<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Doug Lane</title>
        <link>https://paragraph.com/@axalane</link>
        <description>I share daily thoughts about cybersecurity and emerging technology.
[Subscribe](https://daily.axalane.com) or [hire me](https://axalane.com)</description>
        <lastBuildDate>Wed, 22 Apr 2026 15:32:32 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Doug Lane</title>
            <url>https://storage.googleapis.com/papyrus_images/a8c35ea7adcefa239a8eda8d7575f336d03e1b7deba7edf79b549fb6038021a2.jpg</url>
            <link>https://paragraph.com/@axalane</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[The human element of security]]></title>
            <link>https://paragraph.com/@axalane/the-human-element-of-security</link>
            <guid>sJNvjesSHx01zwAqX0DF</guid>
            <pubDate>Fri, 01 Apr 2022 15:55:42 GMT</pubDate>
            <description><![CDATA[It&apos;s often said that humans are the weakest link in most organizations&apos; security posture. It&apos;s probably true. But it&apos;s also a bit unfair. Working securely is actually pretty hard these days, even if you&apos;re technically savvy. You&apos;re told not to click on unsafe links. But you&apos;re bombarded with inscrutable URLs every day, including many from the same people who will blame you the one time you make an error. Emails from the outside partner you work with every da...]]></description>
            <content:encoded><![CDATA[<p>It&apos;s often said that humans are the weakest link in most organizations&apos; security posture. It&apos;s probably true. But it&apos;s also a bit unfair. Working securely is actually pretty hard these days, even if you&apos;re technically savvy.</p><p>You&apos;re told not to click on unsafe links. But you&apos;re bombarded with inscrutable URLs every day, including many from the same people who will blame you the one time you make an error.</p><p>Emails from the outside partner you work with every day have the same &quot;dangerous outsider!&quot; label as those from a threat actor trying to social engineer you.</p><p>You&apos;re told not to use unsanctioned tools for communicating and collaborating with outside parties. But any company-sanctioned alternatives are too locked down to be useable.</p><p>If you&apos;re a developer, you&apos;re expected to write bug-free code, even though you face unrelenting pressure to ship new capabilities continuously.</p><p>If you&apos;re a SecOps pro, you&apos;re expected to catch every threat, even though you&apos;re hit with an information firehose every day.</p><p>It&apos;s been like this for years. But I&apos;m encouraged by how many security vendors I now see:</p><ul><li><p>Respecting the practical needs of users who must communicate and collaborate across geographic and organizational boundaries.</p></li><li><p>Giving developers something better than boring online training modules to develop their security acumen.</p></li><li><p>Creating security process linkages to non-security teams like developers and infrastructure ops teams who can improve security at a foundational level.</p></li><li><p>Harnessing the power of machine learning to bring greater focus and context to threat hunting and security monitoring.</p></li></ul><p>There is still a long road to travel. But it feels like we&apos;re finally starting to embrace the human element of security rather than point fingers at it.</p><p>-Doug</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Why do we still trust SMS and email?]]></title>
            <link>https://paragraph.com/@axalane/why-do-we-still-trust-sms-and-email</link>
            <guid>9F9iRkAeqIwdCL5UBzB8</guid>
            <pubDate>Thu, 31 Mar 2022 13:58:49 GMT</pubDate>
            <description><![CDATA[I&apos;m always baffled when I go to set up multi-factor authentication, and the only option is to receive one-time codes via SMS. It&apos;s certainly better than not supporting MFA at all. But it sends a message on behalf of your brand: we do the bare minimum. And it satisfies no one. Security-conscious users will be annoyed because (a) they can&apos;t use their preferred MFA approach, and (b) they understand that if someone truly wanted to take over their account, they could probably pay an...]]></description>
            <content:encoded><![CDATA[<p>I&apos;m always baffled when I go to set up multi-factor authentication, and the only option is to receive one-time codes via SMS. It&apos;s certainly better than not supporting MFA at all. But it sends a message on behalf of your brand: we do the bare minimum.</p><p>And it satisfies no one. Security-conscious users will be annoyed because (a) they can&apos;t use their preferred MFA approach, and (b) they understand that if someone truly wanted to take over their account, they could probably pay an insider $500 to execute a SIM swap (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.zdnet.com/article/ex-carrier-employee-charged-for-role-in-sim-swapping-scheme/">ask a T-Mobile customer</a>) or attempt a smishing attack (<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.theverge.com/2022/3/29/23001528/verizon-spam-texts-own-number-confirms-statement">ask a Verizon customer</a>). Less technical users won&apos;t turn it on at all, because it&apos;s a poor user experience.</p><p>There&apos;s also a growing trend of passwordless authentication using one-time email links. This is probably more secure than just a straight login and password. It eliminates the risk that a database of customer passwords somewhere will be compromised. But this approach pushes the authentication process into one of the biggest attack surfaces out there: the email inbox.</p><p>It&apos;s also not just account access that is being authenticated with emails. One of the things that big tech companies don&apos;t talk about much is how often they turn over information about their customers to law enforcement agencies. There are many legal and legitimate reasons for them to do it. But it also isn&apos;t something that can be taken lightly from a customer privacy standpoint.