Venture in Security
Subscribe
Sign in
Home
Cyber for Builders Book
Sponsor
Top Posts
Inside the Network Podcast
Archive
About
Latest
Top
Discussions
The real dilemmas of cybersecurity startup ideation, discovery, and validation
Sharing some lessons learned about startup ideation
Aug 26
•
Ross Haleliuk
34
Share this post
Venture in Security
The real dilemmas of cybersecurity startup ideation, discovery, and validation
Copy link
Facebook
Email
Notes
More
PAM is not dead, it’s evolving
PAM following Palo Alto's acquisition of CyberArk
Aug 19
•
Shashwat Sehgal
33
Share this post
Venture in Security
PAM is not dead, it’s evolving
Copy link
Facebook
Email
Notes
More
To solve security problems, you don’t have to build a security company
Security as a byproduct often leads to more lasting security impact than security as the product.
Aug 12
•
Ross Haleliuk
32
Share this post
Venture in Security
To solve security problems, you don’t have to build a security company
Copy link
Facebook
Email
Notes
More
20 years of cybersecurity consolidation: how 200 companies became 11
The most comprehensive illustration ever made of how our industry has consolidated over the past 20 years, showing how 200 companies turned into just…
Aug 5
•
Ross Haleliuk
35
Share this post
Venture in Security
20 years of cybersecurity consolidation: how 200 companies became 11
Copy link
Facebook
Email
Notes
More
July 2025
Cyber favors seconds: second movers, second-time founders, and second opinions
In cyber, the firsts rarely win big
Jul 29
•
Ross Haleliuk
21
Share this post
Venture in Security
Cyber favors seconds: second movers, second-time founders, and second opinions
Copy link
Facebook
Email
Notes
More
1
In security, not every industry problem is a business problem
Looking at the difference between industry problems and business problems and what this means for cybersecurity founders
Jul 22
•
Ross Haleliuk
23
Share this post
Venture in Security
In security, not every industry problem is a business problem
Copy link
Facebook
Email
Notes
More
1
Cybersecurity is changing how financial markets work but not in the way people think
Looking at how VCs, PE firms, and acquirers are rethinking cybersecurity and what this means for the future of our industry
Jul 16
•
Ross Haleliuk
25
Share this post
Venture in Security
Cybersecurity is changing how financial markets work but not in the way people think
Copy link
Facebook
Email
Notes
More
4
You don’t start a platform, you earn the right to become one
Together with Shashwat Sehgal, we are looking at four stages of building a platform and what this means for founders and investors
Jul 10
•
Ross Haleliuk
and
Shashwat Sehgal
20
Share this post
Venture in Security
You don’t start a platform, you earn the right to become one
Copy link
Facebook
Email
Notes
More
10 immutable laws of security, 25 years later
Looking at "10 Immutable Laws of Security", which celebrated its 25th Year Anniversary a few weeks ago, and sharing some thoughts about the relevance of…
Jul 8
•
Ross Haleliuk
59
Share this post
Venture in Security
10 immutable laws of security, 25 years later
Copy link
Facebook
Email
Notes
More
2
AppSec/ProdSec's reality gap: why theory doesn't match practice
A deep dive into the the problems in application and product security - a guest article from Nielet D'Mello
Jul 1
•
Ross Haleliuk
and
Nielet D'mello
23
Share this post
Venture in Security
AppSec/ProdSec's reality gap: why theory doesn't match practice
Copy link
Facebook
Email
Notes
More
2
June 2025
Competing with layer zero in cybersecurity
Exploring the idea of a “layer zero” - why it matters, what makes it powerful, and how security startups can strategically position themselves around…
Jun 24
•
Ross Haleliuk
27
Share this post
Venture in Security
Competing with layer zero in cybersecurity
Copy link
Facebook
Email
Notes
More
10
Owning the control point in cybersecurity
Exploring the idea of a “control point” - why it matters, what makes it powerful, and how security startups can strategically position themselves around…
Jun 17
•
Ross Haleliuk
36
Share this post
Venture in Security
Owning the control point in cybersecurity
Copy link
Facebook
Email
Notes
More
3
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts