<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Venture in Security]]></title><description><![CDATA[Helping security practitioners, entrepreneurs, investors and executives build the future of cybersecurity]]></description><link>https://ventureinsecurity.net</link><image><url>https://substackcdn.com/image/fetch/$s_!PV2P!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86fcb772-b0a3-43e4-ab8c-33c6bfa2378f_1181x1181.png</url><title>Venture in Security</title><link>https://ventureinsecurity.net</link></image><generator>Substack</generator><lastBuildDate>Tue, 14 Apr 2026 13:15:53 GMT</lastBuildDate><atom:link href="https://ventureinsecurity.net/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ross Haleliuk]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[ventureinsecurity@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[ventureinsecurity@substack.com]]></itunes:email><itunes:name><![CDATA[Ross Haleliuk]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ross Haleliuk]]></itunes:author><googleplay:owner><![CDATA[ventureinsecurity@substack.com]]></googleplay:owner><googleplay:email><![CDATA[ventureinsecurity@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ross Haleliuk]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Blind Men and the Elephant: the story of cybersecurity]]></title><description><![CDATA[Our view of cybersecurity is defined by our backgrounds, and that perspective is usually very limiting]]></description><link>https://ventureinsecurity.net/p/blind-men-and-the-elephant-the-story</link><guid isPermaLink="false">https://ventureinsecurity.net/p/blind-men-and-the-elephant-the-story</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 07 Apr 2026 21:09:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SZxy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1 style="text-align: justify;">Blind men and the elephant</h1><p style="text-align: justify;">There&#8217;s an old story about a group of blind people who come across an elephant for the first time. Since they can&#8217;t see it, each of them tries to understand what it is by touching a different part. One person grabs the trunk and says the elephant is like a snake, another feels a leg and says it&#8217;s like a tree, a third touches the ear and thinks it&#8217;s like a big fan, and someone else holds the tail and says it&#8217;s like a rope. Each of them is sure they are right, because what they feel is real to them, and they definitely are, even if they don&#8217;t fully realize that each of them only has one part of the story. I&#8217;ve seen different versions of this story; in some, people start arguing and fighting over who is right, and in others, they work together to complement each other&#8217;s learning and perspectives.</p><div><hr></div><p>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought to you</a> by... <a href="https://www.island.io/videos/watch-a-demo-of-islands-ai-protect?utm_medium=email&amp;utm_source=influencer&amp;utm_campaign=influencer_ventureinsecurity_ai&amp;utm_content=ai_protect_demo&amp;utm_creative_format=newsletter">Island</a>.</p><h4><a href="https://www.island.io/videos/watch-a-demo-of-islands-ai-protect?utm_medium=email&amp;utm_source=influencer&amp;utm_campaign=influencer_ventureinsecurity_ai&amp;utm_content=ai_protect_demo&amp;utm_creative_format=newsletter">Say Yes to AI&#8212;Without Leaking Your Data</a></h4><p>Employees are already using AI tools, whether you&#8217;ve approved them or not. The real risk isn&#8217;t AI itself. It&#8217;s sensitive data slipping into prompts with zero visibility or control.</p><p>Island AI Protect secures AI at the point of use: the browser. It monitors every prompt and response in real time, blocking or redacting sensitive data while giving security and IT teams full visibility into AI usage.</p><p>No bans. No friction. Just safe, governed AI adoption.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.island.io/videos/watch-a-demo-of-islands-ai-protect?utm_medium=email&amp;utm_source=influencer&amp;utm_campaign=influencer_ventureinsecurity_ai&amp;utm_content=ai_protect_demo&amp;utm_creative_format=newsletter&quot;,&quot;text&quot;:&quot;Watch how AI Protect works in action&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.island.io/videos/watch-a-demo-of-islands-ai-protect?utm_medium=email&amp;utm_source=influencer&amp;utm_campaign=influencer_ventureinsecurity_ai&amp;utm_content=ai_protect_demo&amp;utm_creative_format=newsletter"><span>Watch how AI Protect works in action</span></a></p><div><hr></div><p style="text-align: justify;">I am sure you already understand where I am going with this, and if you do, you are probably almost right. I say &#8220;almost&#8221; because there are two ways in which this story manifests itself in security.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SZxy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SZxy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png 424w, https://substackcdn.com/image/fetch/$s_!SZxy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png 848w, https://substackcdn.com/image/fetch/$s_!SZxy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png 1272w, https://substackcdn.com/image/fetch/$s_!SZxy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SZxy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png" width="1456" height="1235" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1235,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SZxy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png 424w, https://substackcdn.com/image/fetch/$s_!SZxy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png 848w, https://substackcdn.com/image/fetch/$s_!SZxy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png 1272w, https://substackcdn.com/image/fetch/$s_!SZxy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4079c47-c423-4bee-86be-bc42430ec31a_1600x1357.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: justify;">Image Source:<a href="https://sketchplanations.com/the-blind-and-the-elephant"> Sketchplanations</a></p><h1 style="text-align: justify;">Our individual backgrounds define how we see security</h1><p style="text-align: justify;">There are many things about cybersecurity I find fascinating, but one of the biggest is that, as an industry, we can&#8217;t agree on what security is, how to do it well, or even what matters most. I&#8217;ve realized that this isn&#8217;t random, and everything comes down to where people come from. How someone sees security is largely defined by the roles they&#8217;ve held, the kinds of companies they&#8217;ve worked in, and what they&#8217;ve been responsible for.</p><p style="text-align: justify;">A big reason for this, I think, is that very few people actually go to school to study security in a formal way. That&#8217;s very different from other fields, where everyone spends a few years building the same foundation at school before starting to work. Sure, people pivot careers everywhere, but most accountants study accounting, most biologists study biology, and so on (I haven&#8217;t checked the data, so take this as anecdotal, but it generally holds up). In security, there isn&#8217;t much of a shared baseline. People come in from all walks of life, learn on the job, and only later pick up more standardized knowledge through certifications or experience. That&#8217;s what makes our industry so diverse, but also why perspectives we hear can vary so much from one person to another.</p><p style="text-align: justify;">While everyone&#8217;s experience is definitely unique, I think you can often tell how someone thinks about security just by understanding their background. It&#8217;s not a perfect rule (people are more complex than that), but I think I can say that more often than not, these generalizations are at least somewhat true.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1 style="text-align: justify;">Six examples of how our backgrounds inform how we see security</h1><h2 style="text-align: justify;">Security leaders with a background in software and security engineering</h2><p style="text-align: justify;">Security professionals and leaders with a background in software engineering tend to see cybersecurity as a technical problem that can be solved with better systems, better design and architecture, and more consistent processes.</p><p style="text-align: justify;">Former engineers turned security leaders tend to see security as something you can build and improve through better systems. They think in terms of architecture, automation, and fixing problems at the source, which is why their teams are often more engineering-driven. They are more likely to build their own detections, create internal tools, and design systems that are secure by default. In tech companies, especially, where customers often ask how their data is protected, CISOs sit closer to revenue than in most other industries, which is why when you hear someone talk about security as a competitive advantage, they&#8217;re often coming from tech background. Not surprisingly, many companies in the Bay Area, and tech companies more broadly, hire heavily from this pool of candidates.</p><h2 style="text-align: justify;">Security leaders with a background in IT</h2><p style="text-align: justify;">Security professionals and leaders with a background in IT and infrastructure security often come from much more complex environments than their software engineering peers, where security is a part of keeping the business running. They know that not every company is a software company, and that sometimes you have to secure what you have because you don&#8217;t have the luxury of rebuilding the entire infrastructure from scratch. They focus on managing systems, controlling access, patching vulnerabilities, minimizing downtime, and designing processes that enforce consistency at a large scale. This may sound less exciting than building new tools, but it&#8217;s exactly what their companies need to stay secure. When you&#8217;re dealing with 5,000 to 50,000 employees across different states or countries, each with its own constraints, security becomes less about having a flashy solution and more about maintaining visibility, control, and reliability across a very large and complex environment.</p><h2 style="text-align: justify;">Security leaders with a background in law enforcement</h2><p style="text-align: justify;">Security professionals and leaders with a background in law enforcement often approach cybersecurity through the lens of investigation and accountability. They are used to thinking in terms of cases, i.e., what happened, who was involved, and how to put together a clear story from incomplete information. This often (but as I&#8217;ve said, not always) influences how they build security programs, with a strong emphasis on visibility, detection, and understanding events after the fact, not just preventing them upfront. They tend to be especially strong in areas like incident response, forensics, and insider threat detection. There&#8217;s a good number of ex-FBI and ex-police security leaders, and from what I&#8217;ve seen, they are very strong when it comes to bringing structure and rigor to investigations, asking the right questions, and making the organization truly understand and learn from security incidents.</p><h2 style="text-align: justify;">Security leaders with a military background</h2><p style="text-align: justify;">Security professionals and leaders with a military background often think of security as a matter of defense strategy, planning, and execution. They focus on protecting critical assets, preparing for different attack scenarios, and making sure the organization can respond in a structured and coordinated way. There is a large number of ex-military CISOs, and if there&#8217;s one thing I&#8217;ve seen many of them have in common, it&#8217;s their ability to invest heavily in preparation before something goes wrong, and always having a solid plan in place. CISOs who are ex-service members are especially strong at building disciplined programs with clear roles, defined processes, and strong communication. I&#8217;ve seen several times that when incidents happen, they are the best to bring structure and make sure everyone knows what to do and how to move forward without chaos.</p><h2 style="text-align: justify;">Security leaders with strong experience in compliance</h2><p style="text-align: justify;">Security professionals and leaders with a compliance background tend to think in terms of building comprehensive risk management programs, aligned with frameworks relevant to their organization. They like to make sure that at any time, the organization can show that it is doing the right things, has the right controls, and that all of the security efforts map to some objective requirements. I&#8217;ve noticed that CISOs who spent some time in GRC are especially strong at building documented, repeatable, and defensible programs.</p><h2 style="text-align: justify;">Security leaders with experience in law</h2><p style="text-align: justify;">Even though there aren&#8217;t as many lawyers pivoting careers in security, I have met a few. Based on what I&#8217;ve seen, they tend to look at cybersecurity through the lens of risk, responsibility, and consequences. The people I&#8217;ve talked to seem to focus a lot on liability and making sure the organization is protected when things go wrong, and care a lot about liability exposure, contractual obligations, and minimizing legal and financial risk.</p><h1 style="text-align: justify;">Each of them is right, and they are all wrong</h1><p style="text-align: justify;">There is most definitely an infinite number of ways we can categorize people&#8217;s backgrounds. Some start in a security operations center, others as auditors, and some, such as George Kurtz, founder &amp; CEO of CrowdStrike, as Certified Public Accountants. The examples I mention here are just the ones that come to mind as I am thinking about people I&#8217;ve met, but they are in no way exhaustive. I have, for example, met a former HR who became a CISO (such a fascinating journey!).</p><p style="text-align: justify;">The most important part is that, depending on people&#8217;s backgrounds, they see cybersecurity differently. Ask a former engineer, and they&#8217;ll talk about systems, architecture, and how things break; ask someone from compliance, and they&#8217;ll focus on controls, frameworks, and audit readiness; ask someone with a military or intelligence background, and they&#8217;ll think in terms of adversaries, detection, and response under pressure. Each person in security comes with a completely different mental model. So who&#8217;s right? They are all right, and they are all wrong at the same time. Like in that old story about the blind people and the elephant, each perspective is important, but none of them sees the whole picture.</p><h1 style="text-align: justify;">There&#8217;s no single right way to secure a company, because there&#8217;s no single definition of what needs to be secured</h1><p style="text-align: justify;">The second dimension we need to keep in mind is that every company has different security needs. The way you would secure a B2B SaaS platform is very different from the way you would secure a bank with 1,500 branches all over the U.S., which, in turn, is very different from how you&#8217;d secure an international cruise line, or a firm that manufactures dental implants, or a hospital&#8230; When you pause for a moment and think about it, I am sure it will make sense, but way too often we as an industry conveniently forget about this reality. There&#8217;s no single right way to secure a company, because there&#8217;s no single definition of what needs to be secured. Every industry comes with different infrastructure, every company is at a different stage of maturity, and everything considered, you truly need to understand where they are to suggest that they need to do something. Which brings us exactly where we started - that Blind Men and the Elephant is the story of cybersecurity.</p><p style="text-align: justify;">It&#8217;s a mistake to believe that any one view about security is enough, or that any one approach is the right way to secure every company. Real security comes from understanding the system, the business, the risks, and the tradeoffs as a whole, and figuring out what is appropriate for this specific environment at this specific stage, with these specific constraints, etc. It&#8217;s all these nuances that make specific controls very effective or utterly useless.</p><p style="text-align: justify;">In the end, cybersecurity is about seeing enough of the elephant to make the right decisions, and making sure you focus on your own elephant, and not on the stories about elephants you&#8217;ve been hearing from others.</p><p style="text-align: justify;">For founders, all this means that they really need to understand what problems they are solving and for whom, before approaching CISOs. More importantly, we as an industry should really keep in mind that panels and talks about &#8220;how everyone should do security&#8221; are pretty unhelpful. I am hoping that we will see more panels with diverse perspectives - diverse in terms of the kinds of businesses people are securing. When you have a panel of 4 SaaS CISOs, you won&#8217;t get as much of a different perspective as when the 4 people on the panel come from very different environments (one from SaaS, one from regulated industry, one from OT-heavy environments, and so on).</p><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/blind-men-and-the-elephant-the-story?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/blind-men-and-the-elephant-the-story?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[5 unexpected takeaways and one big prediction from RSAC]]></title><description><![CDATA[The dust is settling, and CISOs are refocusing on what actually matters to their organizations, not just what marketers want them to care about (no offense to my marketing friends!)]]></description><link>https://ventureinsecurity.net/p/5-unexpected-takeaways-and-one-big</link><guid isPermaLink="false">https://ventureinsecurity.net/p/5-unexpected-takeaways-and-one-big</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 31 Mar 2026 23:22:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qO72!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p style="text-align: justify;">This year&#8217;s RSAC was different. A big part of that is because for the first time, I showed up not as a product leader or industry insider, but as a founder of a venture-backed cybersecurity startup. From presenting in front of George Kurtz, CJ Moses, Robert Herjavec, and Bartley Richardson as one of just six finalists (out of 1,000+ applicants!) in the CrowdStrike, AWS, and NVIDIA accelerator, to taking the RSAC stage alongside the CEO of SailPoint Mark McClain and my Inside the Network co-hosts Sid Trivedi and Mahendra Ramsinghani, to book signing, hosting a CISO lunch, and co-hosting a packed happy hour in the evening, I got to do what founders do - hustle &amp; make every minute count.</p><p style="text-align: justify;">But that wasn&#8217;t all. Even though my most valuable part of the week was spent with customers and prospects, I did get to spend an hour and a half on the Expo floor. What I saw there was very different from what I&#8217;ve seen before. All that combined with my conversations with CISOs made me realize that this year&#8217;s RSAC was different from events I&#8217;ve been to in the past.</p><p style="text-align: justify;">In this piece, I am sharing the main conclusions I walked away with from this year&#8217;s RSAC.</p><div><hr></div><p style="text-align: justify;">This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought to you</a> by... <a href="https://www.tines.com/access/guide/automating-grc-a-practical-guide-for-security-teams/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-3103">Tines</a>. </p><h4 style="text-align: justify;"><strong><a href="https://www.tines.com/access/guide/automating-grc-a-practical-guide-for-security-teams/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-3103">Inspiration from Druva, PathAI, and more in this practical GRC guide</a></strong></h4><p>GRC today is more complex, and more critical, than ever. Between increased regulations across the board, data management and privacy concerns, siloed ownership, and time and resource constraints, it&#8217;s no wonder 46% of security leaders say spiraling regulatory complexity keeps them up at night.</p><p>In <a href="https://www.tines.com/access/guide/automating-grc-a-practical-guide-for-security-teams/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-3103">this practical guide for security teams</a>, learn how your team can overcome the challenges of today&#8217;s fragmented, manual GRC processes. Get access to four opportunities for immediate impact, get inspiration from teams at Druva, PathAI, and more, and learn how you turn GRC from a checkbox into a strategic advantage.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tines.com/access/guide/automating-grc-a-practical-guide-for-security-teams/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-3103&quot;,&quot;text&quot;:&quot;Get the guide&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tines.com/access/guide/automating-grc-a-practical-guide-for-security-teams/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-3103"><span>Get the guide</span></a></p><div><hr></div><h1 style="text-align: justify;">Let&#8217;s skip over the usual stuff</h1><p style="text-align: justify;">Yes, the Expo floor is busy. Yes, there are many new companies. Yes, the industry is going through consolidation. Yes, not everyone can make it. Yes, we do have a lot of tools. Yes, some companies are not clear about what problems they are solving. Yes&#8230; You get the point. All these takes are not wrong, but it&#8217;s like going to Walmart and complaining that there is too much stuff on the shelves to choose from. Sure, but is that a bug or a feature? If you just need a loaf of bread, maybe it&#8217;s better to go to a neighborhood grocery store.</p><p style="text-align: justify;">Yes, the RSAC floor is a lot, but similar to how you would approach Walmart (or any other big box retailer): you either go there with a shopping list so that you only buy what you need to buy, or you go there to see what&#8217;s available on the market. If you do the latter, better give your wallet and phone to your spouse so that you don&#8217;t end up walking away with stuff you never knew you needed.</p><p style="text-align: justify;">I continue to be convinced that we need more founders brave enough to tackle problems that have previously been seen as unsolvable, that consolidation is an ongoing process, that just about every industry has become more crowded and more competitive, and so on. If you are a regular reader of Venture in Security, you know that I have several articles about each of these topics, and that I often try to remind folks that many things can be true at the same time, and that most people (be they CISOs, founders, investors, industry analysts, etc.) are just trying to do their best and succeed at their role.</p><p style="text-align: justify;">With this out of the way, let&#8217;s talk about the takeaways.