</p><p>Big companies like Meta and Apple often set up secure portals for information requests. But they also take requests via – you guessed it – email. According to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.bloomberg.com/news/articles/2022-03-30/apple-meta-gave-user-data-to-hackers-who-forged-legal-requests">a recent Bloomberg article</a>, here&apos;s how that story ends:</p><blockquote><p>Apple Inc. and Meta Platforms Inc., the parent company of Facebook, provided customer data to hackers who masqueraded as law enforcement officials, according to three people with knowledge of the matter. Apple and Meta provided basic subscriber details, such as a customer’s address, phone number and IP address, in mid-2021 in response to the forged “emergency data requests.” Normally, such requests are only provided with a search warrant or subpoena signed by a judge, according to the people. However, the emergency requests don’t require a court order.</p></blockquote><p>Now, it&apos;s easy to play Monday morning quarterback on stuff like this. We would probably be even more critical if law enforcement failed to prevent a school shooting because they couldn&apos;t log in to one of their 20 vendor portals – or if the tech company took too long to comply.</p><p>But at a time when we seem to be moving more in the direction of SMS and email as an authentication mechanism, we should instead be finding innovative ways to solve for strong authentication <strong>and</strong> user experience.</p><p>-Doug</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Who owns your IoT footprint?]]></title>
            <link>https://paragraph.com/@axalane/who-owns-your-iot-footprint</link>
            <guid>R0l43wCKrXo7Im2Ww7G6</guid>
            <pubDate>Wed, 30 Mar 2022 23:40:22 GMT</pubDate>
            <description><![CDATA[Have you ever heard of Amazon Sidewalk? It&apos;s a shared network that you might already participate in if you have Echo or Ring devices in your home. (Amazon "helpfully" turns it on by default.) It offers some conveniences. After all, that Alexa speaker way out in your garage might have an easier time connecting to your neighbor&apos;s Ring floodlight than your own WiFi router. But features like this raise a big question. How much access to your devices and network is an IoT device manufact...]]></description>
            <content:encoded><![CDATA[<p>Have you ever heard of <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.amazon.com/Amazon-Sidewalk/b?ie=UTF8&amp;node=21328123011">Amazon Sidewalk</a>? It&apos;s a shared network that you might already participate in if you have Echo or Ring devices in your home. (Amazon &quot;helpfully&quot; turns it on by default.)</p><p>It offers some conveniences. After all, that Alexa speaker way out in your garage might have an easier time connecting to your neighbor&apos;s Ring floodlight than your own WiFi router.</p><p>But features like this raise a big question. How much access to your devices and network is an IoT device manufacturer entitled to? Is it OK for Amazon to use Sidewalk to transmit logistics data from its trucks and handheld devices over your network? Could they sell an expensive IoT beacon service that allows third parties to send bits of data over a network you pay for using a device you own?</p><p>I&apos;m picking on Amazon here, but the same questions can be asked about any IoT device. If you buy a connected car, who owns the data it generates? Can it be sold to third parties?</p><p>I&apos;m a fan of IoT. Everything from my lightbulbs to my lawn sprinklers is connected. But I also think it&apos;s important for both companies and individuals deploying IoT devices to make sure they&apos;re actually in charge.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[IoT security margin of error]]></title>
            <link>https://paragraph.com/@axalane/iot-security-margin-of-error</link>
            <guid>BTuCvUzPlEitKuSACPLU</guid>
            <pubDate>Wed, 30 Mar 2022 23:39:29 GMT</pubDate>
            <description><![CDATA[One of the scary things about yesterday&apos;s IoT botnet example is that it doesn&apos;t take many product vendor security misfires to create one. Consider this example. In August 2021, content delivery network (CDN) provider Cloudflare absorbed an IoT botnet attack that was generating 17.2 million requests per second at its peak. Kind of a lot, right? The same botnet, known as Meris, took down Yandex (basically Russian Google) around the same time with an attack that peaked at 21.8 million ...]]></description>
            <content:encoded><![CDATA[<p>One of the scary things about <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/TdASKPHInoVnNx1HphCRttogit_M8IYswVOeZa43nbk">yesterday&apos;s IoT botnet example</a> is that it doesn&apos;t take many product vendor security misfires to create one.</p><p>Consider this example. In August 2021, content delivery network (CDN) provider Cloudflare absorbed an IoT botnet attack that was <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blog.cloudflare.com/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">generating 17.2 million requests per second</a> at its peak. Kind of a lot, right?</p><p>The same botnet, known as Meris, took down Yandex (basically Russian Google) around the same time with an attack that peaked at 21.8 million requests per second.</p><p>So you might think Meris must have enlisted many different kinds of IoT devices to pack that much punch, right?</p><p>Nope.</p><p>It is primarily powered by hijacked devices from a single vendor you&apos;ve probably never heard of: Latvian networking gear company MikroTik. (Meris is the Latvian word for &quot;plague,&quot; apparently.)</p><p>And the really scary part is that MikroTik released a patch for the vulnerability Meris exploits in 2018 and has been <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blog.mikrotik.com/security/meris-botnet.html">doing active outreach</a> to customers. But there are still a couple hundred thousand devices whose owners missed the memo.</p><p>So, this is a pretty good illustration of how narrow the margin of error is when it comes to getting IoT device security practices right.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[The rise of IoT botnets]]></title>
