XML parser supports XML entities while processing XML rece 
Severity: Critical 
Project: GitLab.org / security-products / Tests / webgoat 
Tool: SAST 
Scanner: Semgrep 
Location 
File: webgoat-lessons/xxe/src/main/java.org/owasp/webgoat/plugin/Comments.java:70 
Identifiers 
CWE-611 
&#8226; Find Security Bugs-XXE_XMLSTREAMREADER 
@ Explain this vulnerability and how to mitigate it with Al Experiment 
This is an experimental feature that uses Al to explain the vulnerability and provide recommendations. 
Please provide your feedback and ideas in this issue. 
Try it out 
Linked items 
Link issues together to show that they're related. Learn more. 
Explain this vulnerability 
This response is generated by Al. 
Improper Restriction of XML 
External Entity Reference 
('XXE') Vulnerability 
x 
Explanation 
The vulnerability &quot;Improper Restriction of XML 
External Entity Reference ('XXE')&quot; occurs when an 
application processes XML input from untrusted 
sources, allowing an attacker to read files, execute 
remote code, or perform other malicious actions on 
the server. The vulnerability is caused by the 
application failing to properly restrict the use of 
external entities in XML input. 
In the provided code snippet, the vulnerability is 
present in the parseXML method, where an XML 
input is passed to the createXMLStreamReader 
method without proper validation. This allows an 
attacker to include external entities in the XML input, 
which can be used to read files or execute remote 
code. 
Exploitation 
To exploit this vulnerability, an attacker can craft a 
malicious XML input that includes an external entity 
that points to a sensitive file on the server. For 
example: 
version=&quot;1.O&quot; encoding=&quot;UTF-8 
foo " title="9 Tests > webgoat 
GitLab.org > 
> Vulnerability Report > 
41857351 
Needs triage Detected &#8226; Apr 19, 2022, 7:02 PM in pipeline 520134833 
Improper Restriction of XML External Entity Reference ('XXE') 
Description 
XML External Entity (XXE) attacks can occur when an XML parser supports XML entities while processing XML rece 
Severity: Critical 
Project: GitLab.org / security-products / Tests / webgoat 
Tool: SAST 
Scanner: Semgrep 
Location 
File: webgoat-lessons/xxe/src/main/java.org/owasp/webgoat/plugin/Comments.java:70 
Identifiers 
CWE-611 
&#8226; Find Security Bugs-XXE_XMLSTREAMREADER 
@ Explain this vulnerability and how to mitigate it with Al Experiment 
This is an experimental feature that uses Al to explain the vulnerability and provide recommendations. 
Please provide your feedback and ideas in this issue. 
Try it out 
Linked items 
Link issues together to show that they're related. Learn more. 
Explain this vulnerability 
This response is generated by Al. 
Improper Restriction of XML 
External Entity Reference 
('XXE') Vulnerability 
x 
Explanation 
The vulnerability &quot;Improper Restriction of XML 
External Entity Reference ('XXE')&quot; occurs when an 
application processes XML input from untrusted 
sources, allowing an attacker to read files, execute 
remote code, or perform other malicious actions on 
the server. The vulnerability is caused by the 
application failing to properly restrict the use of 
external entities in XML input. 
In the provided code snippet, the vulnerability is 
present in the parseXML method, where an XML 
input is passed to the createXMLStreamReader 
method without proper validation. This allows an 
attacker to include external entities in the XML input, 
which can be used to read files or execute remote 
code. 