</p><h1 style="text-align: justify;">Here are my unexpected takeaways after attending RSAC 2026</h1><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2 style="text-align: justify;">CISOs&#8217; AI concerns today are grounded in reality</h2><p style="text-align: justify;">It hasn&#8217;t been long since the time when everyone was talking about how &#8220;Deepfakes are going to become every CISO&#8217;s #1 concern by 2025,&#8221; but guess what - it&#8217;s 2026, and it&#8217;s safe to say that this has not happened yet. This is just one example, and I am sure each of us can come up with a long list of these doomsday scares that didn&#8217;t materialize.</p><p style="text-align: justify;">Every security leader I talked to at RSAC shared security concerns that are grounded, realistic, and pragmatic. It was not about &#8220;AI causing chaos&#8221; or &#8220;every employee using deepfakes&#8221; (not in my discussions anyway). I saw CISOs worried about the fact that they don&#8217;t fully know where their company&#8217;s data is going because of the number of AI tools employees are using to be more productive (you know, the usual shadow IT problem, now described as shadow AI). I saw CISOs realizing that attackers can now use AI to do reconnaissance at scale, and to find and exploit gaps in fundamental controls (identity, vulnerability management, etc.) that they simply had no manpower to manage at scale.</p><p style="text-align: justify;">It wasn&#8217;t long ago that no one could cut through the noise, but now things feel back to normal. Going into the event, I expected fears of an AI &#8220;armageddon&#8221; to dominate the conversation, but that never materialized. It looks like AI is becoming a part of everything, and we&#8217;re slowly moving on from treating it as something new.</p><h2 style="text-align: justify;">There&#8217;s a lot of excitement about using AI to solve old problems</h2><p style="text-align: justify;">A couple of RSACs ago, every mention of AI came with a sense of dread. The narrative was overwhelmingly negative - attackers would use AI to get better at breaking in, employees would misuse it, and things would go very wrong everywhere all at once.</p><p style="text-align: justify;">This year felt very different because the tone shifted from fear to possibility. There was real excitement around how AI could finally help solve problems that have been stuck for decades. Take my experience at the CrowdStrike, AWS, and NVIDIA accelerator, where I presented as one of the finalists. The company that took the top spot - Jazz Security - is using AI to tackle DLP. Not exactly the most sexy space, and one the industry has struggled to get right for years, but now, for the first time, it feels like we might actually have a shot at solving it.</p><p style="text-align: justify;">When I spoke with CISOs, the excitement around AI was everywhere - AI for pentesting, AI for identity, AI for exposure management, AI for the SOC, AI for vulnerability management, etc. Across the board, the theme around AI was not about replacing engineers, but about using it to finally solve problems that have been unsolvable for years. That&#8217;s exactly where I personally believe the real opportunity lies, so seeing the industry align around that mindset was really encouraging.</p><h2 style="text-align: justify;">Security startups are doing a better job with messaging</h2><p style="text-align: justify;">About 20 minutes into my journey on the Expo floor, I started to feel like something was off. I couldn&#8217;t figure out what was going on until it hit me: I was able to understand what most of the companies were actually doing!</p><p style="text-align: justify;">For the first time, I found myself reading taglines and thinking, &#8220;Ah, I actually get what they&#8217;re trying to say.&#8221; It made me realize that most security companies were never trying to be confusing on purpose, they just struggled to clearly communicate their story. LLMs are making it much easier for technical founders to explain why their features matter and what problems they solve, while also helping non-technical marketers better understand and articulate what the product is actually built to do.</p><p style="text-align: justify;">Interestingly enough, I think startups are doing a better job at messaging than large companies. I don&#8217;t know why that is, but if I had to guess, I&#8217;d say that it&#8217;s probably because of two reasons. First, the bigger the company, the more people are involved in approving every message, and the more people you add, the more the outcome starts to feel like a watered-down version that makes everyone kind of happy. What begins as something clear and specific, like &#8220;we back up your data so you can recover from ransomware&#8221;, somehow turns into &#8220;resiliency at the speed of light,&#8221; and you&#8217;re left wondering what that actually means. Second, larger companies have broader product portfolios, and that makes people want to come up with a single tagline that describes everything they do. In reality, that&#8217;s incredibly hard, so more people get pulled in, more opinions are added, and you end up right back at the same diluted, overly abstract messaging.</p><h2 style="text-align: justify;">The real competition is not other vendors, it&#8217;s doing nothing</h2><p style="text-align: justify;">Most security teams I spoke with aren&#8217;t actively doing POCs with 10 vendors that solve the same problem. Instead, tost of the time they&#8217;re deciding whether to even prioritize the problem this quarter (or this year, or ever, really). Basically, the biggest blocker for cybersecurity startups isn&#8217;t budget, it&#8217;s buyer attention.</p><p style="text-align: justify;">This isn&#8217;t in any way a new phenomenon, but nowhere is it as clear as when you are looking at cybersecurity buyers trying to find the few things they <em>actually</em> care about on the Expo floor. There are many loud voices on LinkedIn saying that because of AI, security teams are now building products themselves instead of buying them, but when you listen to CISOs, it becomes clear that for many problems, they simply do nothing (and for some really good reasons).</p><h1 style="text-align: justify;">My biggest takeaway: security leaders are going back to fundamentals</h1><p style="text-align: justify;">There are many takeaways from this year&#8217;s RSAC I would like to discuss, and there are many things I am reading from others that I don&#8217;t quite agree with. My biggest takeaway from RSAC 2026 is that security leaders are going back to fundamentals.</p><p style="text-align: justify;">What I saw at this year&#8217;s RSAC is that more and more CISOs are refocusing on the basics. The last few years proved that what gets companies breached aren&#8217;t some novel zero days or AI-driven threats, but weak fundamentals. After decades of tool sprawl, overlapping categories, and being pulled in random directions by every new trend, there&#8217;s a growing realization that the real gaps were never about needing more cool tech. I heard it over and over again that teams are doubling down on asset visibility, tightening identity controls, cleaning up access policies, enforcing least privilege, and getting serious about operational rigor. Things like patching, vulnerability management, access reviews, and other boring areas are what actually gets people to spend time and money because that&#8217;s what real problems actually are. There&#8217;s also a shift in mindset - instead of asking &#8220;what new tool should we buy?&#8221;, the question is increasingly &#8220;are we actually using what we already have the right way?&#8221; Instead of adding more layers, teams are trying to simplify, consolidate, and make their environments understandable again.</p><p style="text-align: justify;">AI is part of this story, but not in the way people expected a year ago. Instead of replacing fundamentals or replacing security engineers (good luck with that!), AI is becoming a way to finally execute on the fundamentals at scale. This focus on fundamentals is what<a href="https://www.illumio.com/blog/why-security-fundamentals-are-the-most-overlooked-part-of-adopting-a-zero-trust-strategy"> I discussed on Illumio&#8217;s podcast right before RSAC</a>, and it is what I expect to see more of as we go further.</p><p style="text-align: justify;">My biggest prediction is this: once the hype settles, the industry will keep moving back toward fundamentals, and we&#8217;ll see that trend accelerate over the next few years. It&#8217;s the right direction, because most breaches don&#8217;t come from sophisticated zero-days or intricate attack chains. They come from much simpler failures like default credentials that were never changed, assets that no one even knew were still out there, temporary exceptions that became permanent without anyone noticing, and similar &#8220;boring&#8221; problems. The rest is just marketing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qO72!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qO72!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!qO72!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!qO72!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!qO72!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qO72!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:106701,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ventureinsecurity.net/i/192792358?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qO72!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!qO72!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!qO72!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!qO72!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F480b02a4-fa0a-4997-aaed-c7d0c9bc0c48_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/5-unexpected-takeaways-and-one-big?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/5-unexpected-takeaways-and-one-big?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[“It is not the customer’s job to know what they want” rings true in cyber]]></title><description><![CDATA[And also, there has never been a billion-dollar security company built based on Gartner&#8217;s insight alone]]></description><link>https://ventureinsecurity.net/p/it-is-not-the-customers-job-to-know</link><guid isPermaLink="false">https://ventureinsecurity.net/p/it-is-not-the-customers-job-to-know</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 24 Mar 2026 14:52:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bVvL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p style="text-align: justify;">Ever since I embarked on the founder journey and started working on my own startup, I&#8217;ve developed different perspectives and some strong opinions about founder life. In today&#8217;s issue, I am going to share one of them - about the fact that there has never been a billion-dollar security company built based on Gartner&#8217;s* insight alone. I strongly believe this has been the case, and this will continue to be the case, not because Gartner is wrong, but because it is usually right.</p><p style="text-align: justify;"><em>*I am using Gartner in this article as a way to generalize about &#8220;industry analyst firms&#8221;; you can substitute Gartner with Forrester or any other of your favorite companies.</em> </p><div><hr></div><p style="text-align: justify;">This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought to you</a> by... <a href="http://www.endorlabs.com/platform/developer-tools?utm_source=low-level-influencer-yo[&#8230;]um=youtube-video-influencer&amp;utm_campaign=auri-for-developers">Endor Labs</a></p><h4 style="text-align: justify;"><a href="http://www.endorlabs.com/platform/developer-tools?utm_source=low-level-influencer-yo[&#8230;]um=youtube-video-influencer&amp;utm_campaign=auri-for-developers">Discover security that scales with AI-driven development.</a></h4><p>AI is accelerating how engineers ship code, but security reviews aren&#8217;t scaling with it. AURI by Endor Labs changes that: autonomously surfacing business logic risks and the &#8220;unknown unknowns&#8221; that manual review and traditional AppSec testing miss. Discover security that scales with AI-driven development.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;http://www.endorlabs.com/platform/developer-tools?utm_source=low-level-influencer-yo[&#8230;]um=youtube-video-influencer&amp;utm_campaign=auri-for-developers&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="http://www.endorlabs.com/platform/developer-tools?utm_source=low-level-influencer-yo[&#8230;]um=youtube-video-influencer&amp;utm_campaign=auri-for-developers"><span>Learn More</span></a></p><div><hr></div><h1 style="text-align: justify;">It&#8217;s not the industry analysts&#8217; job to come up with winning startup ideas</h1><p style="text-align: justify;">There&#8217;s one mistake I see over and over in our industry: people assume that an industry analyst&#8217;s job is to predict the future. This is not at all the case. Let me explain.</p><p style="text-align: justify;">Firms like Gartner make the majority of the money from serving enterprises, and despite what some people in our industry assume, their role extends far beyond recommending security solutions. In fact, Gartner isn&#8217;t usually an expense that comes out of the CISO budget, and CISOs are just one of the many kinds of executives that rely on their offerings. While Gartner does sell vendor subscriptions, it is generally a smaller area of their focus. The majority of their time is spent working with the enterprises, helping them navigate complex challenges surrounding different kinds of large-scale transformations, advising them on making hard decisions, and so on.</p><p style="text-align: justify;">Given the types of customers Gartner serves, its coverage tends to be very well-researched, and some might even say somewhat conservative. Gartner analysts aren&#8217;t jumping on random trends or new ideas - they are looking for patterns, and the evidence that some of the customers out there have bought into the new idea. In other words, Gartner&#8217;s job isn&#8217;t to predict trends or predict what categories of products are needed on the market. Instead, their job is to declare trends that are already unfolding, and declare which problems they are hearing from customers will need new solutions.</p><p style="text-align: justify;">Let me be very clear: all the analysis out there can be very helpful to understand where the market is moving. However, it&#8217;s important to keep in mind that these reports don&#8217;t predict the future; they declare things that are already happening or that someone would like to happen. It is not the job of the analyst firms to identify opportunities for startups to pursue: as we&#8217;ve established, they work for the enterprises or existing vendors, and not for future founders.</p><p style="text-align: justify;">Even more critically, I think founders need to know how to properly read analyst reports so that they don&#8217;t become harmful to them. This isn&#8217;t because the reports are wrong, it&#8217;s because they&#8217;re too high-level. Firms like Gartner serve enterprises in just about every industry vertical, in most countries, and with different tech stacks. When a founder reads that &#8220;Fortune 500 companies need a different approach to data loss prevention&#8221;, they have to keep in mind that &#8220;Fortune 500 companies&#8221; won&#8217;t become their customers. Their targets are going to be much more specific - &#8220;Financial institutions between 15,000 and 25,000 employees who use AWS as their primary cloud and who do not have a third-party DLP solution&#8221; (or something like that - something very, very specific, and not &#8220;Fortune 500 companies&#8221;).</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1 style="text-align: justify;">Trends don&#8217;t &#8220;just happen&#8221;; someone makes them happen</h1><p style="text-align: justify;">Here&#8217;s the main point about trends: trends don&#8217;t &#8220;just happen&#8221;; someone makes them happen. One wise person once told me that there are three types of people: those who make things happen, those who let things happen, and those who wonder what just happened.</p><p style="text-align: justify;">I am sure someone can point to exceptions (there are always exceptions), but in the majority of cases, things happen because someone works really hard to make them happen. Was there a trend where companies were migrating to the cloud? Of course, but people didn&#8217;t just wake up one day and say, &#8220;We need to move to the cloud&#8221;. Cloud service providers invested a lot in marketing their approach. Investors at venture firms started betting on founders embracing the new approach. Service providers educated their customers about the benefits of the cloud compared to data centers. Someone inside the company became interested in the opportunity and decided to explore how these potential benefits would manifest themselves inside the organization&#8230; Eventually, too, the pandemic did more to convince companies to embrace the cloud than all consulting firms combined. Things happened because many, many people in different capacities and roles worked hard to make them happen.</p><p style="text-align: justify;">When you see an analyst firm or some market insider say that they see a &#8220;trend&#8221;, it means someone (likely a few founders) is working hard to make this trend a reality.</p><h1 style="text-align: justify;">It&#8217;s not the CISO&#8217;s job to know what they need</h1><p style="text-align: justify;">Another common misconception I often hear is that winning ideas come from asking CISOs what they need. I know it may be counter-intuitive to suggest that this is a bad approach (after all, don&#8217;t we have to be customer-focused?), so hear me out.</p><p style="text-align: justify;">I strongly believe the cybersecurity industry is blessed with a great number of innovators and people truly passionate about the future of our industry. We are used to taking it for granted that security leaders and security professionals are usually happy to share their perspective on problems or help founders refine their ideas. If you have never worked in another industry, you&#8217;ll probably not be able to fully grasp how rare and amazing this is.</p><p style="text-align: justify;">At the same time, talking to CISOs about their problems does have its limitations. &#8221;We don&#8217;t know who discovered water, but we&#8217;re certain it wasn&#8217;t a fish&#8221;. These words by Marshall McLuhan have critical lessons for cybersecurity founders who think they can just ask CISOs what they need and go build that. Security leaders have a lot of problems, experiences, and perspectives, but it&#8217;s not their role to articulate them in a way that makes it obvious what needs to be built. Founders can&#8217;t just take orders from CISOs - they need to take in all that knowledge, experience, and perspectives, and envision a better future.</p><p style="text-align: justify;">The key in these conversations is to dig deep to understand the problems, not to look to CISOs to shape the idea of a solution. Another important bit is to ask about the specific problems they are dealing with themselves, not for what they hear from others, or ideas for what they would like to exist. As Steve Jobs once said, &#8220;It is not the customer&#8217;s job to know what they want&#8221;. In the end, founders have to understand the problem space in depth, but it is their responsibility to synthesize the data, make sense of all the learnings, and to decide what to build. This brings me to the most important message of this article.</p><h1 style="text-align: justify;">It&#8217;s the founders&#8217; job to understand the problem, envision a better future, and make it a reality</h1><p style="text-align: justify;">I have previously talked about customer and problem discovery, so I won&#8217;t dive into that here. In general, I don&#8217;t think there have been many billion-dollar companies in cyber where founders would just look at trends or ask CISOs about their problems and voila - they got a winning wedge. It is simply not how it works. Okta struggled for a number of years and nearly went under before the product took off. CrowdStrike had to educate the markets about nation-state attacks at a time when most assumed that they were protected because they had McAfee. Jay Chaudhry, founder of Zscaler,<a href="https://insidethenetwork.co/episodes/jay-chaudhry-betting-on-yourself-and-building-a-40b-zero-trust-giant-in-zscaler"> explained on Inside the Network</a> that when he pitched for the Zscaler idea, 9 out of 10 prospects would say they are not interested. Despite all that, he pushed through by inverting the reality and saying, &#8220;Well, this means that 1 out of 10 is to say yes&#8221;. As a side note, the reason I find Jay&#8217;s story so fascinating is that in 2026, most founders would have killed any idea 9 out of 10 CISOs said &#8220;No&#8221; to. Sticking with it requires the power of vision and conviction.</p><p style="text-align: justify;">It&#8217;s not enough for the founders to understand what the problems are. They have to process all the competing insights, immerse themselves in the problem space, but then they have to put forward a perspective. They have to take a stance and envision a better future. This vision cannot simply be the result of a collection of feature requests. This vision cannot be simply an outcome of Gartner research. It has to be their insight, their perspective, and their bet. Every startup is a bet on a vision of the future that does not yet exist. It is the funder&#8217;s job to make this vision a reality.</p><p style="text-align: justify;">At the core of every company is a bet - a bet that a better feature isn&#8217;t just possible, that it absolutely needs to happen. Sometimes, people hit it big, stars align, and tailwinds are so strong that it feels like things just happen. Most of the time, however, things happen because someone makes them happen. Or, in other words, it&#8217;s the founders&#8217; job to understand the problem, envision a better future, and make it a reality. As Jobs said, &#8220;It is not the customer&#8217;s job to know what they want&#8221;.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bVvL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bVvL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png 424w, https://substackcdn.com/image/fetch/$s_!bVvL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png 848w, https://substackcdn.com/image/fetch/$s_!bVvL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png 1272w, https://substackcdn.com/image/fetch/$s_!bVvL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bVvL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png" width="1456" height="941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1193072,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ventureinsecurity.net/i/191986945?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bVvL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png 424w, https://substackcdn.com/image/fetch/$s_!bVvL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png 848w, https://substackcdn.com/image/fetch/$s_!bVvL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png 1272w, https://substackcdn.com/image/fetch/$s_!bVvL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff5834288-1700-4ee2-8a9f-9d4f26e1c863_2002x1294.