            <link>https://paragraph.com/@axalane/the-rise-of-iot-botnets</link>
            <guid>8yeHzZGZL4AKBO17VLan</guid>
            <pubDate>Wed, 30 Mar 2022 23:35:39 GMT</pubDate>
            <description><![CDATA[Yesterday, I noted that even if a small percentage of IoT devices are hijacked, it will significantly impact the broader universe of connected devices. How do we know that? Well, we&apos;ve already seen it happen. You may recall a day in October 2016 when it felt like a sizeable chunk of the Internet stopped working. Amazon? Nope. Slack? Nope. Netflix? Nope. Spotify? Nope. Twitter? Nope. And so on... This was caused by IoT botnet malware known as Mirai. Mirai scans the Internet for IoT device...]]></description>
            <content:encoded><![CDATA[<p>Yesterday, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/TdASKPHInoVnNx1HphCRttogit_M8IYswVOeZa43nbk">I noted</a> that even if a small percentage of IoT devices are hijacked, it will significantly impact the broader universe of connected devices.</p><p>How do we know that? Well, we&apos;ve already seen it happen.</p><p>You may recall a day in October 2016 when it felt like a sizeable chunk of the Internet stopped working. Amazon? Nope. Slack? Nope. Netflix? Nope. Spotify? Nope. Twitter? Nope. And so on...</p><p>This was caused by IoT botnet malware known as Mirai. Mirai scans the Internet for IoT devices using default login/password combos. When it finds them, it adds them to bot armies that perform distributed denial of service (DDoS) attacks. On this particular day, a Mirai botnet was aimed at DYN, a major domain name service (DNS) provider. So even though the services mentioned above weren&apos;t directly targeted, Mirai overwhelmed the address lookup mechanisms that we all rely on to reach them, effectively rendering them useless.</p><p>The source code to Mirai was released publicly, and mutations targeting ever-increasing varieties of IoT devices continue to appear years later. And as I&apos;ll cover tomorrow, new IoT botnets are now appearing alongside the Mirai variants.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[The scale of IoT risk]]></title>
            <link>https://paragraph.com/@axalane/the-scale-of-iot-risk</link>
            <guid>c3VvoQjkCoeCAA4SwwTw</guid>
            <pubDate>Wed, 30 Mar 2022 23:33:34 GMT</pubDate>
            <description><![CDATA[One thing that makes the IoT risk factors I mentioned yesterday so scary is the number of devices that will be in play. The number of devices that a human can use directly on a daily basis has a practical ceiling. I use four: laptop, smartphone, tablet, smartwatch. But most individual IoT devices aren&apos;t used directly by people. They&apos;re machine-to-machine (M2M) communicators. This means that the number of them that could someday be practical for me – or an enterprise or government – ...]]></description>
            <content:encoded><![CDATA[<p>One thing that makes <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/f_zvSTu1jki5BViUbGFdh0mOL2qe3fAs5llKHjCGQLc">the IoT risk factors I mentioned yesterday</a> so scary is the number of devices that will be in play.</p><p>The number of devices that a human can use directly on a daily basis has a practical ceiling. I use four: laptop, smartphone, tablet, smartwatch.</p><p>But most individual IoT devices aren&apos;t used directly by people. They&apos;re machine-to-machine (M2M) communicators. This means that the number of them that could someday be practical for me – or an enterprise or government – to use daily is practically limitless. In the not-so-distant future, connectivity will be assumed. It will be like we think about electricity today. Can you even guess how many devices around you use electricity?</p><p>According to the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html">Cisco Annual Internet Report</a>, 50 percent of the world&apos;s connected devices – 14.7 billion in total – will be M2M communicators by 2023. And this share will keep growing. According to the same report, the projected compound annual growth rate (CAGR) of M2M devices is 30 percent. To put that in perspective, smartphones are in second place at 7 percent CAGR.</p><p>So why does this matter from a security perspective?</p><p>The scale of connected IoT devices means that even if most companies making and deploying them have excellent security practices, a small percentage of irresponsible actors who allow their devices to be hijacked can have a devastating impact on the rest of the connected world.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Two factors driving IoT risk]]></title>
            <link>https://paragraph.com/@axalane/two-factors-driving-iot-risk</link>
            <guid>Nu6hszq4A3erCU0Xs0Ql</guid>
            <pubDate>Wed, 30 Mar 2022 23:32:15 GMT</pubDate>
            <description><![CDATA[While it&apos;s still early days, the Internet of Things (IoT) has moved from buzzy topic to real thing now. Many of the usual security risks, including the four digital supply chain security challenges I mentioned last week, are amplified by IoT. Why? Two big reasons:Low-cost devices are required to make IoT work. When product companies need to drive costs down, it&apos;s a recipe for (a) missed hardware and software vulnerabilities and (b) low incentive to invest in post-deployment support ...]]></description>