Exploitation 
To exploit this vulnerability, an attacker can craft a 
malicious XML input that includes an external entity 
that points to a sensitive file on the server. For 
example: 
version=&quot;1.O&quot; encoding=&quot;UTF-8 
foo " srcset="https://substackcdn.com/image/fetch/$s_!TaZL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png 424w, https://substackcdn.com/image/fetch/$s_!TaZL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png 848w, https://substackcdn.com/image/fetch/$s_!TaZL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png 1272w, https://substackcdn.com/image/fetch/$s_!TaZL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a4ce8a8-1edb-47a9-aa37-7edb84ab7cf7_2352x1718.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">GitLab&#8217;s Vulnerability Explainer in Action</figcaption></figure></div><p><strong><a href="https://about.gitlab.com/">GitLab</a></strong> has introduced a new security feature that leverages AI to explain vulnerabilities to developers, streamlining the process of identifying and remediating security risks in code. You can read more about their implementation in this <strong><a href="https://techcrunch.com/2023/04/24/gitlabs-new-security-feature-uses-ai-to-explain-vulnerabilities-to-developers/">TechCrunch article</a></strong>.</p><h3>Threat Intelligence</h3><p>Generative AI and LLMs can be used to analyze vast amounts of threat intelligence data, identifying key threats and providing detailed, real-time assessments of the threat landscape. This falls under the themes of Threat Detection and Prioritization, and Summarization and Explanation.</p><p><strong>Fletch AI</strong></p><p><strong><a href="https://fletch.ai/">Fletch AI</a></strong>'s solution aims to sift through the entire threat landscape to identify major threats before they appear in the news. It correlates threats to a company&#8217;s tech stack, geolocation(s), and industry exposure, and then acts as an early warning system by delivering a daily report of the threats most relevant to an organization. It also delivers personalized advice to prevent, fix, understand, and communicate threats. You can find more about their solution <strong><a href="https://fletch.ai/resources/introducing-the-new-fletch-feed">here</a></strong>, and <strong><a href="https://fletch.ai/resources/remediation-without-the-guesswork">here</a></strong>.</p><p><strong>Recorded Future</strong></p><p><strong><a href="https://www.recordedfuture.com/">Recorded Future</a></strong> recently released what it claims to be the first AI for threat intelligence. This tool uses OpenAI's GPT model to process threat intel and generate real-time assessments of the threat landscape. The model was trained on more than 10 years of insights taken from Recorded Future's research team and 100 terabytes of data from various sources. Their tool enriches threat intel by providing human users with generated reports they can use to gain more context around security incidents that may impact their organization and how to respond effectively. You can read more about their implementation <strong><a href="https://venturebeat.com/security/gpt-has-entered-the-security-threat-intelligence-chat/">here</a></strong>.</p><h3>Incident Response</h3><p>In the aftermath of a cybersecurity incident, generative AI and LLMs can be used to generate detailed, understandable reports, helping stakeholders to understand what happened, how it was resolved, and what steps need to be taken to prevent a similar incident in the future. This falls under the theme of <em>Summarizers, Explainers, </em>and<em> Advisors</em>.</p><h4><strong>Microsoft</strong></h4><ul><li><p><strong><a href="https://betanews.com/2023/04/06/microsoft-365-defender-is-now-ai-powered/">Microsoft introduced Microsoft 365 Defender Automation Attack Disruption</a></strong> which can scan multiple endpoints, quickly identifying red flags such as suspicious email locations. Once a threat is detected, it can isolate the compromised account and halt all transactions. This tool enhances incident response by automating the detection and containment of threats, reducing the time and effort required by human analysts.</p><p></p></li></ul><h3>Data Security</h3><p>Generative AI and LLMs can help identify, classify, and safeguard sensitive data by monitoring access, leveraging data classification, encryption, and anonymization, ensuring robust protection for highly sensitive data. This aligns with the <em>Prioritization</em> theme because of course, you want to prioritize security for sensitive data.</p><h4><strong>BigID's BigAI</strong></h4><ul><li><p>BigID has launched <strong><a href="https://bigid.com/">BigAI</a></strong>, a privacy-by-design LLM designed to discover and protect sensitive data. BigAI scans structured and unstructured data, whether stored in the cloud or on-premises, using a mix of ML-driven classification and generative AI to suggest titles and descriptions for data tables, columns, and clusters so they&#8217;re easier to locate via search. More about their implementation can be found in this <strong><a href="https://venturebeat.com/2023/04/06/bigid-launches-bigai-a-privacy-by-design-llm-designed-to-discover-and-protect-sensitive-data/">article</a></strong>.