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: justify;">Image Source: <a href="https://www.optiv.com/insights/discover/downloads/navigating-security-technology-landscape">Navigating the Security Technology Landscape</a></p><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/it-is-not-the-customers-job-to-know?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/it-is-not-the-customers-job-to-know?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Every significant B2B company is becoming a security company]]></title><description><![CDATA[This also means that there are plenty of B2B companies that could be potential acquirers of security startups]]></description><link>https://ventureinsecurity.net/p/every-significant-b2b-company-is</link><guid isPermaLink="false">https://ventureinsecurity.net/p/every-significant-b2b-company-is</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 17 Mar 2026 14:35:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZBCx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Every platform giant is becoming a security company. As every enterprise is becoming more and more tech-enabled, the responsibility for protecting data, identities, and infrastructure starts to fall on the platforms where that work happens. Over the past several years, I have come to a simple realization: that every platform vendor eventually becomes a security vendor, whether they planned to or not. This trend has some very important implications for our industry in general, and for cybersecurity startups in particular. This is what today&#8217;s article is about.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.axonius.com/actionability-report?utm_medium=email&amp;utm_source=VentureInSecurity&amp;utm_campaign=https%3A%2F%2Faxonius.lightning.force.com%2Flightning%2Fr%2FCampaign%2F701UH00000lTBTKYA4%2Fview&amp;utm_content=text_link&amp;utm_term=Primary%20Newsletter%20Sponsorship%20Venture%20in%20Security">Axonius</a>. </em></p><h4><a href="https://www.axonius.com/actionability-report?utm_medium=email&amp;utm_source=VentureInSecurity&amp;utm_campaign=https%3A%2F%2Faxonius.lightning.force.com%2Flightning%2Fr%2FCampaign%2F701UH00000lTBTKYA4%2Fview&amp;utm_content=text_link&amp;utm_term=Primary%20Newsletter%20Sponsorship%20Venture%20in%20Security">51% of Security Teams Are Losing Critical Context</a></h4><p>Most cybersecurity programs are rich in visibility &#8212; and struggling to act on it. So what separates the teams that actually move the needle?<br><br>Axonius partnered with the Ponemon Institute to find out. The 2026 Actionability Report reveals how top security teams turn data into decisive action. Only 45% consolidate exposure into a single source of truth. 51% lose critical context during remediation. 37% are still stuck in manual workflows.<br><br>The best teams have solved these problems, and this report shows exactly how.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.axonius.com/actionability-report?utm_medium=email&amp;utm_source=VentureInSecurity&amp;utm_campaign=https%3A%2F%2Faxonius.lightning.force.com%2Flightning%2Fr%2FCampaign%2F701UH00000lTBTKYA4%2Fview&amp;utm_content=text_link&amp;utm_term=Primary%20Newsletter%20Sponsorship%20Venture%20in%20Security&quot;,&quot;text&quot;:&quot;Get the Research&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.axonius.com/actionability-report?utm_medium=email&amp;utm_source=VentureInSecurity&amp;utm_campaign=https%3A%2F%2Faxonius.lightning.force.com%2Flightning%2Fr%2FCampaign%2F701UH00000lTBTKYA4%2Fview&amp;utm_content=text_link&amp;utm_term=Primary%20Newsletter%20Sponsorship%20Venture%20in%20Security"><span>Get the Research</span></a></p><div><hr></div><h1><strong>Cybersecurity is breaking all records</strong></h1><p>If you have been following the news over the past several years, you know that cybersecurity has been exploding in growth. Let this sink in:</p><ul><li><p>Google&#8217;s largest-ever acquisition is a security company (Wiz).</p></li><li><p>ServiceNow&#8217;s largest-ever acquisition is a security company (Armis).</p></li><li><p>Mastercard&#8217;s second-largest ever acquisition is also a security company (Recorded Future).</p></li><li><p>Cisco&#8217;s largest-ever acquisition is a security company (sure, not pure-play but cyber is a huge part of their business - Splunk).</p></li></ul><p>If these aren&#8217;t the signs that something is changing, then nothing is. However, just looking at these figures won&#8217;t do them any justice without the surrounding context why we&#8217;re seeing what we are seeing. Let&#8217;s have a quick look at several different cases to understand how every platform company is becoming a security company.</p><h1><strong>Every platform company is becoming a security company: eight brief case studies</strong></h1><h2><strong>Case one: Google</strong></h2><p>Google&#8217;s largest acquisition ever is a security company, Wiz, purchased for $32 billion. That alone is remarkable, but it becomes even more impressive when you look at Google&#8217;s<a href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Alphabet"> broader M&amp;A history</a>. Out of more than 260 acquisitions, only 65 had disclosed prices, and across those deals, Google spent nearly as much on just three cybersecurity companies (Siemplify, Mandiant, and Wiz, $37.9B combined) as it did on the other 62 disclosed acquisitions combined ($41B). This number is mindblowing.</p><p>Here&#8217;s a great chart that puts Google&#8217;s acquisition themes into perspective:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eLa_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eLa_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png 424w, https://substackcdn.com/image/fetch/$s_!eLa_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png 848w, https://substackcdn.com/image/fetch/$s_!eLa_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png 1272w, https://substackcdn.com/image/fetch/$s_!eLa_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eLa_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png" width="1456" height="1199" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1199,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;image.png&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="image.png" title="image.png" srcset="https://substackcdn.com/image/fetch/$s_!eLa_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png 424w, https://substackcdn.com/image/fetch/$s_!eLa_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png 848w, https://substackcdn.com/image/fetch/$s_!eLa_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png 1272w, https://substackcdn.com/image/fetch/$s_!eLa_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd016e1d-de8d-48e6-999b-e533efb55758_1600x1318.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8203;</p><p>Source:<a href="https://fourweekmba.com/googles-major-acquisitions-timeline/"> FourWeekMBA</a>&#8203;</p><p>What&#8217;s driving this shift is simple: Google is no longer just an advertising company, it is an enterprise cloud company competing with AWS and Microsoft. In the enterprise world, security is foundational, so if Google wants large organizations to run critical workloads on Google Cloud, it has to be able to offer first-class security capabilities natively. Acquiring companies like Mandiant and Wiz allows Google to instantly strengthen its credibility with CISOs and security teams, something that takes decades to build organically (and frankly, something that Google hasn&#8217;t been able to do on its own).</p><p>There is also a strategic platform play behind these acquisitions. Cloud platforms increasingly compete not just on compute and storage, but on the ecosystem of capabilities that sit on top - identity, observability, compliance, and security. By integrating security deeply into its cloud platform, Google can make its infrastructure stickier, (hopefully) attract security-conscious enterprises, and compete more directly with Microsoft, which has successfully turned security into a massive multi-billion-dollar business attached to its cloud. Moreover, having Wiz in their portfolio strategy gives Google deep visibility into customer deployments across other clouds. In that sense, cybersecurity isn&#8217;t just a product category for Google, it&#8217;s becoming a core pillar of its enterprise strategy.</p><p>Google&#8217;s competitors in the cloud space, Microsoft and AWS, have had a different approach to cybersecurity M&amp;As. AWS<a href="https://www.cnbc.com/2018/01/23/amazons-cloud-business-acquires-sqrrl-a-security-start-up-with-nsa-roots.html"> acquired Sqrrl</a> and<a href="https://techcrunch.com/2017/01/09/amazon-aws-harvest-ai/"> harvest.ai</a> in 2017, but didn&#8217;t do anything afterwards. Microsoft, on the other hand, has had a cyber acquisition spree between 2020 and 2022 but hasn&#8217;t done any new M&amp;As since then (it bought CyberX in 2020, RiskIQ, CloudKnox, and ReFirm Labs in 2021, and Miburo in 2022). This does make sense if you consider that the way these two hyperscalers go to market is different as are the advantages that make them leaders in the cloud world. </p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2><strong>Case two: ServiceNow</strong></h2><p>ServiceNow&#8217;s largest acquisition ever is also a security company,<a href="https://techcrunch.com/2025/12/23/servicenow-to-acquire-cybersecurity-startup-armis-for-7-75b/"> Armis, acquired for $7.75 billion in cash.</a></p><p>ServiceNow built its empire by becoming the system of record for enterprise workflows, from IT and HR to customer support, and increasingly operations across the entire organization. Once you own the workflows that run the enterprise, security naturally becomes part of the conversation. Every incident, vulnerability, asset, configuration change, and compliance process ultimately turns into a workflow.</p><p>ServiceNow is betting on what I call the &#8220;workflow gravity&#8221; effect - the fact that ServiceNow has become an enterprise &#8220;system of action&#8221; with unified data and AI experiences built into workflows. This is an incredibly powerful position because once a company owns where work flows, it gets the ability to influence and eventually own how decisions are made. ServiceNow&#8217;s bet is so interesting that I wrote an entire dedicated deep dive about it: <a href="https://ventureinsecurity.net/p/servicenow-is-betting-on-workflow">ServiceNow is betting on &#8220;workflow gravity&#8221; to win against the platforms of Palo Alto, CrowdStrike, Cisco, Zscaler, and Microsoft.</a></p><p>If you look at this chart by CB Insights, it becomes clear that ServiceNow has its hands in virtually every enterprise workflow:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zw_b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zw_b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zw_b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zw_b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zw_b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zw_b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg" width="1244" height="1600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:1244,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;image.jpeg&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="image.jpeg" title="image.jpeg" srcset="https://substackcdn.com/image/fetch/$s_!Zw_b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zw_b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zw_b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zw_b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19af3a76-c4e8-4754-97d2-b78e89b1651e_1244x1600.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Source:<a href="https://www.linkedin.com/posts/jason-salt_servicenow-just-completed-its-most-active-activity-7409658794932367360-o_fj/"> Jason Saltzman on LinkedIn</a></p><p>And yet, it is clear that a company best known for owning enterprise workflows is increasingly becoming a cybersecurity company. This ambition is why ServiceNow paid so much for Armis, and also why it<a href="https://www.forbes.com/sites/moorinsights/2025/12/12/servicenow-agrees-to-buy-veza-to-govern-ai-agent-permissions-at-scale/"> acquired Veza in a $1 billion</a> deal around the same time.</p><p>Atlassian, which competes with ServiceNow with its Jira offerings, hasn&#8217;t been a significant player in the cybersecurity space. The company has largely missed the opportunity to dominate developer security (which it definitely had the chance to do) or to capitalize on its dominance in the developer and IT workflows space (unlike ServiceNow). It has made some deals, like its<a href="https://www.linkedin.com/pulse/altitude-cyber-advises-borneo-acquisition-atlassian-dino-boukouris-8uoze/"> acquisition of Borneo</a> in 2025, but it never truly played big in the cybersecurity market.</p><h2><strong>Case three: Mastercard</strong></h2><p>Mastercard&#8217;s second-largest acquisition in history also happens to be a cybersecurity company,<a href="https://www.reuters.com/markets/deals/mastercard-buy-threat-intelligence-company-recorded-future-265-bln-2024-09-12/"> Recorded Future, for which in 2024 the company paid $2.65B</a>. This move, which surprised a lot of people, showed how financial networks think about security. Mastercard isn&#8217;t just a payment processor, it operates one of the largest global transaction networks. For them, protecting that ecosystem from fraud, cybercrime, and nation-state threats is critical to the business. By bringing Recorded Future&#8217;s intelligence capabilities in-house, Mastercard can better detect threats targeting banks, merchants, and payment infrastructure across its network. At the same time, it could even allow Mastercard to expand its security offerings to financial institutions and enterprises, basically turning cybersecurity into both a defensive capability and a new growth business built on top of the company&#8217;s global data and network visibility.</p><p>For Mastercard, Recorded Future most definitely wasn&#8217;t its first step into cybersecurity. Before investing nearly $3 billion in security, the company has made a long list of smaller acquisitions, including <a href="https://www.spectrumequity.com/news/spectrum-equity-announces-sale-of-ethoca-to-mastercard/">Ethoca</a> (2019), <a href="https://techcrunch.com/2019/12/23/mastercard-acquires-security-assessment-startup-riskrecon/">RiskRecon</a> (2019), and <a href="https://investor.mastercard.com/investor-news/investor-news-details/2023/Mastercard-Strengthens-Customer-Security-With-New-AI-Cyber-Shield/default.aspx">Baffin Bay Networks</a> (2023).</p><p>Mastercard also isn&#8217;t the only payments network that has acquired or partnered with cybersecurity and fraud prevention companies. Visa, for example, bought<a href="https://investor.visa.com/news/news-details/2024/Visa-Completes-Acquisition-of-Featurespace/default.aspx"> Featurespace</a> (2024) and CyberSource (2020,<a href="https://usa.visa.com/about-visa/newsroom/press-releases.releaseId.8396.html"> acquired in a transaction worth $2 billion</a>), and in 2020 it invested in<a href="https://www.verygoodsecurity.com/press-releases/very-good-security-announces-strategic-investment-from-visa"> Very Good Security</a>.</p><h2><strong>Case four: Cisco</strong></h2><p>Cisco&#8217;s largest ever acquisition is also a security company, Splunk,<a href="https://www.splunk.com/en_us/newsroom/press-releases/2024/cisco-completes-acquisition-of-splunk.html"> for which it paid $28 billion</a>. Sure, some may argue that Splunk isn&#8217;t a pure-play security company, but given how much of their business comes from security, I&#8217;d say it is a security company.</p><p>When I looked at how,<a href="https://ventureinsecurity.net/p/20-years-of-cybersecurity-consolidation"> in some 20 years, over 200 companies in cyber consolidated into just 11</a>, I pointed out that if you asked most people in security who the biggest acquirer of cybersecurity companies is, the answer would almost certainly be Palo Alto Networks. That makes sense since the company has been pushing the consolidation narrative (or, as they call it, &#8220;platformization&#8221;) harder than anyone else, and we&#8217;ve seen that they have brought together over 30 players. However, while Palo Alto may be the most visible acquirer, it&#8217;s not the biggest. That title belongs to Cisco, which has absorbed more than 40 (!) security companies over the past two decades.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8Esi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8Esi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png 424w, https://substackcdn.com/image/fetch/$s_!8Esi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png 848w, https://substackcdn.com/image/fetch/$s_!8Esi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!8Esi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8Esi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;image.png&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="image.png" title="image.png" srcset="https://substackcdn.com/image/fetch/$s_!8Esi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png 424w, https://substackcdn.com/image/fetch/$s_!8Esi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png 848w, https://substackcdn.com/image/fetch/$s_!8Esi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!8Esi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81d6ca10-38f2-45b1-b1e8-986fee8cb064_1600x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Source:<a href="https://ventureinsecurity.net/p/20-years-of-cybersecurity-consolidation"> 20 years of cybersecurity consolidation: how 200 companies became 11</a></p><p>Cisco&#8217;s strategy here is deeply tied to its evolution as a company. For decades, Cisco dominated networking infrastructure, but as the industry shifted toward cloud, software, and observability, simply selling routers and switches was no longer enough. Security became the natural extension of Cisco&#8217;s position in the network: if you sit in the data path, you are uniquely positioned to detect threats, analyze behavior, and enforce policy. By acquiring Splunk, Cisco effectively adds one of the most powerful data and analytics platforms in security to its portfolio, allowing it to combine network telemetry, security signals, and observability into a single platform.</p><p>More broadly, Cisco&#8217;s history of acquiring over 40 cybersecurity companies reflects a long-standing belief that networking and security are inseparable. From firewalls and cloud security to identity and zero trust, Cisco has spent two decades building a massive security portfolio around its network footprint. To them, security is not just an opportunity to upsell customers who are already relying on Cisco for their networking needs, but also a way to reinvent the business and position it for the future.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><h2><strong>Cases five, six, seven, and eight</strong></h2><p>There are many, many more cases we can look at when a company that isn&#8217;t known as a cybersecurity player acquires a security startup. Here are four more just to give you some examples: </p><ul><li><p>Mitsubishi Electric<a href="https://www.nozominetworks.com/press-release/mitsubishi-electric-to-acquire-nozomi-networks"> acquired Nozomi Networks</a> for $1 billion to strengthen its capabilities in securing industrial and OT environments. By acquiring Nozomi, Mitsubishi can embed security directly into the increasingly interconnected industrial systems it sells to factories, energy systems, and critical infrastructure.</p></li><li><p>HP<a href="https://www.zdnet.com/article/hp-acquires-bromium-a-startup-behind-its-sure-click-security/"> acquired Bromium</a> to use security as a selling point for its devices. Bromium pioneered isolation that protected users from malware by containing threats inside micro-virtual machines. By integrating this technology into HP laptops and workstations, HP could make security a native feature of the device instead of relying on third-party security products.</p></li><li><p>Hewlett Packard Enterprise (HPE)<a href="https://www.calcalistech.com/ctechnews/article/rk11mwd0ai#google_vignette"> acquired Axis Security</a>. The acquisition helped HPE move deeper into the convergence of networking and security (Axis&#8217;s zero-trust network access tech fit naturally into HPE&#8217;s broader strategy around Aruba).</p></li><li><p>Apple<a href="https://www.reuters.com/article/world/americas/apple-buys-mobile-security-firm-authentec-for-356-million-idUSBRE86Q0KF/"> acquired mobile security firm AuthenTec</a> for $356 million. AuthenTec&#8217;s expertise in fingerprint sensors allowed Apple to develop and integrate Touch ID, starting with the iPhone 5S, offering a secure, intuitive authentication method.</p></li></ul><h1><strong>Different motivations, the same outcome</strong></h1><p>Every single one of the companies I mentioned here has different reasons to get into cybersecurity. For Google, for example, cybersecurity is a way to assemble a differentiated cloud offering so that it can more confidently compete with AWS and Azure. For ServiceNow, cybersecurity is a way to capitalize on the &#8220;workflow gravity&#8221; effect and its position as the owner of enterprise workflows. For Mastercard, cybersecurity is a way to protect its business-critical operations, prevent disruptions, and reduce the amount of money it needs to pay to bad actors. For Cisco, cybersecurity is both a way to further capitalize on its deep embeddedness into the enterprise infrastructure and a way to reinvent the business and position it for the future. This list can go on and on.</p><p>Regardless of the motivations, the outcome is the same: every significant B2B company is becoming a security company. Security is no longer a standalone category reserved for specialized vendors, it has become a foundational capability expected from every enterprise platform. If you operate critical infrastructure, host enterprise data, run workflows, or power digital payments, customers expect you to secure it by default. This shift is slowly changing the cybersecurity industry. Instead of security being purchased exclusively from dedicated security vendors, it is increasingly embedded into the platforms enterprises already rely on. The result is a world where cybersecurity is both its own massive market and a horizontal capability that every major B2B company must build, buy, or partner to deliver.</p><h1><strong>What cybersecurity startup founders should keep in mind</strong></h1><p>For founders of cybersecurity startups, this changes the strategic landscape. On one hand, the bar is higher than ever: if a platform vendor can ship a &#8220;good enough&#8221; native security capability, a standalone product has to be substantially better to justify its existence. Many of the point solutions have been struggling with this. At the same time, there&#8217;s a massive opportunity to build the innovation layer that large B2B platforms will eventually integrate, partner with, or acquire.