            <content:encoded><![CDATA[<p>While it&apos;s still early days, the Internet of Things (IoT) has moved from buzzy topic to real thing now. Many of the usual security risks, including the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/alk8hGaY63Oux6Pj-8qsxbDYmqikfBRWM45iQAcp_to">four digital supply chain security challenges</a> I mentioned last week, are amplified by IoT.</p><p>Why? Two big reasons:</p><ol><li><p>Low-cost devices are required to make IoT work. When product companies need to drive costs down, it&apos;s a recipe for (a) missed hardware and software vulnerabilities and (b) low incentive to invest in post-deployment support and updates.</p></li><li><p>Many IoT devices are aimed at consumers. As with things like social media, we&apos;re being drawn into many opportunities for fun and convenience that will likely bring along personal privacy hangovers later.</p></li></ol><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[The evolution of cloud-native security]]></title>
            <link>https://paragraph.com/@axalane/the-evolution-of-cloud-native-security</link>
            <guid>E5RVP4bBGP2KOuoyL1E3</guid>
            <pubDate>Wed, 30 Mar 2022 23:30:52 GMT</pubDate>
            <description><![CDATA[​Amazon famously promotes a shared responsibility model for cloud security. The short version:Amazon is responsible for security of the cloud.The customer is responsible for security in the cloud.AWS has cloud-native security features to help with this. But it&apos;s kind of on the customer to figure out how to best apply them alongside the rest of their security stack. This is a fairly defensible way to approach things. But I do think it opens up opportunities for other cloud players to do m...]]></description>
            <content:encoded><![CDATA[<p>​Amazon famously promotes a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://aws.amazon.com/compliance/shared-responsibility-model/">shared responsibility model</a> for cloud security.</p><p>The short version:</p><ul><li><p>Amazon is responsible for security <strong>of</strong> the cloud.</p></li><li><p>The customer is responsible for security <strong>in</strong> the cloud.</p></li></ul><p>AWS has cloud-native security features to help with this. But it&apos;s kind of on the customer to figure out how to best apply them alongside the rest of their security stack.</p><p>This is a fairly defensible way to approach things. But I do think it opens up opportunities for other cloud players to do more to show customers the way.</p><p>Google is making an interesting play on this front. I was a bit dismissive when they first announced their Siemplicity acquisition. But now that they&apos;ve <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.googlecloudpresscorner.com/2022-03-08-mgc">dropped another $5.4 billion on Mandiant</a>, there&apos;s a clear story coming into focus.</p><p>They now have:</p><ul><li><p>A <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cloud.google.com/beyondcorp-enterprise">substantive vision</a> around Zero Trust and proactive risk mitigation.</p></li><li><p>The combined capabilities of their Chronicle offering and Siemplicity to help customers detect threats and execute sophisticated response playbooks.</p></li><li><p>A premium set of research, advisory, and response services from Mandiant that also sets them up to be a leading industry voice and resource when large-scale security incidents break.</p></li></ul><p>These are still disparate pieces that need to come together more cohesively. But if they can bring it together into a more prescriptive cloud security blueprint – backed by cloud-native tools and experts on demand – it will be a compelling point of differentiation.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[A few more notes on Okta]]></title>
            <link>https://paragraph.com/@axalane/a-few-more-notes-on-okta</link>
            <guid>3zyjzpnPTljz6DVcVVqg</guid>
            <pubDate>Wed, 30 Mar 2022 23:29:01 GMT</pubDate>
            <description><![CDATA[Before I move on, here are a few more tidbits about the Okta breach that I found interesting: 1. The ring-leader of Lapsus$ is reportedly a teenager from the UK. 😲 2. Their techniques are very low-tech and focused on social engineering and bribery of insiders and supply chain partners, according to Microsoft (who, as you have heard, was also breached by Lapsus$). 3. In an open letter to Okta, Tenable CEO Amit Yoran provides an even better example of the power of competence + transparency tha...]]></description>
            <content:encoded><![CDATA[<p>Before I move on, here are a few more tidbits about the Okta breach that I found interesting:</p><p><strong>1.</strong> The ring-leader of Lapsus$ is reportedly <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.linkedin.com/posts/bkrebs_a-closer-look-at-the-lapsus-data-extortion-activity-6912527406549331968-mK7G">a teenager from the UK</a>. 😲</p><p><strong>2.</strong> Their techniques are very low-tech and focused on social engineering and bribery of insiders and supply chain partners, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/">according to Microsoft</a> (who, as you have heard, was also breached by Lapsus$).</p><p><strong>3.</strong> In <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.linkedin.com/pulse/open-letter-okta-amit-yoran/">an open letter to Okta</a>, Tenable CEO Amit Yoran provides an even better example of the power of competence + transparency than the one <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/1djT1KZ7VwtN9PAp4Rvs_1Uk9AG-swX16ew8uctrHgg">I offered yesterday</a>:</p><p>Trust is built on transparency and corporate responsibility, and demands both. I’ve been in the space long enough to know that security is imperfect. Even Mandiant was breached. But they had the fortitude and competence to provide as much detail as they could. And they remain one of the most trusted brands in security as a result.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Competence + Transparency = Trust]]></title>