</p></li></ul><h4><strong>Cado Security's MaskedAI</strong></h4><ul><li><p>Cado Security has debuted <strong><a href="https://www.cadosecurity.com/">MaskedAI</a></strong>, an open-source library that enables the use of Large Language Models (LLM) APIs, such as OpenAI/GPT-4 more securely without sending out sensitive information. Masked-AI replaces sensitive data with a placeholder and sends the masked request to the API. The solution stores a lookup table locally to then later reconstruct the API output to include the sensitive data for the user to consume. More about their implementation can be found in this <strong><a href="https://www.msspalert.com/cybersecurity-services-and-products/ai/cado-security-debuts-masked-ai-to-secure-sensitive-data-of-public-apis/">article</a></strong>.</p></li></ul><h2>Cloud Provider Implementations</h2><p>Cloud providers are perfectly positioned to tap into the game-changing potential of Generative AI and LLMs. With their vast computational resources, treasure troves of data, and teams of PhDs, they are uniquely positioned to bring to market advanced security solutions that can reach a global audience. In this section, we dive into the work of Google and Microsoft, two titans that are leveraging Generative AI and LLMs to redefine the landscape of cybersecurity. </p><p>Notice how I didn&#8217;t include AWS. The reason is that they&#8217;ve been slow to move on this front and haven&#8217;t publicly announced any security features that leverage these technologies. Were they caught off guard or are they waiting to see what&#8217;s worth their investment? &#129300;</p><h3><strong>Google Cloud</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6WOy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6WOy!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif 424w, https://substackcdn.com/image/fetch/$s_!6WOy!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif 848w, https://substackcdn.com/image/fetch/$s_!6WOy!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif 1272w, https://substackcdn.com/image/fetch/$s_!6WOy!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6WOy!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif" width="1434" height="772" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:772,&quot;width&quot;:1434,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;https://storage.googleapis.com/gweb-cloudblog-publish/original_images/workbench-2x.gif&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="https://storage.googleapis.com/gweb-cloudblog-publish/original_images/workbench-2x.gif" title="https://storage.googleapis.com/gweb-cloudblog-publish/original_images/workbench-2x.gif" srcset="https://substackcdn.com/image/fetch/$s_!6WOy!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif 424w, https://substackcdn.com/image/fetch/$s_!6WOy!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif 848w, https://substackcdn.com/image/fetch/$s_!6WOy!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif 1272w, https://substackcdn.com/image/fetch/$s_!6WOy!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb94648e-f880-48cc-b4e4-5e4f5a84f413_1434x772.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://www.youtube.com/watch?v=OBnylC91RCk">Google Cloud launched the Google Cloud Security AI Workbench at RSA</a></strong>, a new platform backed by the Sec-PaLM LLM which is specifically fine-tuned for security use cases. The model leverages Google&#8217;s massive trove of insights into the security landscape paired with Mandiant&#8217;s threat intelligence from being out in the trenches for nearly two decades. What stood out to me the most is that they may soon allow customers to privately connect their own data to the LLM. Below are the use cases covered in their release, broken down into themes:</p><ul><li><p><strong>Summarizers, Explainers, and Advisors</strong></p><ul><li><p><strong>Chronicle AI</strong>: Uses generative AI to summarize query results and provide an interactive interface for exploring security events.</p></li><li><p><strong>Mandiant Threat Intelligence AI</strong>: Summarizes key insights and Indicators of Compromise (IoCs) across threat intel reports, providing a concise overview of potential threats.</p></li><li><p><strong>Security Command Center Attack Path Simulation</strong>: Generates human-readable summaries and explanations of attack paths, providing a clear overview of potential threats and vulnerabilities.</p><p></p></li></ul></li><li><p><strong>Natural Language Processing (NLP) to Code Generation</strong></p><ul><li><p><strong>Chronicle AI</strong>: Transforms natural language into actionable queries and detections, allowing users to interact with billions of security events.</p></li><li><p><strong>Assured OSS</strong>: Enhances Google Cloud&#8217;s OSS vulnerability management solution by adding more coverage for open-source software (OSS) packages.