</p><p>In other words, the future of cybersecurity startups is increasingly connected to the ecosystems of large B2B platforms, not just security products. Founders may still look at the usual suspects like Palo Alto Networks, CrowdStrike, Zscaler, Fortinet, and Check Point as natural acquirers, but as I&#8217;ve discussed here, the list of potential buyers is expanding far beyond the traditional cybersecurity industry. The past several years alone have shown how aggressively companies like ServiceNow, Google, and Mastercard are investing in security, and I am pretty sure we will see more of that in the decade to come. For founders, that means thinking differently about where their company fits in the broader technology ecosystem. The most successful cybersecurity startups won&#8217;t just build tools for security teams; they will build products that become strategically important to the platforms where core business actually happens.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZBCx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZBCx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!ZBCx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!ZBCx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!ZBCx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZBCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;image.png&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="image.png" title="image.png" srcset="https://substackcdn.com/image/fetch/$s_!ZBCx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!ZBCx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!ZBCx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!ZBCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63fcb193-eacf-413a-8a44-e086590df620_1600x1066.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/every-significant-b2b-company-is?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/every-significant-b2b-company-is?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[There’s only one kind of tool security teams should be building with AI]]></title><description><![CDATA[There are always exceptions but most security teams should generally speaking not build anything else except this one kind of product]]></description><link>https://ventureinsecurity.net/p/theres-only-one-kind-of-tool-security</link><guid isPermaLink="false">https://ventureinsecurity.net/p/theres-only-one-kind-of-tool-security</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 10 Mar 2026 14:33:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rewD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p style="text-align: justify;">I am not sure what I&#8217;ve been doing on social media over the past year (particularly on LinkedIn), but these days my feed is filled with posts of security people who build some very cool tools. There&#8217;s so much excitement that with LLMs, anyone can now be a product developer, which means that security teams can build their own products.</p><p style="text-align: justify;">It just so happens that many of the people arguing that AI will push companies to build security tools in-house instead of buying from vendors are friends of mine. They&#8217;re smart, thoughtful people; I simply happen to respectfully disagree with their perspective. In this piece, I will explain why I disagree and why we&#8217;re nowhere near the time when companies will just start building their own security tools. At the same time, I do think that security teams should definitely be building one particular kind of tool internally (but these aren&#8217;t really a replacement for cyber vendors).</p><div><hr></div><p style="text-align: justify;"><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://hubs.ly/Q045SPjS0">Varonis</a>. </em></p><h3 style="text-align: justify;"><a href="https://hubs.ly/Q045SPjS0">AI adoption doesn&#8217;t have to equal risk expansion.</a></h3><p>AI doesn&#8217;t operate in isolation. It connects to the same data, permissions, and identities your security strategy already struggles to govern. That&#8217;s why AI security isn&#8217;t about the model; it&#8217;s about the data that fuels it. Discovery alone isn&#8217;t enough when copilots and agents can retrieve sensitive data in seconds.</p><p>Varonis helps organizations apply real controls to AI risk by understanding what information AI systems access, enforcing guardrails across data and identities, and preventing exposure before damage is done. Don&#8217;t settle for point solutions that address isolated risks. Start securing everything you build and run with AI today.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://hubs.ly/Q045SPjS0&quot;,&quot;text&quot;:&quot;See Varonis in Action&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://hubs.ly/Q045SPjS0"><span>See Varonis in Action</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1 style="text-align: justify;"><strong>A few simple reasons why most companies will not build their own security tools (and they shouldn&#8217;t)</strong></h1><h2 style="text-align: justify;"><strong>Expertise required to build products</strong></h2><p style="text-align: justify;">The number one reason why most companies are not going to build their own security tools is a lack of engineering expertise. I know this sounds counterintuitive in a world where so many suggest that software can write itself, but hear me out. I have been a product leader for many years before I became a founder, and I&#8217;ve seen many, many times that there is a huge difference between writing code and building functional products. Software that can withstand real-world enterprise environments isn&#8217;t some random CRUD (create - read - update - delete) apps. Security tools in particular require deep domain knowledge, architectural rigor, performance optimization, edge-case handling, and the ability to operate across messy, heterogeneous environments. You don&#8217;t get that for free with Claude Code.</p><p style="text-align: justify;">AI makes writing code super quick, but it makes skills like systems thinking and architecture more critical than ever. What AI doesn&#8217;t do is magically give companies years of accumulated understanding about enterprise networks, identity models, logging pipelines, compliance nuances, or operational workflows. That expertise still has to come from somewhere, and most companies don&#8217;t have senior engineers sitting around waiting to reinvent what security vendors have already spent a decade refining.</p><p style="text-align: justify;">What I think AI is going to do is deepen the divide between engineering-centric security teams and everyone else. If you&#8217;re a Bay Area-style, product-driven company that already has strong security engineers building internal tooling, AI is going to amplify that big time. It will let your team prototype faster, build internal tools faster, automate many more workflows, and so on. If you work at companies like OpenAI, Anthropic, Google, Airbnb, Canva, Figma, Notion, Uber, Reddit, or Discord, where engineering is the DNA of the organization, you should 100% be building much more now with AI than ever before. I think that when it comes to these companies,<a href="https://franklyspeaking.substack.com/p/the-changing-buy-vs-build-calculus"> my friend Frank Wang is right</a> that they are going to build a lot in-house.</p><p style="text-align: justify;">For the rest of the world, if building security products in-house wasn&#8217;t realistic yesterday, AI won&#8217;t magically make it possible tomorrow. Companies that didn&#8217;t have the engineering talent aren&#8217;t going to suddenly build their own tools because the three SOC analysts they can afford to hire now have Claude. Companies that were under a lot of regulatory pressure yesterday surely aren&#8217;t going to see that pressure go down today. I can keep going with these examples, but that&#8217;s not the point. Will AI expand the percentage of companies that can build security products? Definitely. If I were to guess, I&#8217;d think that instead of 1-2% of companies that number will grow to 4-7% but it&#8217;s not going to be 70% or even 30% (I&#8217;m pulling those figures out of thin air (nobody has hard data) but I&#8217;m willing to bet the real number sits in the single digits).</p><p style="text-align: justify;">&#8203;All this makes me think that while some security tools can definitely be built internally, security teams are less likely to build those that are technologically complex, that need to operate at a large scale, process a lot of data, require agents, etc.</p><h2 style="text-align: justify;"><strong>Expertise required to secure the company</strong></h2><p style="text-align: justify;">If finding engineering talent is already incredibly hard, now consider how hard it is to find senior security talent. There&#8217;s a lot of talk about how there&#8217;s the so-called &#8220;cybersecurity talent shortage&#8221;, but both the people who claim that security is oversaturated and people who say that we need 4 million (or whatever the number is now) security engineers are all wrong.<a href="https://ventureinsecurity.net/p/lets-get-real-there-is-no-such-thing"> I explained what&#8217;s actually going on years ago</a>. It&#8217;s pretty simple: there are too many people in cyber looking for entry-level jobs, and very few senior professionals.</p><p style="text-align: justify;">The people who deeply understand detection engineering, incident response, cloud security and engineering, identity (I mean deeply - like being able to find an attack path by hand), network exploitation, compliance requirements, and adversary behavior are extremely rare. Most security tools, whether they are focused on prevention, detection, response, remediation, or recovery, essentially &#8220;encode&#8221; the expertise of a small number of highly specialized researchers and engineers, and then distribute that knowledge to hundreds or thousands of customers. In a sense, security vendors industrialize very limited expertise, turning scarce security talent into software.</p><p style="text-align: justify;">Obviously, this model is not perfect. The logic security vendors build can be generic, it can miss the nuances of individual environments, and so on, but what it does really well is deliver the kind of expertise to the end customers that most would never be able to afford and/or attract on their own.</p><p style="text-align: justify;">Now imagine for a second what would happen if every company started trying to build security tools internally. Instead of several thousand vendors competing for the top 1% of security engineers, we would have tens (or hundreds?) of thousands of enterprises all trying to recruit, retain, and manage their own in-house detection engineers, cloud security architects, threat hunters, and security platform builders. The math simply doesn&#8217;t work because there is not enough security expertise. Contrary to popular belief, AI is not going to change that.</p><p style="text-align: justify;">All this makes me think that while some security tools can definitely be built internally, security teams are less likely to build those that require specialized security expertise.</p><h2 style="text-align: justify;"><strong>The cost of building is going down, but the cost of ownership is not so much</strong></h2><p style="text-align: justify;">Another important reason why companies won&#8217;t start building their own tools is the cost of ownership.</p><p style="text-align: justify;">AI is truly reducing the upfront development cost, but in no way is it changing the equation around the total cost of ownership. I totally get why people are so excited about building with AI, but building software isn&#8217;t just about launching new cool features fast. It&#8217;s also about maintenance. Who is going to update integrations when APIs change? Who is going to refactor the system when there&#8217;s too much tech debt? Who is going to debug it at all times? AI is going to increasingly take care of more and more of these tasks, but humans will still be required to make things work at enterprise scale. Every software vendor has to deal with on-call rotations, documentation, knowledge transfer, feature requests, bug fixes, scaling infrastructure, compliance, audits, and retraining models, and the long tail of maintenance is usually much more expensive than the initial cost of building.</p><p style="text-align: justify;">Buying software is about buying a lot of intangibles that come with it, like reliability, security, being able to pass complex audits across jurisdictions, operational resilience at scale, partners they can trust when something breaks at the worst possible moment, etc. All these things have to be considered when companies get too excited about building things internally, and most teams will decide against it as soon as they see how big the gap between the cost of building and the cost of maintenance actually is.</p><p style="text-align: justify;">All this makes me think that while some security tools can definitely be built internally, security teams are less likely to take a stab at building tools where the total cost of ownership is very high (this applies to a lot of security products because most products need constant updating to stay effective).</p><h2 style="text-align: justify;"><strong>Liability is playing a critical role in build vs. buy decisions</strong></h2><p style="text-align: justify;">When companies build software internally, they own the consequences of things not going well. If something breaks, or when an incident happens (be it an outage or a security breach), there&#8217;s no vendor contract to lean on, and no shared responsibility model. It&#8217;s entirely on them to deal with whatever happens.</p><p style="text-align: justify;">For a lot of the areas of enterprise, the risks are acceptable. Say, if a marketing team wants a dashboard to track how their campaigns are doing, it can make sense to build a tool that pulls from internal CRM data and shows it in a nice UI. Or, say a human resources team is spending too much time dealing with PTO requests - that, too, can be automated internally.</p><p style="text-align: justify;">Security is a different beast because it is directly connected to compliance, regulatory requirements, customer trust, and brand reputation. Few CISOs are going to sleep well if their already under-resourced teams start vibecoding their own security tooling, both because that can increase the probability of a breach, and because it can make compliance a nightmare. Auditors may not accept &#8220;we built it ourselves&#8221; as proof of control and start asking for documentation, testing, change management, and independent validation. When that happens, an internal tool quickly becomes a liability instead of an advantage.</p><p style="text-align: justify;">Another factor people are forgetting in these discussions about vibecoding is insurance. Cyber insurance underwriters don&#8217;t just ask whether a company &#8220;has security&#8221;; they ask what tools the company is using, whether they&#8217;re industry-recognized, whether they&#8217;re maintained, audited, supported, and so on. Even if they don&#8217;t ask these questions upfront, if a large enterprise gets breached, and it turns out that critical security controls were replaced with internally built tools instead of dedicated vendors, that can create serious complications, and in some cases, it could even invalidate coverage. Bottom line, liability concerns are an important factor to consider. For a tech company that just needs SOC 2 to sell to enterprises, it may not matter as much, but publicly traded companies or especially those in regulated industries surely have more to lose.</p><p style="text-align: justify;">All this makes me think that while some security tools can definitely be built internally, security teams are less likely to build those that can expose them to liability and have the potential to create issues with regulators, auditors, or insurance companies.</p><h2 style="text-align: justify;"><strong>Tools built internally usually lack industry-level intelligence</strong></h2><p style="text-align: justify;">As I have said, products built by security vendors can offer somewhat of a generic coverage, but sometimes that is a feature, not a bug. Vendors get to see patterns (attack techniques, misconfiguration trends, exploit chains, false positive patterns, real-world breach data, etc.) across many different environments. That kind of visibility creates a network effect, and the more customers they get, the better their detection logic, threat models, and defensive playbooks become.</p><p style="text-align: justify;">An internal tool only sees one environment, so even though at some companies it can be super tailored to what they think they need, it is always going to lack breadth compared to something built by a vendor servicing many customers. Internal tools don&#8217;t get the benefit of having shared intelligence or even lessons learned from incidents that happen at other companies. For security products this is a huge gagp because exposure to many examples of &#8220;badness&#8221; is a requirement for truly comprehensive coverage. The detection know-how of CrowdStrike or Palo Alto can only really be replicated if a company can see that many environments at the same time, and I don&#8217;t think anyone can truly replicate that inside a single enterprise, no matter how big or mature that enterprise is.</p><p style="text-align: justify;">All this makes me think that while some security tools can definitely be built internally, security teams are less likely to build those that benefit from industry-wide network effects and that would be of limited value without them.</p><h2 style="text-align: justify;">Two bonus reasons why CISOs should not be rushing to build their own security tools</h2><h3>It will really complicate hiring and new employee onboarding</h3><p style="text-align: justify;">Security teams are always resource-constrained and can&#8217;t afford to have new analysts or engineers spend months just learning internal systems before contributing. When new people join the company, they need to ramp quickly and start delivering value on day one.</p><p style="text-align: justify;">When companies use standard tools, onboarding is much faster because new hires will often already know the tools they&#8217;ll be using or can rely on existing documentation and vendor support. Custom-built tools, on the other hand, tend to have much worse documentation, rely on tribal knowledge, making hiring harder and onboarding longer since no one comes in with existing experience in your internal custom stack.</p><h3>You have to build your own integrations</h3><p style="text-align: justify;">No security team can just use a single tool to do everything it needs in one place. Inevitably tools sprawl, and all these SIEMs, EDRs, CSPMs, DSPMs, clouds, IdPs, vuln scanners, ticketing platforms, etc. have to talk to one another. Maintaining integrations is a lot of work, and while we have to admit many cyber vendors don&#8217;t always do a great job here, when you build your own tools, integration becomes 100% your problem.</p><p style="text-align: justify;">If you build custom tools, you own every connector. AI can help write them, but APIs change, auth breaks, vendors update endpoints, and you end up having to maintain plumbing instead of improving your company&#8217;s security. I personally don&#8217;t think this is a good use of security teams&#8217; time but I am sure there are plenty of people who will disagree.</p><h1 style="text-align: justify;"><strong>Security teams will be building a lot of their own glue and productivity tools (and they should)</strong></h1><p style="text-align: justify;">To summarize, I don&#8217;t think security teams are going to be able to build their own security tools at scale, in particular:</p><ul><li><p>Tools that are technologically complex, need to operate at a massive scale, process a lot of data, require agents, etc.</p></li><li><p>Tools where the total cost of ownership is very high (this applies to a lot of security products because most products need constant updating to stay effective).</p></li><li><p>Tools that require specialized security expertise.</p></li><li><p>Tools that can expose the company to liability and/or can create issues with regulators, auditors, or insurance companies.</p></li><li><p>Tools that benefit from industry-wide network effects and that would offer limited value without it.</p></li></ul><p style="text-align: justify;">This leaves one area where I do think we&#8217;ll see a lot of tools being built internally. I am talking about tools that make security teams more efficient doing what they are actually spending the most time on every day.</p><p style="text-align: justify;">I have previously written that<a href="https://ventureinsecurity.net/p/most-of-the-security-teams-work-has"> most of the security teams&#8217; work has nothing to do with chasing advanced adversaries</a>. In that piece from several years ago, I explained that &#8220;While many people join cybersecurity after being inspired by the idea of hacking, the vast majority of security work is far removed from actively trying to catch adversaries. Working on a cybersecurity team at an enterprise is similar to working on any other team, in that a disproportionately large amount of time is spent on:</p><ul><li><p>Communication, which includes meetings, sending and responding to emails and messages in Slack or Teams, answering questions, preparing reports and status updates, tracking key performance indicators (KPIs), and coordinating with other departments.</p></li><li><p>Cross-functional collaboration, which includes reading and writing documentation, understanding how different departments do their work, coordinating complex initiatives spanning multiple teams, explaining the importance of various controls to employees and functional leaders, and negotiating the minimum realistic security measures.</p></li><li><p>Security evangelism, which includes explaining why passwords cannot be saved in the spreadsheet or sent via text (even via encrypted messaging platforms), why service accounts cannot have domain admin rights, why people should use Yubikeys instead of the SMS-based MFA, and the like. Most importantly, all this needs to be done without becoming a bottleneck for people trying to do their work and achieve company revenue goals, and without ruining relationships with everyone at the organization.</p></li><li><p>Buying and maintaining security tooling, which includes conducting gap analysis, testing new security solutions, periodically assessing the implementation of existing security tools, addressing issues surrounding configuration, and deciding which policies are appropriate to be implemented in what parts of the environment.</p></li><li><p>Resource planning, which includes negotiating budgets and headcount, justifying investment in specific areas of security, structuring, organizing, and re-organizing teams, and working with human resources and recruiters to develop hiring and employee compensation plans.</p></li><li><p>Training and onboarding, which includes reading and writing documentation, and guiding new employees to get up to speed with how things are done at the organization.