            <link>https://paragraph.com/@axalane/competence-transparency-trust</link>
            <guid>QeqPvmutRN3Antdg8rbP</guid>
            <pubDate>Wed, 30 Mar 2022 23:26:43 GMT</pubDate>
            <description><![CDATA[So, it looks like we&apos;re going to get to watch a supply chain security incident unfold in real-time. As noted briefly in yesterday&apos;s email, it wasn&apos;t a great day for Okta. But rather than piling on with criticism of Okta&apos;s response, take a master class in supply chain security crisis response from Cloudflare. A major security vendor in their own right, Cloudflare was one of the Okta customers whose information was visible in the screenshots shared by the Lapsus$ hacking gro...]]></description>
            <content:encoded><![CDATA[<p>So, it looks like we&apos;re going to get to watch a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/-nuGX7etY9izRVfwAMAoWg0WokjJ_OMMD1Gw3VpfNpE">supply chain security incident</a> unfold in real-time. As noted briefly in yesterday&apos;s email, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.okta.com/blog/2022/03/updated-okta-statement-on-lapsus/">it wasn&apos;t a great day</a> for Okta.</p><p>But rather than piling on with criticism of Okta&apos;s response, take a master class in supply chain security crisis response from Cloudflare. A major security vendor in their own right, Cloudflare was one of the Okta customers whose information was visible in the screenshots shared by the Lapsus$ hacking group.</p><p>Even as their own incident response was unfolding, Cloudflare CEO Matthew Prince was out with <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/eastdakota/status/1506143353544478724">an initial Tweet acknowledging the issue</a> at 1:38 a.m. Eastern time. By early yesterday afternoon, there was <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blog.cloudflare.com/cloudflare-investigation-of-the-january-2022-okta-compromise/">a blog post up</a> with a down-to-the-minute account of Cloudflare&apos;s response activities, initial findings, and next steps.</p><p>During a crisis, there&apos;s a natural tendency to wait until you have all of the answers to communicate. But putting your competence on display early – even if you&apos;re working with imperfect information – is the best way to build trust.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Four digital supply chain risks]]></title>
            <link>https://paragraph.com/@axalane/four-digital-supply-chain-risks</link>
            <guid>KfwgD5KVOd2ibM7e59re</guid>
            <pubDate>Wed, 30 Mar 2022 23:19:32 GMT</pubDate>
            <description><![CDATA[Yesterday, I shared a few reasons why digital supply chain security should be top of mind for security leaders and vendors that support them. In addition to the challenge of extending security across company boundaries, supply chain security is complicated by the fact that it comes in many different flavors. I can think of at least four: 1. Software vulnerabilities: Does third-party software I use to build my products or run my business have vulnerabilities? (Think SolarWinds and Log4Shell.) ...]]></description>
            <content:encoded><![CDATA[<p>Yesterday, I shared a few reasons why <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/-nuGX7etY9izRVfwAMAoWg0WokjJ_OMMD1Gw3VpfNpE">digital supply chain security</a> should be top of mind for security leaders and vendors that support them.</p><p>In addition to the challenge of extending security across company boundaries, supply chain security is complicated by the fact that it comes in many different flavors.</p><p>I can think of at least four:</p><p><strong>1. Software vulnerabilities:</strong> Does third-party software I use to build my products or run my business have vulnerabilities? (Think SolarWinds and Log4Shell.)</p><p><strong>2. Hardware vulnerabilities:</strong> Does my product include third-party hardware that has hidden vulnerabilities? (Think Spectre and Meltdown.)</p><p><strong>3. Platform provider compromises:</strong> If one of my cloud or SaaS providers is breached, will my sensitive data be compromised? (Think <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.wsj.com/articles/okta-investigates-reports-of-a-digital-breach-11647931174">Okta today</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.securityweek.com/cryptocurrency-services-hit-data-breach-crm-company-hubspot">Hubspot a few days ago</a>.)</p><p><strong>4. Partner infrastructure compromises:</strong> If a supply chain partner is breached, will it provide a possible entry point into my infrastructure? (Think <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.zdnet.com/article/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned/">infamous Target breach</a> that originated with a small HVAC vendor.)</p><p>In short, digital supply chain security is a complex problem that nearly all security buyers now face. And there&apos;s lots of evidence that it can&apos;t be ignored.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Securing the digital supply chain]]></title>
            <link>https://paragraph.com/@axalane/securing-the-digital-supply-chain</link>
            <guid>axKJaEg6AghjIayNtwUd</guid>
            <pubDate>Wed, 30 Mar 2022 23:18:19 GMT</pubDate>
            <description><![CDATA[Let&apos;s kick off this week&apos;s run through my top security topics with securing the digital supply chain. What does it actually mean? These days, nearly every technology product or service is built through collaboration across multiple companies. So securing them effectively requires tools and practices that extend across organizational boundaries. And guess what: this doesn&apos;t happen very much. Why is it interesting?Two of the most catastrophic security incidents of the last severa...]]></description>