</p></li><li><p><strong>Mandiant Threat Intelligence AI</strong>: Employs generative AI to quickly find, summarize, and act on threats relevant to your organization, translating natural language descriptions into actionable insights.</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OoAq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OoAq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OoAq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OoAq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OoAq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OoAq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg" width="1456" height="649" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:649,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;VirusTotal Code Insight&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="VirusTotal Code Insight" title="VirusTotal Code Insight" srcset="https://substackcdn.com/image/fetch/$s_!OoAq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OoAq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OoAq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OoAq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec612962-6ede-4743-a6d6-416f5dbfcce6_1600x713.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">VirusTotal&#8217;s new Code Insight feature leverages Google Cloud&#8217;s Security AI Workbench to describe what it found in a malicious PowerShell file.</figcaption></figure></div><ul><li><p><strong>Reverse Engineering</strong></p><ul><li><p><strong>Malware Analysis:</strong> VirusTotal&#8217;s <strong><a href="https://www.bleepingcomputer.com/news/security/virustotal-now-has-an-ai-powered-malware-analysis-feature/">Code Insight </a></strong>leverages<strong> </strong>Google Cloud&#8217;s Security AI Workbench and the Sec-PaLM LLM to deconstruct and analyze potentially harmful files. It then describes the findings in simple human language. A task that would previously take an experienced reverse engineer at least a couple of hours depending on the complexity of the file.</p></li></ul></li></ul><h3><strong>Microsoft Azure</strong></h3><p>Microsoft introduced a new tool called <strong><a href="https://thehackernews.com/2023/03/microsoft-introduces-gpt-4-ai-powered.html">Security Copilot</a></strong>. This tool is powered by OpenAI's GPT-4 generative AI and Microsoft's own security-specific model, marking a significant stride in Microsoft's ongoing efforts to incorporate AI-oriented features for end-to-end defense. Below are some of the features introduced in Security Copilot: </p><ul><li><p><strong>Natural Language Processing (NLP) to Code Generation</strong></p><ul><li><p><strong>Threat Detection Rule and Query Generators:</strong> Security Copilot allows users to ask about suspicious user logins over a specific time period in plain language. This feature leverages generative AI to translate natural language into queries, enabling the system to sift through vast amounts of data and identify potential security threats.</p></li></ul></li><li><p><strong>Summarizers, Explainers, and Advisors</strong></p><ul><li><p><strong>Incident Response Post-mortems:</strong> Security Copilot can be employed to create a PowerPoint presentation outlining an incident and its attack chain. This feature uses generative AI to analyze the details of a security incident and generate a concise, easy-to-understand summary of what happened, why it happened, and what the impact was.</p></li></ul></li><li><p><strong>Code Analysis</strong></p><ul><li><p><strong>Threat Analysis:</strong> Security Copilot can accept files, URLs, and code snippets for analysis. This feature leverages generative AI to scrutinize the provided code or content, identify potential vulnerabilities or threats, and provide detailed reports on the findings.</p></li></ul></li><li><p><strong>Reverse Engineering</strong></p><ul><li><p><strong>Malware Analysis:</strong> Security Copilot has the capability to reverse engineer exploits. This feature uses generative AI to deconstruct and analyze potentially harmful files or code, providing detailed insights into how a piece of malware functions and how to defend against it.</p></li></ul></li></ul><p>Also, it&#8217;s key to note that Microsoft&#8217;s 3-day developer conference, Microsoft Build, kicks off today and while it&#8217;s not security-focused, you can bet your top dollar that generative AI will be a key theme. The show starts at 12PM ET with a keynote from CEO Satya Nadella, you can watch it live <strong><a href="https://www.msn.com/en-us/news/technology/how-to-watch-the-microsoft-build-2023-keynote-livestream/ar-AA1bz4xv">here</a></strong>. Maybe we&#8217;ll see some cool new stuff for Security Copilot and/or GitHub Copilot? &#129300; </p><div><hr></div><h2>Other Use Cases to Consider</h2><p>This next section quickly covers a number of potential use cases that I didn&#8217;t touch on in the previous section. </p><h3>Red Team Use Cases</h3><ol><li><p><strong>Penetration Testing:</strong> LLMs can be used to automate parts of the penetration testing process. This could involve anything from identifying potential attack vectors to actually executing the attack, such as by exploiting known vulnerabilities or launching brute-force attacks.