My top security topics
One of the best things about working in cybersecurity is that it's always changing. There are always new things to learn and think about. Here are some of the areas of security that I'm thinking about the most right now:Securing the digital supply chainThe evolution of cloud-native securityInternet of Things (IoT) securityThe human element of securitySecuring web3 and blockchainI'll take them one by one this week and share some quick thoughts on why I think they're interes...
Poor man’s Gong
If you’re someone who works with me, you may have noticed that I ask to record our Zoom calls more often than I used to. There’s a reason for this. While I can’t justify the cost of a revenue intelligence platform like Gong for my small shop, I made up my own poor man’s version. Here’s how it works.Download and install Descript. (There’s a free version.)Hit the record button on a Zoom call and pick the “Record on this computer” option.After the Zoom call ends, drag the video file that Zoom sp...
Welcome to the simulation
OK, now that the marketing guy explained what Zero Trust is, let’s get into some ways to give security buyers a plan for it (that hopefully includes some of you). There’s a real danger that this could get boring in a hurry, so here’s what I’m thinking. Over the next few days, I’ll give you my quick take on what I like and don’t like about the three possible starting points I mentioned. I’m not going to regurgitate every detail, but I’ll try to give you the gist. Then, I’m going to make up a f...
I share daily thoughts about cybersecurity and emerging technology. [Subscribe](https://daily.axalane.com) or [hire me](https://axalane.com)
My top security topics
One of the best things about working in cybersecurity is that it's always changing. There are always new things to learn and think about. Here are some of the areas of security that I'm thinking about the most right now:Securing the digital supply chainThe evolution of cloud-native securityInternet of Things (IoT) securityThe human element of securitySecuring web3 and blockchainI'll take them one by one this week and share some quick thoughts on why I think they're interes...
Poor man’s Gong
If you’re someone who works with me, you may have noticed that I ask to record our Zoom calls more often than I used to. There’s a reason for this. While I can’t justify the cost of a revenue intelligence platform like Gong for my small shop, I made up my own poor man’s version. Here’s how it works.Download and install Descript. (There’s a free version.)Hit the record button on a Zoom call and pick the “Record on this computer” option.After the Zoom call ends, drag the video file that Zoom sp...
Welcome to the simulation
OK, now that the marketing guy explained what Zero Trust is, let’s get into some ways to give security buyers a plan for it (that hopefully includes some of you). There’s a real danger that this could get boring in a hurry, so here’s what I’m thinking. Over the next few days, I’ll give you my quick take on what I like and don’t like about the three possible starting points I mentioned. I’m not going to regurgitate every detail, but I’ll try to give you the gist. Then, I’m going to make up a f...
I share daily thoughts about cybersecurity and emerging technology. [Subscribe](https://daily.axalane.com) or [hire me](https://axalane.com)
Share Dialog
Share Dialog

Subscribe to Doug Lane

Subscribe to Doug Lane
<100 subscribers
<100 subscribers
The first narrative instrument I mentioned in yesterday's message is a "major shift in the security industry landscape." This might seem like a tall order. But given how crowded the security space is, your startup won't have great odds of gaining traction without giving buyers a compelling reason to shift from the status quo.
There are always big security waves to grab a piece of at any point in time.
For example:
Mitigating risks that existing security approaches miss (ransomware, wiper attacks, etc.)
Simplifying Zero Trust Architecture adoption
Acquiring, developing, and retaining security talent
Adapting security to modern workflows (SecDevOps, location-independent workforce, etc.)
Adapting security to new architectures (cloud, microservices, APIs, blockchain, etc.)
Extending security into the software supply chain (SolarWinds, Log4Shell, etc.)
Securing IoT and other non-traditional connected devices.
You can also look for a smaller wave that you can own. Like, maybe you're the company that brings modern security techniques to the legacy systems our rickety electrical grid runs on.
Either way, the key is to articulate to buyers how the world – and their risk posture – is changing in ways that demand action.
-Doug
The first narrative instrument I mentioned in yesterday's message is a "major shift in the security industry landscape." This might seem like a tall order. But given how crowded the security space is, your startup won't have great odds of gaining traction without giving buyers a compelling reason to shift from the status quo.
There are always big security waves to grab a piece of at any point in time.
For example:
Mitigating risks that existing security approaches miss (ransomware, wiper attacks, etc.)
Simplifying Zero Trust Architecture adoption
Acquiring, developing, and retaining security talent
Adapting security to modern workflows (SecDevOps, location-independent workforce, etc.)
Adapting security to new architectures (cloud, microservices, APIs, blockchain, etc.)
Extending security into the software supply chain (SolarWinds, Log4Shell, etc.)
Securing IoT and other non-traditional connected devices.
You can also look for a smaller wave that you can own. Like, maybe you're the company that brings modern security techniques to the legacy systems our rickety electrical grid runs on.
Either way, the key is to articulate to buyers how the world – and their risk posture – is changing in ways that demand action.
-Doug
No activity yet