            <content:encoded><![CDATA[<p>Let&apos;s kick off this week&apos;s run through <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/rIC09qU4k1aR3xWmFd6uxc45n41FwvzkrkgKOH6Mh3I">my top security topics</a> with securing the digital supply chain.</p><p><strong>What does it actually mean?</strong></p><p>These days, nearly every technology product or service is built through collaboration across multiple companies. So securing them effectively requires tools and practices that extend across organizational boundaries. And guess what: this doesn&apos;t happen very much.</p><p><strong>Why is it interesting?</strong></p><ol><li><p>Two of the most catastrophic security incidents of the last several years, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.mandiant.com/resources/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor">SolarWinds</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://logging.apache.org/log4j/2.x/security.html">Log4Shell</a>, were supply chain attacks.</p></li><li><p>Managing security across organizational silos within a single company is hard enough. Coordinating across companies takes the degree of difficulty much higher.</p></li><li><p>We&apos;re already getting clobbered on software supply chain attacks alone. But as I&apos;ll dive deeper into tomorrow, this is just one of several possible supply chain attack vectors.</p></li></ol><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[My top security topics]]></title>
            <link>https://paragraph.com/@axalane/my-top-security-topics</link>
            <guid>dUJhkYrx3lZXS9Wzh1bM</guid>
            <pubDate>Wed, 30 Mar 2022 23:16:56 GMT</pubDate>
            <description><![CDATA[One of the best things about working in cybersecurity is that it&apos;s always changing. There are always new things to learn and think about. Here are some of the areas of security that I&apos;m thinking about the most right now:Securing the digital supply chainThe evolution of cloud-native securityInternet of Things (IoT) securityThe human element of securitySecuring web3 and blockchainI&apos;ll take them one by one this week and share some quick thoughts on why I think they&apos;re interes...]]></description>
            <content:encoded><![CDATA[<p>One of the best things about working in cybersecurity is that it&apos;s always changing. There are always new things to learn and think about.</p><p>Here are some of the areas of security that I&apos;m thinking about the most right now:</p><ul><li><p>Securing the digital supply chain</p></li><li><p>The evolution of cloud-native security</p></li><li><p>Internet of Things (IoT) security</p></li><li><p>The human element of security</p></li><li><p>Securing web3 and blockchain</p></li></ul><p>I&apos;ll take them one by one this week and share some quick thoughts on why I think they&apos;re interesting.</p><p>Which security trends or topics are on your mind right now?</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Do founders need to be storytellers?]]></title>
            <link>https://paragraph.com/@axalane/do-founders-need-to-be-storytellers</link>
            <guid>shjwDkrI7E7ctCwkgY6X</guid>
            <pubDate>Wed, 30 Mar 2022 23:13:36 GMT</pubDate>
            <description><![CDATA[I recently finished reading "Founder Brand" by Dave Gerhardt. It&apos;s a fast and interesting read that&apos;s worth checking out. The general premise is that the best way for a startup to get attention – especially while the product is still taking shape – is to make the founder&apos;s ideas and personal brand the focal point and go direct to your audience through channels like social media and podcasts. I love the idea of replacing outdated B2B marketing rituals with a more human approach....]]></description>
            <content:encoded><![CDATA[<p>I recently finished reading <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.amazon.com/Founder-Brand-Story-Competitive-Advantage-ebook/dp/B09PMHFJLK/">&quot;Founder Brand&quot;</a> by Dave Gerhardt. It&apos;s a fast and interesting read that&apos;s worth checking out.</p><p>The general premise is that the best way for a startup to get attention – especially while the product is still taking shape – is to make the founder&apos;s ideas and personal brand the focal point and go direct to your audience through channels like social media and podcasts.</p><p>I love the idea of replacing outdated B2B marketing rituals with a more human approach. I also think it&apos;s a great way to build buzz during the early days without resorting to pitching vaporware.</p><p>But the idea of making the story too much about one person resonates with me less. If you have (or if you are) a founder who was born to operate in this way, by all means, use that to your advantage. But I&apos;ve also met many highly effective founders who aren&apos;t well-suited to this role.</p><p>In my mind, these concepts become even more powerful when you make them part of your broader culture and empower people to lean into their strengths.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Setting your positioning aperture]]></title>
            <link>https://paragraph.com/@axalane/setting-your-positioning-aperture</link>
            <guid>PpLjAj7rcYqbPXGydqHO</guid>
            <pubDate>Wed, 30 Mar 2022 23:13:06 GMT</pubDate>
            <description><![CDATA[One of the most challenging aspects of positioning a cybersecurity startup is deciding how broad to go. If you show a picture that is too expansive – or too far beyond your current capabilities – you&apos;ll likely have difficulty generating sales momentum. But if the story is too narrowly focused, your company may seem too tactical to get buyers excited. I like to think of positioning at different stages of the startup journey like setting the aperture on a camera lens. The scene that you&ap...]]></description>