</p></li></ul><p style="text-align: justify;">Many would argue that these things are boring, but such is the nature of office jobs, and work in general - a lot of what we do are mundane tasks that just need to get done and not the most exciting initiatives that use all of our skills and abilities. Every office job has a part that lives in Excel spreadsheets and PowerPoint presentations.&#8221; - Source:<a href="https://ventureinsecurity.net/p/most-of-the-security-teams-work-has"> Most of the security teams&#8217; work has nothing to do with chasing advanced adversaries</a></p><p style="text-align: justify;">This is the stuff that security teams should be automating, all this undifferentiated heavy lifting as Amazon would call it. I firmly believe that unless you&#8217;re one of the top 1% of the engineering-driven security teams, things like prevention, detection, response, and recovery are better left to security vendors. Where building stuff with AI comes in for building the glue, the tools that automate everything between. It&#8217;s about automating workflows, automating work, and increasing productivity.</p><p style="text-align: justify;">In the past, security teams were limited to the capabilities of their Security Orchestration, Automation, and Response (SOAR) platforms, but now they can surpass what these platforms were able to offer. The opportunity today isn&#8217;t to get rid of the core security vendors and replace them with vibecoded solutions; it is to build custom productivity tools to make security teams more effective.</p><p style="text-align: justify;">Increasing personal productivity and eliminating glue work is where security teams should focus their AI-driven automation efforts. Doing this well requires deep knowledge of internal processes, procedures, and all the shortcuts and edge cases that exist in a real environment - context no external vendor can fully replicate.</p><p style="text-align: justify;">At the same time, security teams shouldn&#8217;t try to rebuild mature products that require a lot of engineering expertise, security know-how, or that benefit from network effects just to &#8220;save money&#8221;. Maintaining any meaningful in-house tool almost always costs more than paying for a subscription once you factor in engineering time, upkeep, and ongoing improvements. Let&#8217;s be honest - we&#8217;ve seen how this plays out before with scripts. What starts as a quick productivity win slowly turns into another brittle system to maintain. The real opportunity for savings and impact lies in automating what&#8217;s truly unique to the organization: its unique systems, workflows, and institutional knowledge.</p><p style="text-align: justify;"><em>Update: After publishing this article, my friend Guillaume Ross sent me a note that summarizes things better than I ever could: &#8220;Shell scripts are now very easy to build, but building a data lake is not. Sure, Bay Area-style security teams can now build anything, but others are probably better off using Claude Code to generate SOAR playbooks, parse logs, or create detections as code. They should stay away from trying to build anything serious that collects a lot of data and requires infrastructure.&#8221; </em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rewD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rewD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!rewD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!rewD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!rewD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rewD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;image.png&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="image.png" title="image.png" srcset="https://substackcdn.com/image/fetch/$s_!rewD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!rewD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!rewD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!rewD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91966606-6a08-4064-8e37-62fd0a476568_1600x1066.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/theres-only-one-kind-of-tool-security?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/theres-only-one-kind-of-tool-security?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Anthropic won’t kill cyber, but it will kill some companies]]></title><description><![CDATA[Claude Code Security isn't going to kill cyber, but it will kill some categories and/or force startups in these categories to pivot]]></description><link>https://ventureinsecurity.net/p/anthropic-wont-kill-cyber-but-it</link><guid isPermaLink="false">https://ventureinsecurity.net/p/anthropic-wont-kill-cyber-but-it</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 03 Mar 2026 14:58:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-8Ex!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the past several weeks, social media has been exploding with predictions that &#8220;cyber is dead&#8221;. It doesn&#8217;t take much insight to jump on that bandwagon, as Anthropic&#8217;s announcement of Claude Code Security indeed sent the cybersecurity public market into turmoil, with some companies losing as much as 20% of their market cap. Contrary to what many think, declarations that &#8220;security is over&#8221; are very premature. In this piece, I share a perspective on why AI is actually expanding the total cybersecurity market, not killing it (and yet, why some categories will indeed suffer).</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.tines.com/webinars/workflow-clarity-where-ai-fits-in-modern-automation/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-0303">Tines</a>. </em></p><h4><strong><a href="https://www.tines.com/webinars/workflow-clarity-where-ai-fits-in-modern-automation/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-0303">Where does AI fit in modern automation?</a></strong></h4><p>Human-led. Rules-based. LLM-powered agentic systems. Each promises efficiency. Each has limits. The real advantage? Knowing when, and how, to use them together.</p><p>The teams pulling ahead aren&#8217;t betting on a single model. <strong>They&#8217;re architecting a custom mix of all three.</strong></p><p>On <strong><a href="https://www.tines.com/webinars/workflow-clarity-where-ai-fits-in-modern-automation/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-0303">March 12th</a></strong>, join Tines and <em>The Hacker News</em> for a webinar exploring how to strike the right balance between approaches for your org, and scale AI adoption without sacrificing control or security.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tines.com/webinars/workflow-clarity-where-ai-fits-in-modern-automation/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-0303&quot;,&quot;text&quot;:&quot;Register Here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tines.com/webinars/workflow-clarity-where-ai-fits-in-modern-automation/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-primary-0303"><span>Register Here</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>What Claude Code Security is and is not</h1><p style="text-align: justify;">Let&#8217;s start by taking a quick look at what Claude Code Security is and is not. If you haven&#8217;t read Anthropic&#8217;s announcement, I recommend you check it out. Essentially,<a href="https://www.anthropic.com/news/claude-code-security"> Claude Code Security</a> &#8220;scans codebases for security vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix security issues that traditional methods often miss&#8221;. Basically, Anthropic is saying that it will be able to truly understand the codebase and provide patches that people will be able to reliably accept. This part is important because there are many security startups focused on suggesting patches, so Anthropic is betting that it can do it as a part of its experience (which obviously makes sense), and that it can do a much better job than any of the add-ons (which again, I don&#8217;t see why it wouldn&#8217;t be able to).</p><p style="text-align: justify;">If you know security and understand what kinds of capabilities we are talking about here, you have probably realised that, at the very fundamental level, Anthropic just announced a potential solution to application vulnerabilities that are currently being discovered with SAST scanning and such. Without a doubt, this can be a huge step forward, and it can help application and product security engineers find and fix vulnerabilities before the code is shipped, without having to chase down developers and convince them that they should care. Unless you are a founder focused on better code scanning to find vulnerabilities and help security teams fix them (i.e, unless Claude Code Security is coming to eat your lunch), Anthropic&#8217;s announcement is great news. However, in the grand scheme of things, it is addressing a very, very small (even if very important) slice of security.</p><p style="text-align: justify;">&#8203;Security is about much more than finding vulnerabilities in code. Think about all the work that happens outside of the code repository, like:</p><ul><li><p>Managing identity sprawl and privilege risk (dealing with over-privileged users, stale accounts, unmanaged service identities, etc.)</p></li><li><p>Detecting active exploitation attempts when they happen (detecting suspicious login patterns, unusual device activity, abnormal traffic flows, and so on)</p></li><li><p>Enforcing network segmentation and egress controls (dealing with flat networks, exposed services, uncontrolled outbound access, etc.)</p></li><li><p>Preventing cloud misconfigurations (flagging public storage buckets, overly permissive IAM policies, disabled logging, etc. - stuff CSPMs have been doing for a while)</p></li><li><p>Protecting secrets and machine credentials (hardcoded tokens, shared API keys, long-lived certificates, and other things NHI startups have been tackling)</p></li><li><p>Maintaining infrastructure integrity (i.e., dealing with configuration drift, unauthorized changes, unmanaged shadow infrastructure, etc.)</p></li><li><p>Monitoring third-party and supply chain access (vendor VPN access, SaaS integrations, unmanaged OAuth applications, bring your own cloud, and so on)</p></li><li><p>Automating compliance and preparing for audits (evidence collection, tracking risk acceptance, etc.)</p></li><li><p>Responding to incidents across environments (taking actions to contain threats, revoking access, cross-system investigations, and other aspects of incident response)</p></li><li><p>Restoring systems and operations after incidents or failures (all the stuff that can be bucketed under &#8220;cyber resilience&#8221;, such as environment rollback, data recovery, service re-deployment, etc.)</p></li></ul><p style="text-align: justify;">Claude Code Security, even if it works perfectly well, isn&#8217;t going to solve all these problems. This brings me to the main point: most of cybersecurity is here to stay, and AI will only make it grow faster and bigger than before.</p><h1>Most of cybersecurity is here to stay, and AI will only make it grow faster and bigger than before</h1><p style="text-align: justify;">If we agree that the overwhelming majority of cybersecurity has nothing to do with code security, then it should be clear that in no way is Claude Code Security threatening companies like Palo Alto Networks, CrowdStrike, Zscaler, Okta, Cloudflare, and others that have had their stock price drop following the announcement. However, I&#8217;ll go further and say that for most companies in cyber, AI isn&#8217;t a threat but a real opportunity.</p><p style="text-align: justify;">For decades, one of the biggest factors that would limit the ability of attackers to target companies has been the lack of resources. In other words, they simply didn&#8217;t have the time, talent, or ability to look everywhere at once. It&#8217;s not a secret that if you look beneath the surface, every single company is a mess on the inside, but because of how complex the environments are and how much time it takes for attackers to do reconnaissance, oftentimes what actually keeps companies from getting breached is the lack of resources on the attacker side.</p><p style="text-align: justify;">With AI, that is soon going to go away. Attackers are not bound by corporate governance or acceptable-use policies deciding which models can or cannot be deployed. They will use every model available, every autonomous agent, every form of automation that allows them to enumerate infrastructure, map dependencies, generate exploits, and test hypotheses at a scale that was previously impossible. The cheaper LLMs become, the lower the cost of attacking will be, and the higher the volume of attacks is going to become. This shift is going to fundamentally change the economics of defense. When attackers gain near-unlimited reconnaissance and experimentation capacity, companies won&#8217;t be able to rely on reactive security. Very soon, hoping that vulnerabilities and misconfigurations remain undiscovered will stop being a strategy (let&#8217;s be honest, this is exactly what most companies are relying on today, and it&#8217;s kind of working).</p><p style="text-align: justify;">As AI models get better and cheaper, I think companies will be forced to start fixing a lot of the problems they could previously just hide. When this happens, we will see massive growth across exposure, identity security, infrastructure security, and many other areas that are foundational to enterprise security.</p><p style="text-align: justify;">AI will also expand cybersecurity by dramatically increasing the surface area that needs to be protected. Whether enterprises end up deploying AI agents themselves (most of them probably won&#8217;t do that for a while) or buying off-the-shelf tools that help with different use cases (seems more likely IMO), all the copilots, automated workflows, and model integrations are expanding the attack surface area pretty significantly. Whether these problems will get addressed by the existing solutions or we&#8217;ll see new vendors (I don&#8217;t have a horse in this race, so thinking it will be a mix of both), someone will have to protect AI deployments. That, in turn, will create more demand for cybersecurity.</p><h1>We have seen this movie before</h1><p style="text-align: justify;">If you&#8217;re still skeptical about cyber surviving the new AI wave, consider that we have seen this movie before. Think back to the early days of cloud adoption, when most people thought that hyperscalers would effectively &#8220;solve security.&#8221; Standardized infrastructure, managed patching, and centralized controls were supposed to reduce risk and simplify operations. Instead, cloud removed friction from building and deploying software, and that acceleration changed the entire technology landscape. Development cycles compressed, infrastructure became ephemeral, and teams got the ability to spin up resources instantly without centralized oversight. That velocity created entirely new problems: CI/CD pipelines introduced software supply chain risk, infrastructure-as-code led to configuration drift, containers created runtime visibility challenges, and identities multiplied across humans, workloads, and APIs. Cloud didn&#8217;t just create the CSPM market; it basically led to an explosion of adjacent markets, including CIEM, container security, secrets management, SaaS security, Zero Trust networking, and many, many more. SaaS adoption alone (also enabled by the cloud) scattered data across hundreds of vendors and forced companies to rethink access control, governance, and third-party risk from the ground up.</p><p style="text-align: justify;">I think that AI will follow the same pattern, but likely faster and on a larger scale. Already today, AI dramatically lowers the cost of building software and automating manual work, which means companies will deploy more systems, integrate more tools, and automate more workflows than ever before. The flip side of that is that every AI assistant becomes a new identity with permissions, every model integration becomes a new data exposure pathway, and every automated workflow becomes a potential attack surface. Just like cloud created entire categories to manage visibility, posture, and identity sprawl, AI will drive demand for both things we can think of now (model governance, agent identity security, data lineage protection, and all the other exciting stuff people are talking about) and plenty of problems we can&#8217;t even imagine.</p><p style="text-align: justify;">The biggest lesson from cloud, in my opinion, is that increasing the speed of innovation does not reduce security needs; it multiplies them through second- and third-order consequences. AI is not going to kill cybersecurity, it will expand it across layers we are only beginning to recognize today. Obviously, when that happens, the market will grow massively.</p><h1>Vibecoding isn&#8217;t going to kill security tools either</h1><p style="text-align: justify;">Another mistaken belief that I see spreading in the industry is that cyber is going to die because enterprises are going to be so empowered with AI that they will simply vibecode their own tools. Rather than re-explaining what I&#8217;ve tried explaining several times, let me just share what I recently shared on LinkedIn.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-B56!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-B56!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png 424w, https://substackcdn.com/image/fetch/$s_!-B56!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png 848w, https://substackcdn.com/image/fetch/$s_!-B56!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png 1272w, https://substackcdn.com/image/fetch/$s_!-B56!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-B56!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png" width="908" height="1096" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1096,&quot;width&quot;:908,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;image.png&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="image.png" title="image.png" srcset="https://substackcdn.com/image/fetch/$s_!-B56!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png 424w, https://substackcdn.com/image/fetch/$s_!-B56!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png 848w, https://substackcdn.com/image/fetch/$s_!-B56!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png 1272w, https://substackcdn.com/image/fetch/$s_!-B56!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f78313-902a-488b-a3b6-8a8f770a1446_908x1096.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: justify;">&#8203;</p><p style="text-align: justify;">Source:<a href="https://www.linkedin.com/posts/rosshaleliuk_has-anyone-vibecoded-an-edr-yet-and-put-crowdstrike-activity-7432827510322704384-qfPh?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABd70ggBHphNqkAOu3BA8zLOqO0H8zsPWZc"> my LinkedIn</a></p><p style="text-align: justify;">I continue to stand by every single word here. AI is a game-changer because it accelerates how quickly we can build and ship new products, but speed is not the same thing as replacing the underlying systems that enterprises depend on. Large organizations don&#8217;t buy &#8220;features&#8221;, they buy outcomes. Buying software is about buying a lot of intangibles that come with it, like reliability, security, being able to pass complex audits across jurisdictions, operational resilience at scale, partners they can trust when something breaks at the worst possible moment, etc. If these intangibles weren&#8217;t so important, most companies would just be using open source (let&#8217;s be real, there&#8217;s an open source version of every single billion-dollar company out there).</p><p style="text-align: justify;">The importance of these intangibles doesn&#8217;t go down just because code can be generated faster, I&#8217;d actually argue it goes up quite a bit. Now that everyone can ship software super fast, it becomes more, not less important that customers can actually rely on their partners.</p><p style="text-align: justify;">Security has always been about continuously raising the bar for the attackers, as every time our defenses improve, bad actors find new ways to get in. Even if we eliminate entire classes of known vulnerabilities (which, by the way,<a href="https://ventureinsecurity.net/p/cyber-optimist-manifesto-why-we-have"> we have been doing</a> for decades), the ecosystem will change and attackers will find new weaknesses to exploit as they have done in the past. The real opportunity with AI isn&#8217;t in pretending that it somehow makes foundational infrastructure become obsolete (because it simply doesn&#8217;t), and not in hoping that we can just vibecode tools (because we can&#8217;t, without getting squashed by the complexity and edge cases at scale). The real opportunity is in using AI to navigate the operational complexity that makes security so hard in the first place.</p><h1>Claude Code Security will still cause collateral damage</h1><p style="text-align: justify;">I have repeated several times in this piece that the cybersecurity industry is safe for now. That said, Claude Code Security will absolutely cause collateral damage. If a frontier AI lab can natively understand a codebase, detect vulnerabilities, and propose patches inside the same environment where code is getting written, the standalone value proposition of &#8220;we scan your code and suggest fixes&#8221; becomes very hard to defend.</p><p style="text-align: justify;">SAST has always been the most obvious adjacency for AI labs. It&#8217;s actually pretty simple: whoever generates code will be able to absorb things like QAing that code and securing that code. This is great news for both security teams, who will no longer need to chase down devs to fix stuff, and for engineers, who can just accept a suggested autofix without having to think about security. Once vulnerability detection and auto-remediation are embedded directly into the development workflow, the appsec market will quickly start to look commoditized (I think it already does). The differentiation that many appsec tools rely on (better detection engines, smarter prioritization, cleaner reports) will become less compelling when the platform writing the code can also reason about and fix it. I have recently seen a few appsec companies known for building scanners come forward with messages that &#8220;Claude Code Security is a great thing for the industry,&#8221; but I don&#8217;t think anyone inside these companies truly believes that it is good for their business (they are right, though - it is great for the industry!).</p><p style="text-align: justify;">Let me be clear: I don&#8217;t think that Claude Code Security means that application security disappears completely, even though the shape of it will change. If baseline code quality improves and common classes of vulnerabilities are prevented or auto-patched before pull requests are even merged, founders in appsec who built companies around identifying and auto-fixing code flaws will have to have some serious conversations at the board level.