</p></li><li><p><strong>Social Engineering Attacks</strong>: Generative AI can be used to craft convincing phishing emails or other types of deceptive communication. It could also potentially be used for vishing (voice phishing), by mimicking a person's voice to trick a victim into revealing sensitive information.</p></li><li><p><strong>Automating Exploit Generation:</strong> LLMs could potentially be trained to generate new exploits based on known vulnerability types. This could allow a red team to quickly develop a wide range of attacks for testing purposes.</p></li><li><p><strong>Password Cracking:</strong> LLMs can be used to generate lists of potential passwords based on patterns identified in previous data breaches. This could make brute-force attacks more efficient by focusing on the most likely passwords first.</p></li><li><p><strong>Automating Reconnaissance:</strong> LLMs could automate the process of gathering and analyzing publicly available information about a target, which is often the first step in planning an attack.</p></li></ol><h3>Miscellaneous Use Cases</h3><ol><li><p><strong>Security Awareness Training:</strong> Generative AI can create realistic phishing emails, spoof websites, or other potential security threats for training purposes. This can help employees to recognize and respond appropriately to these threats, thereby reducing the risk of successful cyber attacks.</p></li><li><p><strong>Policy and Compliance Management:</strong> LLMs can be used to read, understand, and summarize complex regulatory documents, helping organizations to ensure that their cybersecurity policies and practices are in compliance with relevant laws and standards.</p></li></ol><div><hr></div><h2>Metrics</h2><p>Before we close out, I&#8217;d like to talk to you about your car&#8217;s extended warranty. Kidding. Metrics. If you can&#8217;t measure it, you can&#8217;t track it. Most mature security and product organizations heavily rely on metrics to make better-informed decisions and to let them know whether they are headed in the right direction. Keep in mind that the impact that any solution will have on metrics will vary on implementation, the context in which it is used, and most importantly, the adeptness of the people leveraging the technology. </p><p>Below are 7 metrics generative AI security solutions can help with:</p><ol><li><p>Time to detection</p></li><li><p>Time to remediation</p></li><li><p>Time to threat containment</p></li><li><p>Time to production</p></li><li><p>Time to recover</p></li><li><p>False Positive/Negative Rates</p></li><li><p>Incident response time</p></li></ol><div><hr></div><h2>Conclusion</h2><p>If you're feeling a bit skeptical about Generative AI and LLMs, I get it. After all, they're not perfect and can sometimes produce results that aren't quite up to scratch. But don't let that deter you because you&#8217;ll inevitably end up leveraging these types of solutions. There's a lot of work being done to prevent AI "hallucinations", for example, <strong><a href="https://github.com/NVIDIA/NeMo-Guardrails">NVIDIA's NeMo Guardrails</a></strong>. And when it comes to data privacy and security, as long as you're following the right protocols, these technologies can be a powerful asset. <strong><a href="https://team8.vc/rethink/cyber/a-cisos-guide-generative-ai-and-chatgpt-enterprise-risks/">Team8 has come up with a great guide</a></strong> on how to manage generative AI risks in the enterprise. </p><p>Generative AI-backed security solutions are by no means a magic wand, but they can help in a number of ways. They can help with SecOps, Incident Response, Offensive Security, and Software Supply Chain Security, and they help bridge the skills gap in cybersecurity. And let's not forget, our adversaries are already using these technologies. So, why shouldn't we? &#129335;&#127998;&#8205;&#9794;&#65039;</p><p>In a follow-up post, I'll be diving into the world of custom in-house autonomous security agents and why I believe they're the future of cybersecurity. But I'd love to hear your thoughts. What do you think about all this? Have I missed anything important? Your feedback is always welcome. I&#8217;d love to keep the conversation going! </p><div><hr></div><p><strong>Enjoyed this post? I'd be thrilled if you could subscribe and share it with your network. I create these posts in my spare moments, and seeing the reader community expand truly fuels my motivation to write more. And if you're feeling particularly generous, you could even <a href="https://www.buymeacoffee.com/salazardarn">buy me a coffee</a> </strong>&#9749;<strong> . Thanks for reading, your support means a ton! </strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybersecuritypulse.net/p/demystifying-the-generative-ai-and?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybersecuritypulse.net/p/demystifying-the-generative-ai-and?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item></channel></rss>