            <content:encoded><![CDATA[<p>One of the most challenging aspects of positioning a cybersecurity startup is deciding how broad to go. If you show a picture that is too expansive – or too far beyond your current capabilities – you&apos;ll likely have difficulty generating sales momentum. But if the story is too narrowly focused, your company may seem too tactical to get buyers excited.</p><p>I like to think of positioning at different stages of the startup journey like setting the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/Aperture">aperture</a> on a camera lens. The scene that you&apos;re photographing – in this case, your company&apos;s long-term vision – doesn&apos;t change. But how much you choose to bring into focus for the viewer at different stages of your company&apos;s journey can.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Two types of narratives]]></title>
            <link>https://paragraph.com/@axalane/two-types-of-narratives</link>
            <guid>x5Kc70vXfTf4jGt3KcOc</guid>
            <pubDate>Wed, 30 Mar 2022 23:11:31 GMT</pubDate>
            <description><![CDATA[Regardless of the positioning style you choose, creating one or more "narratives" will bring it to life. So what is a narrative? Simply stated, it&apos;s a story about your buyer that helps them understand how their life will be different with your company in it. Depending on your positioning style, you might employ one of two types of narratives:A "strategic narrative" that lives at the top of your positioning hierarchy and frames a major industry shift.One or more "sales narratives" that si...]]></description>
            <content:encoded><![CDATA[<p>Regardless of the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/egTUWjZatLV7VnRWMgZRMMpn0dnvMvQwxj_f-E3FF-M">positioning style</a> you choose, creating one or more &quot;narratives&quot; will bring it to life.</p><p>So what is a narrative?</p><p>Simply stated, it&apos;s a story about <strong>your buyer</strong> that helps them understand how their life will be different with your company in it. Depending on your positioning style, you might employ one of two types of narratives:</p><ul><li><p>A &quot;strategic narrative&quot; that lives at the top of your positioning hierarchy and frames a major industry shift.</p></li><li><p>One or more &quot;sales narratives&quot; that sit beneath your overall positioning and speak to specific buyer pain points – and your unique point of view about them.</p></li></ul><p>For most cybersecurity startups, I recommend the latter. Major shifts in the security landscape are very real. But it&apos;s very difficult for security startups to stake an exclusive claim to them. Plus, most security buyers evolve their security strategies in iterative steps.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Choosing a positioning style]]></title>
            <link>https://paragraph.com/@axalane/choosing-a-positioning-style</link>
            <guid>v6SwXetdmttxSuBloXCd</guid>
            <pubDate>Wed, 30 Mar 2022 23:06:12 GMT</pubDate>
            <description><![CDATA[Yesterday, I shared three types of positioning document formats. So which is right for your cybersecurity startup? I don&apos;t think an old-school "fill in the blanks" positioning statement provides much value. Choosing from the other two options really comes down to your category definition approach. If you&apos;re trying to define a new category – or radically redefine an existing one – I think the Andy Raskin-style "strategic narrative" approach is a great way to go. But as I noted in an ...]]></description>
            <content:encoded><![CDATA[<p>Yesterday, I shared <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/egTUWjZatLV7VnRWMgZRMMpn0dnvMvQwxj_f-E3FF-M">three types of positioning document</a> formats. So which is right for your cybersecurity startup?</p><p>I don&apos;t think an old-school &quot;fill in the blanks&quot; positioning statement provides much value. Choosing from the other two options really comes down to your category definition approach.</p><p>If you&apos;re trying to define a new category – or radically redefine an existing one – I think <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://medium.com/the-mission/the-greatest-sales-deck-ive-ever-seen-4f4ef3391ba0">the Andy Raskin-style &quot;strategic narrative&quot; approach</a> is a great way to go.</p><p>But as I <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/YstCTjobGszjtVMvLWwp52e-omA1CB8rXA2EnDxUweY">noted in an earlier email</a>, most security startups probably shouldn&apos;t try to define a new category. That&apos;s why I think the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.aprildunford.com/obviously-awesome">April Dunford-style positioning canvas</a> is the ideal approach for most.</p><p>This approach keeps you focused on specific buyer pain points and forces your leadership team to eliminate ambiguity in your strategy. At the same time, the document remains high-level enough that it doesn&apos;t become a &quot;boil the ocean&quot; exercise.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Three types of positioning documents]]></title>
            <link>https://paragraph.com/@axalane/three-types-of-positioning-documents</link>
            <guid>Ve32PoR5E9B3U1EFFoEV</guid>
            <pubDate>Wed, 30 Mar 2022 23:03:01 GMT</pubDate>
            <description><![CDATA[Even when leadership teams buy into the importance of positioning, it isn&apos;t always obvious what the actual output of a positioning exercise should be. There are a few schools of thought on this. 1. Positioning Statement In "Crossing the Chasm," Geoffrey Moore shared one of the most commonly used positioning statement templates:For (target customer) who (statement of the need or opportunity), the (product name) is a (product category) that (statement of key benefit – that is, compelling r...]]></description>