</p><p style="text-align: justify;">I am by no means an appsec expert, but it&#8217;s becoming clear to me that while SAST scanners will be fading away, there are two kinds of new appsec products that are starting to take off. One is the new breed of product security tools that started to emerge in recent years. Companies like Prime Security, Clover Security, Seezo, and others (please do forgive me, founder friends, if I missed your company, these are just examples that came to mind) are just some examples of players for whom Claude Code Security isn&#8217;t going to be a threat. The other category of tools that are getting a lot of attention are runtime security solutions like Miggo, Oligo Security, Raven, and others (same disclaimer to founder friends applies). <a href="https://pulse.latio.tech/">James Berthoty of Latio</a> is a big supporter of runtime security, so I suggest you check out his thoughts if this is an area you are interested in.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-8Ex!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-8Ex!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!-8Ex!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!-8Ex!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!-8Ex!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-8Ex!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;image.png&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="image.png" title="image.png" srcset="https://substackcdn.com/image/fetch/$s_!-8Ex!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!-8Ex!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!-8Ex!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!-8Ex!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37f24bc3-27e7-46ca-b7b5-b8bf247096f6_1600x1066.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/anthropic-wont-kill-cyber-but-it?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/anthropic-wont-kill-cyber-but-it?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[RSA mafia continues to shape the industry 44 years later]]></title><description><![CDATA[RSA Security continues to steer the direction of the industry through people, communities, and companies it shaped]]></description><link>https://ventureinsecurity.net/p/rsa-mafia-continues-to-shape-the</link><guid isPermaLink="false">https://ventureinsecurity.net/p/rsa-mafia-continues-to-shape-the</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 17 Feb 2026 15:11:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!KR7R!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Although, as a startup founder now, I don&#8217;t get much (any?) time to look at parts of the industry unrelated to what I am building, I would still consider myself to be pretty plugged into the cybersecurity ecosystem. I have a good idea what is being discussed, what people pay attention to, and what questions are being asked, be it among CISOs, security professionals, investors, founders, startup operators, industry analysts, or anyone in between.</p><p>When people in the industry talk about many companies, it&#8217;s either innovative startups or powerful incumbents with unmatched distribution that get discussed. And yet, in the past five years, I recall having only one conversation (yes, one!) about what was once one of the most consequential giants in cybersecurity: RSA Security. This is a huge miss because, as you will see today, RSA Security, through its alumni, spinoffs, and the sheer impact it had in all areas of cyber, continues to influence the direction of security. That is exactly what this article is about.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.endorlabs.com/?utm_source=venture-in-security&amp;utm_medium=newsletter&amp;utm_campaign=ai">Endor Labs</a></em></p><h4><a href="https://www.endorlabs.com/lp/practical-guide-ai-application-security?utm_source=venture-in-security&amp;utm_medium=newsletter&amp;utm_campaign=ai">Ship secure code by default, whether it&#8217;s written by humans or AI.</a></h4><p><em>Discover how to secure modern software in the age of AI with <strong><a href="https://www.endorlabs.com/lp/practical-guide-ai-application-security?utm_source=venture-in-security&amp;utm_medium=newsletter&amp;utm_campaign=ai">A Practical Guide to AI and Application Security</a>. </strong>This essential resource demystifies how AI generates code, where the most critical risks emerge, and what AppSec leaders must do to protect AI-native development workflows.</em></p><p><em>Whether you&#8217;re tackling vulnerable dependencies, architectural risks, or integrating security earlier in your SDLC, this guide equips you with practical strategies to balance productivity and safety. Get actionable insights that help your team stay ahead of AI-driven threats and confidently secure code from the first commit to production.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.endorlabs.com/lp/practical-guide-ai-application-security?utm_source=venture-in-security&amp;utm_medium=newsletter&amp;utm_campaign=ai&quot;,&quot;text&quot;:&quot;Get the Guide&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.endorlabs.com/lp/practical-guide-ai-application-security?utm_source=venture-in-security&amp;utm_medium=newsletter&amp;utm_campaign=ai"><span>Get the Guide</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>A brief history of RSA Security</h1><p>RSA Data Security was founded in 1982 by three MIT cryptographers, Ron Rivest, Adi Shamir, and Leonard Adleman (the name &#8220;RSA&#8221; comes from the first letters of their last names). These three people, whom you don&#8217;t hear much about, invented what is now known as the RSA public-key cryptography algorithm, an algorithm that became one of the foundational technologies of the modern internet. RSA made encryption commercially viable during a time when the idea of secure internet communication itself was still pretty theoretical. RSA software libraries enabled secure web traffic, VPNs, email encryption, and financial transactions. Basically, their tech became embedded everywhere, from browsers to banking infrastructure all over the world.</p><p>RSA&#8217;s biggest commercial breakthrough came with the introduction of SecurID, a hardware token that generated one-time passwords for multi-factor authentication. RSA Data Security didn&#8217;t invent this product. Instead, in 1996, the company was<a href="https://www.nytimes.com/1996/04/16/business/computer-security-concern-agrees-to-be-sold-for-stock.html#"> acquired for $250 million</a> by Security Dynamics which was in the business of making SecurID. Following this acquisition and integration of the RSA algorithms with the SecurID token, SecurID became the standard for enterprise authentication, used by governments, banks, and Fortune 500 companies. This acquisition was so consequential that in 1999, Security Dynamics<a href="https://www.cnet.com/tech/tech-industry/short-take-security-dynamics-changes-name/"> announced</a> it would be taking the name of its well-known subsidiary, RSA Data Security, and becoming RSA Security. For many organizations, RSA became synonymous with authentication itself.</p><p>RSA Security heavily leveraged M&amp;As to expand into new areas and to acquire technologies it needed. Between 2001 and 2006, it bought and integrated several companies: Xcert International (digital certificate-based products for securing e-business transactions), 3-G International (smart card and biometric authentication products), Securant Technologies (identity management), Cyota (online security and anti-fraud for financial institutions), and PassMark Security (online banking authentication).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lbuf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lbuf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!Lbuf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!Lbuf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!Lbuf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lbuf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lbuf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!Lbuf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!Lbuf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!Lbuf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc306b18-82b3-4740-84de-ee2c3b34eab3_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>(As you can clearly see, these were the times when high-res logos weren&#8217;t a requirement).</em></p><p>Following its own acquisition spree, RSA Security itself became an acquisition target. On September 14, 2006, RSA stockholders approved the company&#8217;s acquisition by EMC Corporation for $2.1 billion. At the time, EMC was best known as a storage infrastructure giant, but it recognized early that securing data would become just as important as storing it. RSA became EMC&#8217;s dedicated security division and a cornerstone of its broader vision to help enterprises protect information across increasingly distributed and connected environments. Under EMC, RSA expanded far beyond its original authentication roots. It built a broad enterprise security portfolio that included identity and access management, security information and event management (SIEM) through NetWitness, governance, risk, and compliance via Archer, and fraud and risk intelligence platforms. RSA evolved from a cryptography leader into one of the most comprehensive enterprise security providers, serving governments, financial institutions, and large enterprises worldwide. Its technologies became deeply embedded in security operations, compliance programs, and authentication workflows across critical infrastructure.</p><p>RSA&#8217;s trajectory shifted again in 2016 when EMC was<a href="https://www.crn.com/news/dell-buys-emc-for-67-billion"> acquired by Dell Technologies</a> in the largest technology merger ever ($67 billion!). RSA became part of Dell&#8217;s family of companies, alongside VMware and other infrastructure businesses. While RSA remained a respected name, it operated within a much larger corporate structure where security was only one part of a broader infrastructure strategy. That, however, didn&#8217;t last long as in 2020, RSA was spun out of Dell and<a href="https://stg.com/news/rsa-emerges-as-independent-company-following-completion-of-acquisition-by-symphony-technology-group/"> acquired by Symphony Technology Group (STG)</a>, returning to independent ownership. This marked a symbolic full circle for a company that had helped define the cybersecurity industry decades earlier.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-19U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-19U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!-19U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!-19U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!-19U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-19U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:241097,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ventureinsecurity.net/i/188213843?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-19U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!-19U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!-19U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!-19U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ddbcd6e-1e79-4c3c-ba35-26c3b1329860_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Some of today&#8217;s cyber giants were once members of the RSA family</h1><p>Some of today&#8217;s cyber giants come from the RSA family, which includes communities, companies, and people.</p><h2>RSA Security created the industry&#8217;s defining conference</h2><p>March 15, 2022, marked the rebirth of the RSA Conference as a fully independent business. Originally started back in 1991 by RSA Data Security, RSA was once a small, specialized cryptography conference focusing on digital signature standards. Over the next three decades, it grew alongside RSA Security itself, following the company through its acquisitions by EMC Corporation and later Dell Technologies. In 2022, Crosspoint Capital, a PE firm focused on cyber and infrastructure software,<a href="https://www.prnewswire.com/news-releases/crosspoint-capital-partners-leads-acquisition-of-rsa-conference-301502683.html"> acquired</a> a significant interest in the conference and started operating it as a separate business.</p><p>Today, RSA Conference stands as the industry&#8217;s &#8220;town square&#8221;, a neutral gathering place where security leaders, practitioners, founders, investors, analysts, and policymakers come to shape the future of our industry. What started as a niche cryptography event a long time ago has now turned into something much larger - a place where people get to grow their careers, where startups first present their innovation to market, and where the direction of the entire industry takes form.</p><h2>Enduring players that were once part of RSA Security</h2><p>A number of companies that continue to play a significant role in their market segments were once part of RSA Security, including Archer, NetWitness, and Outseer.</p><h3><strong>Archer</strong></h3><p><a href="https://www.archerirm.com/">Archer</a> has been focusing on helping enterprises manage governance, risk, and compliance (GRC) since 2001. When most organizations relied on Excel spreadsheets, email, and fragmented workflows to track risk and compliance, Archer launched a centralized platform that essentially became an operating system for GRC. The product made it possible for large enterprises to map controls, track regulatory requirements, manage audits, and demonstrate compliance across complex environments.</p><p>RSA acquired Archer in 2010, recognizing that GRC was becoming a huge need at large enterprises. Under RSA, Archer became one of the most widely deployed GRC platforms in the world, particularly in highly regulated industries like financial services, healthcare, and government. Fundamentally, Archer became a system of record for enterprise risk, deeply embedded in how organizations understood and managed their risk and compliance (<a href="https://ventureinsecurity.net/p/owning-the-control-point-in-cybersecurity">I described it as one of the &#8220;control points&#8221; in cyber)</a>.</p><p>In 2023, Archer was spun out as an independent company under Symphony Technology Group, also coming full circle and becoming an independent company. It&#8217;s hard to believe that, still today, 25 years after its founding (think about that for a second), the Archer platform remains one of the most trusted and widely deployed solutions for enterprise risk management and regulatory compliance, used by many of the world&#8217;s largest organizations. There are <a href="https://ventureinsecurity.net/p/grc-market-evolution-how-the-automation">cohorts of new startups trying to go after GRC</a>, some agentic and others not, but neither of them has so far been successful in taking on Archer at large enterprises at scale.</p><h3><strong>NetWitness</strong></h3><p>In April 2011, EMC Corporation acquired<a href="https://www.netwitness.com/"> NetWitness</a>, a network security analytics company led by Amit Yoran, a visionary security executive the industry tragically lost last year. EMC integrated NetWitness into its security division, RSA, combining NetWitness&#8217;s network visibility and packet analysis with RSA&#8217;s SIEM to provide a comprehensive threat detection and response. This acquisition ended up playing a much bigger role in the history of RSA Security. Amit Yoran, once NetWitness CEO, in October 2014 was named president of RSA, a position he held until he became CEO of Tenable in 2017. Although we lost Amit to cancer, he will always be remembered as one of the leaders who was deeply passionate about security and people in it.</p><p>In 2025, PartnerOne, an enterprise software conglomerate,<a href="https://www.newswire.ca/news-releases/partnerone-acquires-netwitness-from-rsa-802869516.html"> acquired NetWitness</a> from RSA, bringing things full circle and turning it into an independent company once again.</p><h3><strong>Outseer</strong></h3><p>The origins of<a href="https://www.outseer.com/"> Outseer</a> go back to RSA&#8217;s Fraud and Risk Intelligence division, which focused on protecting financial institutions from online fraud, account takeover, and unauthorized transactions. As banking and commerce moved online in the 2000s, fraud quickly evolved far beyond simple credential theft into sophisticated, multi-stage attacks. RSA developed advanced fraud detection tools that analyzed user behavior, device fingerprints, network attributes, and transaction context to detect suspicious activity in real time. Under RSA, this business became one of the most widely deployed fraud and authentication platforms in the global financial sector. In 2021, Symphony Technology Group spun out RSA&#8217;s Fraud and Risk Intelligence division as an independent company and rebranded it as Outseer.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1WO2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1WO2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!1WO2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!1WO2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!1WO2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1WO2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1WO2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!1WO2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!1WO2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!1WO2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe70cf1d3-3ec1-479d-8c2d-738f1bf643a2_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Companies that could have become a part of RSA Security but didn&#8217;t</h3><p>While these are some of the better-known acquisitions and spinouts, in an alternate universe, RSA&#8217;s legacy could have been even more impressive. I&#8217;ve heard from multiple people that RSA Security once considered acquiring companies like Splunk and SailPoint, among others, though for various reasons those deals never materialized. Had they happened, the trajectory of the cybersecurity industry (and my &#8220;<a href="https://ventureinsecurity.net/p/20-years-of-cybersecurity-consolidation">20 years of cybersecurity consolidation: how 200 companies became 11</a>&#8221; article) might have looked very different.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><h1>The most impactful part is the generation of leaders that RSA Security helped raise</h1><p>The most impactful legacy RSA Security left behind is the generation of leaders it helped raise. Different people are a part of this &#8220;mafia&#8221; network in different ways. For example,</p><ul><li><p>Art Coviello, Jr. is now a Managing Partner at <a href="https://www.synventures.com/">SYN Ventures</a>, following a two-decade career as an executive at RSA, including ten years as CEO and five additional years as Executive Chairman.</p></li><li><p>Ann Johnson is now a Corporate Vice President at Microsoft, following nearly fifteen years in executive leadership roles at RSA, most recently serving as Vice President of Global IPV and Global Accounts.</p></li><li><p>Rohit Ghai is now CEO of<a href="https://www.barracuda.com/"> Barracuda Networks</a>, following over a decade and a half as CEO of the Division of Dell Technologies, and then CEO of RSA Security.</p></li><li><p>Mark Thurmond, once SVP of Worldwide Sales at RSA Security, is now a Co-CEO at<a href="https://www.tenable.com/"> Tenable</a>.</p></li><li><p>Ash Devata, who is now CEO of<a href="https://www.greynoise.io/"> GreyNoise</a>, had a ~7-year run at RSA Security, culminating in the Head of RSA Solutions role.</p></li><li><p>Dino DiMarino, once VP at RSA Security, is now CEO at<a href="https://www.appviewx.com/"> AppViewX</a>.</p></li><li><p>Dave DeWalt, who would go on to become CEO of McAfee, CEO of FireEye, and then founder &amp; CEO of<a href="https://www.nightdragon.com/"> NightDragon</a>, was Executive Vice President and President of Customer Operations for EMC.</p></li></ul><p>Plenty of people went on to eventually start their own companies, some a while ago and some pretty recently. The list includes -</p><ul><li><p>Rob Davis, CEO and Founder of<a href="https://www.criticalstart.com/"> Critical Start</a></p></li><li><p>Aditya Narayana, Co-Founder of<a href="https://mirrorsecurity.io/"> Mirror Security</a></p></li><li><p>Jessica Alexander, Founder and CEO of<a href="https://www.skematic.ai/"> Skematic</a>, former VP of Sales at CrowdStrike</p></li><li><p>Nadav Cornberg, CEO of<a href="https://eve.security/"> Eve Security</a></p></li><li><p>Dana Wolf, Co-Founder and CEO of<a href="https://www.yeshid.com/"> YeshID</a></p></li><li><p>Muli Motola, Co-Founder and CEO at<a href="https://acsense.com/"> Acsense</a></p></li><li><p>Austin McDaniel, Founder and CEO of<a href="https://goodcode.us/"> Good Code</a></p></li><li><p>Brad Taylor, Co-Founder and CEO of<a href="https://www.proficio.com/"> PROFICIO</a></p></li><li><p>Rob Black, Founder and CEO of<a href="https://fractionalciso.com/"> Fractional CISO</a></p></li><li><p>Mark Jones, Founder and CEO of<a href="https://blacklakesecurity.com/"> BlackLake Security</a></p></li><li><p>Peter Goldstein, Co-Founder and CTO of<a href="https://www.valimail.com/"> Valimail</a> (now a part of DigiCert)</p></li></ul><p>I am sure there are many more notable people, not all of whom are founders (after all, there are many, many ways to achieve impact in cybersecurity).</p><h1>Closing thoughts</h1><p>Cybersecurity is full of mafias. I have previously discussed a few of them in my other articles:</p><ul><li><p><a href="https://ventureinsecurity.net/p/the-power-of-check-point-mafia-the">The power of Check Point mafia, the impact of Foundstone, Juniper Networks &amp; Cisco on the industry, and the origins of cyber ecosystems</a></p></li><li><p><a href="https://ventureinsecurity.net/p/splunk-okta-cylance-palo-alto-crowdstrike">Splunk, Okta, Cylance, Palo Alto, CrowdStrike, and Zscaler mafias in cybersecurity</a></p></li><li><p><a href="https://ventureinsecurity.net/p/follow-the-people-stake-netscreen">Follow the people: @stake, NetScreen, IBM, Israel Defense Forces and the US Armed Forces mafia networks in cybersecurity</a></p></li><li><p><a href="https://ventureinsecurity.net/p/get-ready-for-wiz-mafia-to-forever">Get ready for Wiz mafia to forever reshape the future of cybersecurity</a></p></li></ul><p>RSA Security has given a raise to its own mafia. While the RSA Security&#8217;s booth is no longer the most prominent both at the conference it is named after, its impact lives on, through people, companies, and of course through the RSA Conference community it created.</p><p>Some in the industry still remember the three people - Ronald Rivest, Adi Shamir, and Leonard Adleman - who started RSA Data Security some 44 years ago. For their contributions, in 2002, they all received the Turing Award. The one other person to remember is Jim Bidzos, the original creator of the RSA Conference. Bidzos served as president and CEO of RSA Security from 1986 to 1999, and it was under his leadership that the RSA Conference was first started. Decades later, the event continues to grow beyond what Jim (or anyone else) would have ever imagined.</p><p><a href="https://www.rsaconference.com/usa">I&#8217;ll see you at RSAC 2026 in March</a>!