I share daily thoughts about cybersecurity and emerging technology. [Subscribe](https://daily.axalane.com) or [hire me](https://axalane.com)
My top security topics
One of the best things about working in cybersecurity is that it's always changing. There are always new things to learn and think about. Here are some of the areas of security that I'm thinking about the most right now:Securing the digital supply chainThe evolution of cloud-native securityInternet of Things (IoT) securityThe human element of securitySecuring web3 and blockchainI'll take them one by one this week and share some quick thoughts on why I think they're interes...
Poor man’s Gong
If you’re someone who works with me, you may have noticed that I ask to record our Zoom calls more often than I used to. There’s a reason for this. While I can’t justify the cost of a revenue intelligence platform like Gong for my small shop, I made up my own poor man’s version. Here’s how it works.Download and install Descript. (There’s a free version.)Hit the record button on a Zoom call and pick the “Record on this computer” option.After the Zoom call ends, drag the video file that Zoom sp...
Welcome to the simulation
OK, now that the marketing guy explained what Zero Trust is, let’s get into some ways to give security buyers a plan for it (that hopefully includes some of you). There’s a real danger that this could get boring in a hurry, so here’s what I’m thinking. Over the next few days, I’ll give you my quick take on what I like and don’t like about the three possible starting points I mentioned. I’m not going to regurgitate every detail, but I’ll try to give you the gist. Then, I’m going to make up a f...
My top security topics
One of the best things about working in cybersecurity is that it's always changing. There are always new things to learn and think about. Here are some of the areas of security that I'm thinking about the most right now:Securing the digital supply chainThe evolution of cloud-native securityInternet of Things (IoT) securityThe human element of securitySecuring web3 and blockchainI'll take them one by one this week and share some quick thoughts on why I think they're interes...
Poor man’s Gong
If you’re someone who works with me, you may have noticed that I ask to record our Zoom calls more often than I used to. There’s a reason for this. While I can’t justify the cost of a revenue intelligence platform like Gong for my small shop, I made up my own poor man’s version. Here’s how it works.Download and install Descript. (There’s a free version.)Hit the record button on a Zoom call and pick the “Record on this computer” option.After the Zoom call ends, drag the video file that Zoom sp...
Welcome to the simulation
OK, now that the marketing guy explained what Zero Trust is, let’s get into some ways to give security buyers a plan for it (that hopefully includes some of you). There’s a real danger that this could get boring in a hurry, so here’s what I’m thinking. Over the next few days, I’ll give you my quick take on what I like and don’t like about the three possible starting points I mentioned. I’m not going to regurgitate every detail, but I’ll try to give you the gist. Then, I’m going to make up a f...
I share daily thoughts about cybersecurity and emerging technology. [Subscribe](https://daily.axalane.com) or [hire me](https://axalane.com)

Subscribe to Doug Lane

Subscribe to Doug Lane
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers
A fellow freelance marketer in a Slack group I’m in asked me for some advice about breaking into the cybersecurity niche. I thought I would share my suggestions here in case they are helpful to any of you.
One of the problems with the cybersecurity space is that there is a lot of noise. It can be a bit overwhelming. But I do think it’s important to build some general knowledge about what is happening in the industry. KrebsOnSecurity is one of the go-to sources. If you prefer podcast form, CyberWire Daily is another source of general industry happenings.
There are quite a few sub-niches within the broader cybersecurity space. Examples include endpoint security, cloud security, identity and access management, and so on. This chart will give you a feel for the breadth of the industry. It’s…a lot. While it’s important to know what all of the sub-niches are at a high level, no one can be an expert on all of them. So pick a couple that interest you to dig deeper into. If you’d like suggestions, a few that I’m really interested in right now are API security, Zero Trust Architecture, and security orchestration and response (SOAR).
Once you pick some sub-niches, a good place to start is to look for research from analysts like Gartner and Forrester Research. These reports are expensive, but you can usually find free reprints on security vendor sites. For example, if you are interested in API security, you can grab this report and check out this free webinar. Similar resources will exist for most other sub-niches.
Once or twice per year, there is a major cybersecurity incident of some kind that drives industry discussion for months. These can be very instructive about some of the critical issues the industry is facing, and security vendors are often eager to explain how they can help prevent something similar from affecting their customers. For example, if you Google “Log4j” or “Log4Shell,” you will find an endless sea of recent security vendor content. The SolarWinds incident is another great example.
I am more than happy to jump on a Zoom call any time if you would like to talk a bit more about the areas that interest you. (This offer applies to daily email subscribers as well!) I frequently receive inbound requests that I don’t have the capacity to fulfill. Saying no is easier if I can refer the person to someone else who may be able to help. I do also occasionally bring subcontractors in on bigger projects. There are also some content marketing agencies that use subcontractors as their primary model. Two examples are AimPoint Group and CyberEdge.
I hope this helps!
-Doug
A fellow freelance marketer in a Slack group I’m in asked me for some advice about breaking into the cybersecurity niche. I thought I would share my suggestions here in case they are helpful to any of you.
One of the problems with the cybersecurity space is that there is a lot of noise. It can be a bit overwhelming. But I do think it’s important to build some general knowledge about what is happening in the industry. KrebsOnSecurity is one of the go-to sources. If you prefer podcast form, CyberWire Daily is another source of general industry happenings.
There are quite a few sub-niches within the broader cybersecurity space. Examples include endpoint security, cloud security, identity and access management, and so on. This chart will give you a feel for the breadth of the industry. It’s…a lot. While it’s important to know what all of the sub-niches are at a high level, no one can be an expert on all of them. So pick a couple that interest you to dig deeper into. If you’d like suggestions, a few that I’m really interested in right now are API security, Zero Trust Architecture, and security orchestration and response (SOAR).
Once you pick some sub-niches, a good place to start is to look for research from analysts like Gartner and Forrester Research. These reports are expensive, but you can usually find free reprints on security vendor sites. For example, if you are interested in API security, you can grab this report and check out this free webinar. Similar resources will exist for most other sub-niches.
Once or twice per year, there is a major cybersecurity incident of some kind that drives industry discussion for months. These can be very instructive about some of the critical issues the industry is facing, and security vendors are often eager to explain how they can help prevent something similar from affecting their customers. For example, if you Google “Log4j” or “Log4Shell,” you will find an endless sea of recent security vendor content. The SolarWinds incident is another great example.
I am more than happy to jump on a Zoom call any time if you would like to talk a bit more about the areas that interest you. (This offer applies to daily email subscribers as well!) I frequently receive inbound requests that I don’t have the capacity to fulfill. Saying no is easier if I can refer the person to someone else who may be able to help. I do also occasionally bring subcontractors in on bigger projects. There are also some content marketing agencies that use subcontractors as their primary model. Two examples are AimPoint Group and CyberEdge.
I hope this helps!
-Doug
No activity yet