            <content:encoded><![CDATA[<p>Even when leadership teams buy into the importance of positioning, it isn&apos;t always obvious what the actual output of a positioning exercise should be. There are a few schools of thought on this.</p><p><strong>1. Positioning Statement</strong></p><p>In <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.harpercollins.com/products/crossing-the-chasm-3rd-edition-geoffrey-a-moore?variant=32130444066850">&quot;Crossing the Chasm,&quot;</a> Geoffrey Moore shared one of the most commonly used positioning statement templates:</p><blockquote><p>For (target customer) who (statement of the need or opportunity), the (product name) is a (product category) that (statement of key benefit – that is, compelling reason to buy). Unlike (primary competitive alternative), our product (statement of primary differentiation).&quot;</p></blockquote><p><strong>2. Positioning Document</strong></p><p>Trying to force your positioning into a pre-defined statement like the one above can be kind of annoying and unhelpful. In <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.aprildunford.com/obviously-awesome">her book &quot;Obviously Awesome,&quot;</a> April Dunford does an excellent job of articulating why:</p><blockquote><p>One of my biggest complaints about the positioning statement was that the statement itself was too brief to communicate the subtleties of a product&apos;s position, and at the same time too contrived and awkward to be memorized or repeated.</p></blockquote><p>She provides an alternative in the form of a &quot;positioning canvas&quot; document that is still very concise but focuses on key elements of positioning that matter – like category, alternatives, unique value, etc.</p><p><strong>3. A Sales Deck That Does the Job</strong></p><p>Finally, one emerging trend promoted by smart people like <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://andyraskin.com/">Andy Raskin</a> is to lean on your sales deck as the definitive home of your company&apos;s positioning. In fact, he takes it a step further and advocates thinking about the story as the master articulation of your company strategy. In other words, don&apos;t get hung up on positioning documents that no one will ever look at. Nail the strategic narrative, get the whole company aligned, and live it every day.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Whose job is positioning?]]></title>
            <link>https://paragraph.com/@axalane/whose-job-is-positioning</link>
            <guid>iKD9Pk7Z0n2BcXUYXQNW</guid>
            <pubDate>Wed, 30 Mar 2022 20:56:42 GMT</pubDate>
            <description><![CDATA[Yesterday, I wrote about some of the adverse effects that the wrong positioning can have on a startup. So whose job is it to get it right? While I&apos;m a bit biased, I think product marketing should lead the effort. But it requires involvement from all aspects of the business. Why?Your founder and/or CEO knows more than anyone about your company&apos;s strategy.Sales knows more than anyone about the alternatives prospects are considering – and how any existing positioning is landing.Marketi...]]></description>
            <content:encoded><![CDATA[<p>Yesterday, I <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/axalane.eth/l7SunoKrLcOUg6Zl8H5Cqcz_fzYCbu8AhBrrOVxH8l8">wrote about</a> some of the adverse effects that the wrong positioning can have on a startup. So whose job is it to get it right?</p><p>While I&apos;m a bit biased, I think product marketing should lead the effort. But it requires involvement from all aspects of the business.</p><p>Why?</p><ul><li><p>Your founder and/or CEO knows more than anyone about your company&apos;s strategy.</p></li><li><p>Sales knows more than anyone about the alternatives prospects are considering – and how any existing positioning is landing.</p></li><li><p>Marketing has data about whether leads are converting and advancing – and within which customer segments.</p></li><li><p>Product knows more than anyone about what makes your product unique.</p></li><li><p>Customer success knows more than anyone whether your product is living up to the expectations your positioning sets.</p></li></ul><p>-Doug​</p><p>​</p><p>​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
        <item>
            <title><![CDATA[Symptoms of bad positioning]]></title>
            <link>https://paragraph.com/@axalane/symptoms-of-bad-positioning</link>
            <guid>VyDWDmGS7oiOZlmW4Te4</guid>
            <pubDate>Wed, 30 Mar 2022 20:56:10 GMT</pubDate>
            <description><![CDATA[When startups don&apos;t position themselves with intention, the adverse effects aren&apos;t always apparent. But consider these symptoms that startups struggling to gain traction often exhibit:Difficulty generating leadsProspects don&apos;t get itProspects mistake it for something it&apos;s notProspects get it but don&apos;t see the valueProspects get it, see the value, but don&apos;t see it as a priorityThe key to curing these symptoms is finding the intersection of what your company is goo...]]></description>
            <content:encoded><![CDATA[<p>When startups don&apos;t position themselves with intention, the adverse effects aren&apos;t always apparent. But consider these symptoms that startups struggling to gain traction often exhibit:</p><ul><li><p>Difficulty generating leads</p></li><li><p>Prospects don&apos;t get it</p></li><li><p>Prospects mistake it for something it&apos;s not</p></li><li><p>Prospects get it but don&apos;t see the value</p></li><li><p>Prospects get it, see the value, but don&apos;t see it as a priority</p></li></ul><p>The key to curing these symptoms is finding the intersection of what your company is good at, why, and who cares about these things the most.</p><p>That&apos;s positioning.</p><p>-Doug​</p>]]></content:encoded>
            <author>axalane@newsletter.paragraph.com (Doug Lane)</author>
        </item>
    </channel>
</rss>