</p><p><em>Stop by my session, too (<a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755922637088001fJ9o">I am speaking</a>), or come say hi at my book signing and grab your copy of &#8220;<a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>&#8221; (right after my session on Tuesday, March 24th at 11am at RSAC Bookstore).</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KR7R!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KR7R!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png 424w, https://substackcdn.com/image/fetch/$s_!KR7R!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png 848w, https://substackcdn.com/image/fetch/$s_!KR7R!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!KR7R!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KR7R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KR7R!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png 424w, https://substackcdn.com/image/fetch/$s_!KR7R!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png 848w, https://substackcdn.com/image/fetch/$s_!KR7R!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!KR7R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9e50e49-8eca-485d-9eca-ea39b65622f3_1999x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/rsa-mafia-continues-to-shape-the?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/rsa-mafia-continues-to-shape-the?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[Stop comparing safety and cybersecurity, they have very little in common]]></title><description><![CDATA[And it&#8217;s time to put the seatbelts analogy to rest]]></description><link>https://ventureinsecurity.net/p/stop-comparing-safety-and-cybersecurity</link><guid isPermaLink="false">https://ventureinsecurity.net/p/stop-comparing-safety-and-cybersecurity</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 10 Feb 2026 15:59:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!D3lk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Nearly a year ago, we hosted Dug Song, the legendary founder of Duo Security, on Inside the Network. During that conversation, Dug shared a powerful analogy that has stuck with me. He explained that in aviation, a plane crashes the same way only once, or maybe twice. Whenever it happens, we get to the bottom of the failure by analyzing black boxes, and then the entire systems and plane designs change to prevent the same failure from ever happening again. In security, it&#8217;s a different story. Organizations get breached the same way over and over, and oftentimes the same company gets breached for the same reason many times. Dug described this as a &#8220;Groundhog Day in the worst possible sense&#8221;, a hamster wheel of pain where we&#8217;re not actually getting better, just reliving the same incidents again and again.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://hubs.ly/Q040QBZF0">Prophet AI</a>. </em></p><p><strong><a href="https://hubs.ly/Q040QBZF0">The Economic Fix for the SOC: AI-Driven Autonomy with Human Guidance</a></strong></p><p>Security leaders know current SOC unit economics are unsustainable. Hiring more analysts cannot scale to meet the volume of modern alerts, and legacy automation tools are often too rigid to maintain. Prophet Security offers a different path: <strong>AI-driven autonomy </strong>that elevates the role of the SOC analyst.</p><p>Prophet AI functions as a virtual SOC analyst, autonomously investigating alerts with the same depth, quality, accuracy, and transparency as your best SOC analysts. By handling the high-volume investigative grunt work, Prophet AI allows you to <a href="https://hubs.ly/Q040QBZF0">transform your SOC operations</a> from one where analysts are consumed by repetitive tasks to one where they can focus on high-impact, low-volume AI-validation, threat hunting, or detection engineering.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://hubs.ly/Q040QBZF0&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://hubs.ly/Q040QBZF0"><span>Learn More</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p>I think most of us feel Dug&#8217;s pain, and, unfortunately, we have to go through this Groundhog Day what feels like every single week. I most definitely agree with the sentiment Dug expressed, but I don&#8217;t agree with the analogy. It took me a while to realize why that is the case, so in this issue, I am talking about reasons why it doesn&#8217;t make any sense to draw parallels between safety and security.</p><h1>The well-loved seatbelts analogy is sadly not relevant</h1><p>People in security absolutely love to bring up the story of how seatbelts redefined road safety (if you&#8217;re not sure what I am talking about, here&#8217;s an example of how<a href="https://www.youtube.com/watch?v=vkLyQcYyyTQ"> CISA compares its Secure by Design Pledge to the initiatives in the automotive and aviation industries</a>).</p><p>The story goes like this. As the car adoption in the US increased in the 1950s-1960s, the number of road fatalities skyrocketed. It soon became clear that the mortality could be greatly reduced by adding safety features to cars, but making it happen wasn&#8217;t easy. First and foremost, car manufacturers, including GM and Ford, heavily lobbied against mandatory seatbelts and safety regulations, arguing they were expensive and unnecessary. Drivers, on their part, also weren&#8217;t excited about seatbelts because they made them feel uncomfortable. In the end, common sense prevailed, and in 1966-1968, a series of laws were passed that started requiring seatbelts to be installed in all new cars. It was, however, only in 1984 that New York enacted the first mandatory seatbelt usage law. By the end of the 1990s, almost all states made wearing seatbelts mandatory, and today we take seatbelts for granted, thinking that&#8217;s how things have always been.</p><p>The idea that we can do something similar with security, and have the government legislate everyone to become &#8220;cybersecure,&#8221; is appealing, as are all sorts of pledges. It would indeed be great if we didn&#8217;t have to reinvent the wheel in security, and instead we could borrow from other fields and learn from past successes. Unfortunately, this is quite unlikely to work, and the main reason is pretty simple: safety and security are two very different problems.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D3lk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D3lk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!D3lk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!D3lk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!D3lk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D3lk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D3lk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!D3lk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!D3lk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!D3lk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb3332c8-e5a0-40db-a6e5-6ddfa8d8b47a_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Safety and security are two very different problems</h1><h2>Safety addresses a stable, unchanging problem, but security doesn&#8217;t</h2><p>First and foremost, safety controls address a stable, unchanging problem. Let&#8217;s take our favorite seatbelts as an example. Seatbelts were designed to address a very specific, very well-defined risk: injury or death during a car crash. There are a finite number of things that need to be considered and tested (things like speed, impact angle, where the passenger is sitting, how tall the car is, etc.). I am not suggesting that accounting for all these factors is easy, but the critical point here is that gravity doesn&#8217;t learn or change its methods. The physics are stable, we know pretty well how things are supposed to work, and if we recreate the same environment (which is easy because of the limited number of factors that need to be considered), we&#8217;ll get the same result.</p><p>Cybersecurity, on the other hand, is nothing like that. Attackers try different methods until something finally works, adapt their tactics, and purposefully look for gaps in security controls. My friend<a href="https://www.linkedin.com/in/llenguito/"> Luigi Lenguito</a>, founder of BforeAI, puts it really well in one of his LinkedIn comments: &#8220;Many keep equating security and safety, but they are two very different problems. Safety is finding the root cause, fixing it, and having a safer environment with a tendency toward zero accidents. Security is putting controls and remediation, but meanwhile, new risks arise, so it does not tend to zero because the adversary is motivated to increase the harm and impact. It&#8217;s a non-controlled environment.&#8221; Basically, wearing a seatbelt won&#8217;t trigger a new kind of crash, but a security control often does trigger a new attack path.</p><p>I published a relevant deep dive a few weeks ago about how we are actually improving our security maturity, but it&#8217;s hard to see that because attackers are also improving their methods:<a href="https://ventureinsecurity.net/p/if-you-ask-these-two-questions-youre"> If you ask these two questions, you&#8217;re asking the wrong thing</a>. This is precisely the problem as attackers continue to adapt to the controls we put in place.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!55NK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!55NK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!55NK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!55NK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!55NK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!55NK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!55NK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!55NK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!55NK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!55NK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cfb6f71-7545-47b1-9df8-f2bcc18bbc05_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image Source:<a href="https://ventureinsecurity.net/p/if-you-ask-these-two-questions-youre"> If you ask these two questions, you&#8217;re asking the wrong thing</a></p><h2>Safety prevents loss of human life and injuries, but most cybersecurity controls don&#8217;t</h2><p>An equally important distinction between safety and cybersecurity is what&#8217;s at stake.</p><p>When it comes to safety, the concerns usually have to do with human life, or at least well-being. The reason why we spend so much time getting to the root causes of a plane crash is because of how catastrophic and devastating it usually is. We care about car safety, food safety, building codes, etc., for the same reason - because there is a long track record of people getting physically harmed or losing what we as a society can (mostly) agree is the most precious gift we all have, our lives.</p><p>Cybersecurity is thankfully not usually a matter of life and death. Despite all the bleak predictions and despite the fact that attackers could very well cause massive loss of human lives, the majority of cyber attacks have been financially motivated. There have, sadly, also been cases when people would get harmed because of ransomware attacks on hospitals, but (again, thankfully) it has not yet become as widespread as some predicted. Not only have most people not heard of the major security breaches, but the vast majority of the population haven&#8217;t felt any pain when their own data gets leaked. Here are some of the ways in which an average individual gets affected by security- and privacy-related concerns:</p><ul><li><p>Someone gains access to their email address and uses it to send spam. While this definitely creates inconvenience, it doesn&#8217;t usually lead to irreparable harm to the victims.</p></li><li><p>Clicking on some link installs adware on the victim&#8217;s computer. In practical terms, this means that once in a while, a person will see some annoying message pop up in the bottom right corner that they will need to close. It&#8217;s inconvenient but not deadly.</p></li><li><p>It is not uncommon for people to have their credit card data compromised, which typically leads to fraudulent charges on their bank accounts. I had that happen several times to me as well; in each of those cases, the bank will typically issue a new card and refund the lost amount.</p></li></ul><p>I am not trying to underestimate the impact of security incidents on people&#8217;s lives. There are indeed cases when families lose all the savings it took them decades to accumulate, and private details of one&#8217;s life get leaked, causing irreparable harm and even a loss of life. However, most people think of these stories as anomalies, not something that can affect them personally. It is hard to blame people for this lack of awareness. Although our data is sold for pennies on the dark web, most people never feel the impact of the Uber or Equifax hacks beyond getting a breach notification email and some free identity monitoring solutions that most don&#8217;t understand the value of.</p><p>Basically, to most individuals cybersecurity breaches are a nuisance, and to most businesses they are, well&#8230; the cost of doing business. This can&#8217;t be compared to plane crashes or car accidents that often (almost always?) lead to real tragedies and lost lives.</p><h2>Safety controls are designed to reduce the need for decision-making, but security controls can&#8217;t</h2><p>A seatbelt is a seatbelt, and all people need to do to protect themselves is to wear it. A seatbelt doesn&#8217;t have any configurations, doesn&#8217;t depend on context, and it works (or fails) the same way every time. The same is largely true for other safety features like airbags, guardrails, or child safety locks. All of them are designed to be passive, predictable, and effective without needing ongoing mental effort from the user. Once safety features are installed, they tend to do their job the same way across millions of identical scenarios. This simplicity and predictability are exactly what made such a huge difference when it comes to physical safety, whether we&#8217;re talking about seatbelts, sprinklers, balcony railings, or whatnot. These things just work, and we don&#8217;t have to think about them much.</p><p>Cybersecurity, on the other hand, is all about context. Every control depends on the nuances of the customer environment, configuration, business processes, data flows, and so on. Not only that, but security controls actively interact with one another, oftentimes in ways people didn&#8217;t predict, and a single tiny gap can lead to cascading failures. Implementing a security tool the wrong way can (and does) itself lead to a breach, making it easier for attackers to get in (imagine if wearing a seatbelt increased the likelihood of a car crash). Because security controls are so contextual, whether they end up being helpful all comes down to humans needing to make decisions, find time, and implement 1,000 knobs well that are all interdependent. To be successful in security requires a lot more than following safety protocols. People have to think about tradeoffs, what makes sense in a specific context; they have to follow up, convince others, and maintain ongoing operational discipline, all of which are much harder to get right than wearing a seatbelt.</p><h2>Safety can be solved through standardization, but cybersecurity can&#8217;t</h2><p>One of the main reasons why safety measures have been so effective is that safety can be solved through standardization. Seatbelts work because the environment is standardized. Each of the 100,000 models of the same car is designed to work the same, roads are designed to work the same, and physics works the same way in Florida as it does in California, or China, for that matter. In a standardized environment, we can be pretty successful in implementing standardized safety measures. Once we know that something works, we can just mandate that this measure be enforced for all similar situations moving forward.</p><p>This is not true for cybersecurity. First of all, company environments are deeply heterogeneous; they are always in a state of change, and everything is heavily customized per organization, per application, per workflow, and so on. This is why standardization simply doesn&#8217;t work for cybersecurity. Worse yet, standardization itself can become the source of vulnerability. Nothing shows it better than the issues we&#8217;ve been seeing with network devices, such as VPNs, when thousands of companies that standardized on the same tool all get breached at the same time when the exploit is discovered in that tool. Getting breached because your firewall has a critical issue is like having 1,000 cars crash on the same day because of the seatbelt design. You can see how the seatbelt analogy just doesn&#8217;t work again.</p><h1>Closing thoughts</h1><p>I can keep going with the list of reasons why safety and security aren&#8217;t comparable. Others seem to be chiming in as well. In the same LinkedIn thread I referenced above,<a href="https://www.linkedin.com/in/ivano-bongiovanni-cybersecurity-management/"> Ivano Bongiovanni</a> made another great comment: &#8220;My favorite distinction between safety and security is the one that calls out human intent behind adverse events. Safety: no malicious intent; security: malicious intent. So you can have a safe system that is not secure and vice versa.&#8221; Another great point. There are plenty of examples that all lead to the same conclusion: it doesn&#8217;t make sense to draw parallels between safety and security, and it&#8217;s time to put the seatbelts analogy to rest.</p><p>This is both bad news and good news. It&#8217;s bad because we might not be able to easily repurpose the model that worked so well for safety to solve cybersecurity problems. But, it is also good because we can avoid the trap of trying to borrow paradigms from slow-moving industrial car manufacturing and airplane production to the iterative and fast-paced world of technology. I think it&#8217;s just about time to accept that the best we can do is to continue maturing our defenses so that we can consistently make it harder and harder for the adversaries to achieve their goals. There is no other magic answer.</p><p>Oh, and please do <a href="https://insidethenetwork.co/episodes/dug-song-values-over-valuation-reflections-on-building-duo-security-and-leading-with-purpose">check out the episode of Inside the Network with Dug Song</a> - it&#8217;s a great one! </p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5>]]></content:encoded></item><item><title><![CDATA[The lazy myth that CISOs “don’t understand the business” has to go]]></title><description><![CDATA[Talking about the lazy myth of the &#8220;too technical, too much into the weeds&#8221; CISO]]></description><link>https://ventureinsecurity.net/p/the-lazy-myth-that-cisos-dont-understand</link><guid isPermaLink="false">https://ventureinsecurity.net/p/the-lazy-myth-that-cisos-dont-understand</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 03 Feb 2026 15:32:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_Rsg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There are many things we repeat in security that are just not true. &#8220;Security is a department of &#8220;No&#8221; (if anything, security gets told &#8216;No&#8217;). &#8220;There is a talent shortage in cyber&#8221; (yes, there is a huge gap of senior specialized talent, but an oversaturation of entry-level talent). &#8220;Security is the most crowded market&#8221; (not even close; there are 5-10 times more marketing tech tools, fintechs, and many others). &#8220;Attackers only need to get it right once, defenders have to get it right every single time&#8221; (the opposite is true - attackers need to stay undetected, and a single mistake can fail them). &#8220;Sixty percent of small businesses close within 6 months of being hacked&#8221; (my friend Adrian Sanabria did a USENIX talk about this one and a few other myths).</p><p>We know that there is a lot of nonsense being repeated, and in the past decade, we have started to challenge it. There is now even a dedicated book titled &#8220;Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us&#8221; by Eugene Spafford, Leigh Metcalf, and Josiah Dykstra&#8230;The point is, we are moving in the right direction.</p><p>There are, however, several myths that are just too persistent, and many years later, they are still widely accepted as truth. In a previous article, I tackled two: that &#8220;we aren&#8217;t getting any more secure than before&#8221; (not true) and that &#8220;there are simply too many security tools and we need fewer of them&#8221; (also not true). This week, I am taking a stab at another egregious lie - that &#8220;most CISOs are really bad at understanding the business, can&#8217;t translate risk into business language&#8221;, etc.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.tines.com/access/whitepaper/voice-of-security-2026/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-secondary-0302">Tines</a>. </em></p><h4><a href="https://www.tines.com/access/whitepaper/voice-of-security-2026/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-secondary-0302">Everyone&#8217;s using AI - So why are workloads still growing?</a></h4><p>99% of SOCs are already using AI, yet <strong>81%</strong> <strong>say</strong> <strong>workloads</strong> <strong>increased</strong> in the past year.<br><br>To find out why teams have yet to unlock AI&#8217;s full impact, Tines surveyed <strong>1,800+ security leaders and practitioners</strong> worldwide for their biggest <a href="https://www.tines.com/access/whitepaper/voice-of-security-2026/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-secondary-0302">Voice of Security report</a> yet.</p><p>A few standout stats:</p><ul><li><p><strong>AI literacy </strong>and <strong>prompt engineering</strong> are the top skills security professionals need</p></li><li><p><strong>44%</strong> of security <strong>work is still manual</strong></p></li><li><p>87% report <strong>board-level attention to cybersecurity has increased</strong> in the last year</p></li></ul><p>Get access to the full report <a href="https://www.tines.com/access/whitepaper/voice-of-security-2026/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-secondary-0302">here</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tines.com/access/whitepaper/voice-of-security-2026/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-secondary-0302&quot;,&quot;text&quot;:&quot;Get access to the full report here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tines.com/access/whitepaper/voice-of-security-2026/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-secondary-0302"><span>Get access to the full report here</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>Two decades ago, there were few CISOs with a strong track record as business leaders</h1><p>&#8220;CISOs aren&#8217;t business leaders&#8221;, &#8220;CISOs can&#8217;t translate risk into business language&#8221;, &#8220;CISOs talk gibberish, and the board doesn&#8217;t understand what they are trying to say.&#8221;... All these statements are a part of the same narrative that CISOs are too much into the weeds, which prevents them from being great leaders.</p><p>Thirty years ago, in 1995, Steve Katz (1942 - 2023) was named to the newly created CISO role by Citicorp. This was the first time a company hired a dedicated CISO. Over time, many other businesses delegated the responsibility for security to dedicated leaders, elevating them to the role of a C-level executive (at least on paper). Despite what many would assume, this transition journey hasn&#8217;t been an easy one. When Steve Katz was invited to step into the CISO role, it wasn&#8217;t because Citicorp realized that technology needs to be secured. Instead, around 1994, there were rumors that Citicorp had been hacked, and no one knew whether it was true or not. It turned out that Citicorp&#8217;s systems were indeed compromised, and Russian hackers stole more than $10 million from the bank. All this makes it obvious that from the very first day, the CISO role has been designed to take responsibility for some of the hardest problems.</p><p>When more companies started hiring CISOs, there obviously wasn&#8217;t much of a talent pool of astute business execs with expertise in cybersecurity. On one hand, since the role was new, there were no people who had done it before. On the other hand, since companies had no experience hiring or working with CISOs, they couldn&#8217;t clearly frame what was expected of them, and how they could succeed after joining. It ended up being a lot of on-the-job learning experiences on everybody&#8217;s part: CISOs had to figure out P&amp;L ownership, strategy, and working with boards, while companies hiring CISOs needed to learn where to draw the line between other roles and that of a CISO.</p><p>It didn&#8217;t help that different companies had vastly different motivations for hiring a CISO. Some wanted a partner who could advise them on risk and help the business become more resilient, and others just needed someone who could take the blame when things inevitably went wrong. The unfortunate part has been that many of the CISOs hired to act as scapegoats if something fails were given no resources and no executive support to actually make a difference. To put it differently, they were set up to fail. I don&#8217;t know how many of the roles at the time fit this description, but I do know well that many security leaders got pretty disillusioned by their early CISO gigs.</p><p>People who took CISO roles early on were often getting great promotions, at least in terms of a title (not so much in terms of compensation or responsibility, but that&#8217;s a whole separate story). Since most of the newly minted CISOs were experienced managers or directors, getting that &#8220;C&#8221; in their title was surely a great thing. Were they ready to do these jobs effectively? It&#8217;s a rhetorical question, but also, is anyone ever ready? Is a senior engineering manager ever ready to become a CTO? Is a senior finance leader ever fully ready to become a CFO?</p><p>The answer in most cases is not, but CISOs indeed had some real work to do. Most had no MBA and no background in business, so there were a lot of gaps to close. If you were to come twenty-five years ago and say, &#8220;CISOs aren&#8217;t business leaders&#8221;, &#8220;CISOs can&#8217;t translate risk into business language&#8221;, &#8220;CISOs talk gibberish, and the board doesn&#8217;t understand what they are trying to say,&#8221; I think most CISOs themselves would agree with you.</p><p>Fast forward to 2026, and the world looks very different.</p><h1>Present-day CISOs are expected to be well-rounded business and technical leaders</h1><p>It may come as a surprise to some, but a lot has changed since 1994, both in the world at large, and in security in particular. I&#8217;ll skip over the internet adoption, social media, smartphones, IoT, cloud, and AI because talking about that would make me sound condescending. However, I do have to point out a few security-related changes:</p><ul><li><p>Most people who took CISO roles before the year 2000 have either retired or found new careers as risk and strategy consultants, board members, etc.</p></li><li><p>Many people who are looking for entry-level security roles today were born after Steve Katz became a CISO</p></li><li><p>The infrastructure today looks completely different from what it did back then, the way businesses operate today is completely different from how they did back then, the way people work today is completely different from the way they did back then, and this list can go on forever.</p></li></ul><p>The point is, the world has changed, and the CISO role has undergone a complete transformation.</p><p>CISOs today aren&#8217;t trying to figure out how to do their jobs - they have all the ingredients to be good at it. CISOs have formal education programs like the one at<a href="https://www.heinz.cmu.edu/programs/executive-education/chief-information-security-officer-certificate"> Carnegie Mellon</a>, they have associations like the<a href="https://theciso.org/"> Professional Association of CISOs</a>, they have resource hubs like<a href="https://www.cisotradecraft.com/"> The CISO Tradecraft</a>, podcasts like<a href="https://cisoseries.com/"> CISO Series</a>, and a virtually limitless number of other things. I&#8217;ve seen plenty of security leaders with an MBA, and many more with masters degrees in security leadership. There are also plenty of incredible books, covering anything from risk frameworks, leadership advice, and management skills (Assaf Keren, for example, recently published<a href="https://www.amazon.com/Lessons-Frontlines-Insights-Cybersecurity-Career/dp/1394395388/"> Lessons from the Frontlines</a>, and Ross Yong&#8217;s book<a href="https://www.amazon.com/Cybersecuritys-Dirty-Secret-Budgets-Tradecraft%C2%AE/dp/B0G26WHVTG/"> Why Most Budgets Go to Waste</a> was released last year). If two decades ago, there was barely any information about what a CISO role entails, today, security leaders have more advice and resources than they probably need.</p><p>CISOs, on their part, are hungry to grow. I see more and more CISOs pursuing certifications like <a href="https://www.nacdonline.org/nacd-credentials/nacd-directorship-certification-credential/">NACD.DC</a> and <a href="https://www.digitaldirectors.network/cpages/qte">DDN QTE</a> to prepare for board roles, taking advisory roles with startups and getting involved with nonprofits. Take a look at the number of great CISO events, panels, podcasts, and you&#8217;ll see people who are eager to do more.</p><p>Then, there is executive and board support, a critical ingredient for any CISO to do their job. Obviously, it would be an overstatement to say that every security leader has what they need to be successful; in practice, things are pretty far from that. There are still plenty of organizations out there that view the CISO role as a liability shield, and there are still many companies that don&#8217;t want to truly invest in security, or don&#8217;t have any desire to do the hard work that maturing defenses actually is. All that said, a growing number of companies recognize the importance of security and dedicate the resources to do it well. In addition, in many organizations, CISOs have earned the ability to work directly with the board, which further elevates their impact.</p><p>When I am talking about all these changes, I don&#8217;t mean that business majors are doing MBA to become CISOs; I am talking about seasoned technologists looking to grow as leaders. Present-day CISOs are expected to be well-rounded business and technical leaders; just being good at either business or technology is no longer enough.</p><h1>Most of the present-day CISOs are already well-rounded business and technical leaders</h1><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><p>The reason why I get so frustrated when I hear that CISOs are &#8220;too technical, too much into the weeds&#8221; or &#8220;unable to talk to the board&#8221; is the fact that these statements are rooted in the past that is long gone. The overwhelming majority of the present-day CISOs are pretty well-rounded business and technical leaders.</p><p>Think about security budgets for a second. We live in a world where every dollar invested in security competes with growth initiatives like sales, marketing, and engineering, all the while security continues to be viewed as a cost center with an asymmetric downside. Yet despite all this, many CISOs still get budgets approved for new tools, hiring more people (though this one is trickier), and making sure that critical areas like endpoint, cloud, identity, and network have solid coverage. Do you really think that when the CFO &amp; CEO are deciding where to allocate budget, and the CISO ends up getting the money, it happens because the CISO just bamboozles them with technical jargon and some CVE-2024-XXXX speak? If you actually think that, I think you need to think twice. Every dollar invested in cyber is a dollar not invested in growth, expansion, and other strategic, revenue-generating activities. I would argue that any CISO who can get their executive team bought-in to fund new security initiatives, when everything is about cost-cutting and top-line growth, is a master communicator, negotiator, and evangelist.</p><p>Then there is the whole topic of working with the board. Everyone walking into the boardroom for the first time, be they CEO, CTO, CRO, or CISO, will have a lot to learn about what boards care about and what they don&#8217;t care about. Are there no CTOs who walk into the room expecting that they&#8217;ll be asked about their roadmap, only to instead end up having to talk about how the upcoming product is going to impact the company&#8217;s margins? Of course there are. Are CISOs making the mistake of assuming that the board wants to hear more about the work of security teams than it does? I am sure some are. And yet, contrary to popular beliefs, CISOs do not walk into boardrooms to discuss CVE-2024-XXXX (not the CISOs I&#8217;ve met anyway, and I have met plenty of them). Instead, they talk about business impact, regulatory exposure, operational resilience, brand and customer trust, and other areas relevant to the board. The idea that CISOs are &#8220;too technical&#8221; for the board ignores the reality that getting to the CISO role in 2026 requires mastering far more than technical triage.</p><h1>It&#8217;s hard to expect that individual CISOs are going to fix systemic problems of security</h1><p>It would be an overstatement that all the problems have been solved because they haven&#8217;t. Security continues to be hard, and while we had three decades to evolve both the role of the CISO and the mechanics of the industry at large, some problems remain. These are typically systemic issues, and not something we can expect CISOs to solve.</p><p>First, there is the fact that many companies truly just want to have a CISO to absolve them of the problems with regulators if something bad happens. I am not suggesting that this happens often, but I have personally met CISOs stuck in roles without any resources or executive support. While I am sure that there&#8217;s some 1% of the people who get stuck in these situations because &#8220;they are too deep into the weeds&#8221; and &#8220;they can&#8217;t explain the value of security&#8221;, the vast majority just get unlucky. Sometimes, convincing language and a strategic mindset are simply not enough (if you&#8217;ve been in this situation, you know what I am talking about).</p><p>Second, the value of security is objectively hard to communicate because it&#8217;s hard to measure. How do we measure risk reduction? How do we explain the ROI and quantify the savings of the attacks that didn&#8217;t happen because we had security controls in place? These are rhetorical questions, but when a CISO is working to get the budget for critical initiatives, they are forced to think about this. To be completely fair, it&#8217;s not just CISOs that struggle to connect their spend to outcomes. Take heads of people and culture (HR), or marketers who have a hard time attributing any sales activity to the specific initiatives they are driving. How do you quantify &#8220;good company culture&#8221; or &#8220;value of the brand&#8221;?</p><p>Third, too many organizations hold security leaders to unrealistic standards. Boards want certainty, and executives still measure security success by &#8220;no breaches&#8221; instead of resilience. Despite the fact that security teams can usually only advise on risk and rarely own the implementation of most controls, CISOs are expected to own the outcomes when those risks materialize. It&#8217;s also why posture management tools took off: while CISOs like to say that they are tired of getting more visibility tools, the reality is that oftentimes, all security teams are empowered to do is to get visibility into all the badness (nobody gives security the ability to fix anything directly).</p><h1>Closing thoughts</h1><p>While the CISO role has existed for 30 years, and while a lot has changed, some problems remain. We most definitely need to debate these problems and continue maturing our practices. At the same time, it&#8217;s really time to retire the lazy idea that CISOs are &#8220;bad communicators who don&#8217;t understand the business&#8221;. We are talking about people who have spent their careers getting to where they are, and they must have mastered some skills beyond triaging vulns and alerts.</p><p>The reality is more complicated and much less convenient: security is difficult to measure, difficult to justify, and impossible to &#8220;win&#8221; in absolute terms. CISOs who survive, and especially those who succeed, do so precisely because they&#8217;ve learned how to navigate that complexity. That is what being a business leader in security is all about.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_Rsg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_Rsg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!_Rsg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!_Rsg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!_Rsg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_Rsg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_Rsg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!_Rsg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!_Rsg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!_Rsg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F864cb89e-4e2a-44be-9ea6-bcdc897dbe0e_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[If you ask these two questions, you’re asking the wrong thing]]></title><description><![CDATA[How two of the most frequently asked questions in security are completely missing the point]]></description><link>https://ventureinsecurity.net/p/if-you-ask-these-two-questions-youre</link><guid isPermaLink="false">https://ventureinsecurity.net/p/if-you-ask-these-two-questions-youre</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 27 Jan 2026 15:54:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!M1yC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For the past five years, I&#8217;ve been writing openly about all kinds of things in our industry - what I am seeing, what works, what doesn&#8217;t, what&#8217;s not being talked about, what we are missing, and so on. I&#8217;ve intentionally tried to stay away from a lot of nonsense that dominates security conversations, but that doesn&#8217;t mean that everything I say will resonate with everyone all the time. That&#8217;s perfectly fine and expected. Over the years, I&#8217;ve shared plenty of perspectives that ruffled feathers, like the idea that<a href="https://ventureinsecurity.net/p/why-we-need-more-startups-and-venture"> we need more venture capital and startups in security</a>, that<a href="https://ventureinsecurity.net/p/lets-get-real-there-is-no-such-thing"> there is no such thing as &#8220;gatekeeping&#8221; in cybersecurity</a>, that<a href="https://ventureinsecurity.net/p/most-of-the-security-teams-work-has"> most of the security teams&#8217; work has nothing to do with chasing advanced adversaries</a>, or that<a href="https://ventureinsecurity.net/p/the-only-six-cybersecurity-markets"> VCs only really care about 6 cybersecurity markets</a> among many, many others.</p><p>I am always super excited to hear from my readers, be it through messages or comments on social media, direct replies, or anywhere else. It doesn&#8217;t mean that I am great at responding (founder life), but I love a good debate about security. Disagreements are healthy because they mean people are thinking.</p><p>At the same time, there are two questions I get asked over and over again that, frankly, after all these years, still frustrate me every single time. Whenever I see them, I can&#8217;t help but wonder: How are we still asking these questions? What do we think they add to the conversation?</p><p>In this week&#8217;s issue, I want to talk about these two questions and why I think people asking them are completely missing the bigger picture.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>&#8220;... do we really need this many point solutions?&#8221;</h1><p>Every time I talk about the market, celebrate the growth of security startups, or simply mention the fact that Google&#8217;s biggest ever acquisition is a security company, someone will always jump in with some variation of the same comment: &#8220;Should we really be celebrating that? Why do we need so many point solutions? We need fewer products so that security teams can more easily make sense of the market&#8221;.</p><p>To be clear, I totally get where that frustration comes from. The market is 100% crowded, security teams are overwhelmed, stretched thin, and constantly bombarded by endless sales outreach. That fatigue is real, but the question if we need more point solutions completely misses the point.</p><p>Saying that &#8220;we don&#8217;t need this many point solutions&#8221; ignores a basic understanding of what a market economy is and how it works. People want to have choices, and the market delivers. Nowhere is it easier to see than here in the U.S. Walk into a Walmart and ask whether we need this many brands of toilet paper, ketchup, sausages, or candy. The answer is obviously no (not just because many of these options are legitimately harmful, but also because nobody can tell the difference between 30+ brands of toilet paper by looking at the package). And yet, that answer is completely irrelevant: people want the ability to choose, everyone has slightly different preferences, and we end up where we are.</p><p>Here&#8217;s an analogy for you. Imagine someone walking into a massive grocery store (Walmart, Target, Costco, or pick your favorite one). The whole experience is not for the faint of heart: there are endless aisles, several hundred different sauces, seventy kinds of pasta, and all kinds of ads playing on large screens. Some of the brands look familiar, often from TV and online ads, but the majority are completely new. The person starts grabbing things that look great - some fancy chicken wing sauce, five pounds of frozen shrimp because it&#8217;s on sale, a few protein bars they saw on YouTube, a bag of kiwi because the packaging looks nice, and so on. Some hours later, the person gets home and puts all the stuff on the counter only to realize that they have spent a few hundred bucks, bought a ton of crap, but don&#8217;t have anything that adds up to a meal.</p><p>Now let&#8217;s ask the obvious question: Is the grocery store broken? Should the store carry fewer products? Should it remove half the shelves to make the whole shopping experience feel much simpler? Maybe just have one brand for every product? Wouldn&#8217;t just a section with salt and pepper be enough, instead of a whole aisle with spices most people have no idea how to even spell? I don&#8217;t know about you, but I don&#8217;t think so. The store did exactly what it&#8217;s supposed to do: offer choice. The real problem here is that the person went to the store without a shopping list and without a clear plan of what it is they would like to cook for dinner, so instead of buying the ingredients they needed, they bought a ton of crap that doesn&#8217;t add up to a meal.</p><p>I often feel like this is kind of what we have in security. Way too many people simply can&#8217;t find the time to sit down and think strategically about what they need (some also continue to believe that security is a shopping problem), so they end up just reactively buying tools. Obviously, vendors absolutely love that, so they amplify these messages - &#8220;just buy X, and we&#8217;ll solve all your problems&#8221;. The amount of noise is absolutely insane, so it&#8217;s not surprising that security teams are overwhelmed. At the same time, the reality is that starting with the market and all the available options is always going to be overwhelming, whether you are shopping for a pack of toilet paper or an EDR. Nobody should be expected to know every tool and what it does, similar to how neither of us truly knows the difference between every kitchenware brand.</p><p>Starting with clarity about the problems the company is trying to solve and the criteria it truly cares about makes the whole experience of choosing the right partner much easier. When the security team gets enough resources and space to think strategically about what it is trying to do, many problems go away. This makes me think that the real issue in the industry is not that there are &#8220;too many point solutions&#8221;, it&#8217;s that most security teams are so overwhelmed that they can&#8217;t even find time to think about strategy, or what tools would best support that strategy.</p><p>Until we solve this problem, there is one shortcut that I think can help. I think that the easiest way for security teams to figure out if they should talk to a vendor is to ask themselves - Can this vendor help us with essentials? Can it help us improve the basics? The hard truth is that most companies get breached not because of some zero-day, nation-states, blockchain, or AI-powered attacks; they get breached because of the basics. It&#8217;s always some unpatched server that wasn&#8217;t on the inventory list, some orphaned account access that didn&#8217;t get revoked, some hardcoded credential, some network access exception that didn&#8217;t get removed, and other pretty mundane problems. Focusing on what matters alone will filter out 80%+ of the vendors, and do wonders for the organization&#8217;s security.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><h1>&#8220;...but are we getting more secure?&#8221;</h1><p>I love this one. It usually goes like this: I will say something to the effect that &#8220;Over the past decade, we have started to see enterprises invest more into their security&#8221; or &#8220;I see more and more companies using AI to solve security problems that previously were impossible to solve&#8221;, and someone will inevitably show up to ask &#8220;...but are we getting more secure?&#8221;.</p><p>First and foremost, let me answer this once and for all: YES, WE ARE. I think this is the first time I have used all caps in my blog, so that should tell you what I think about this question.</p><p>Every year, companies continue to improve their security defenses. Say what you want, but this is happening. There are more companies with an EDR today than there were a year ago. There are more companies using MFA than there were a year ago. There are more companies patching vulnerabilities than there were a year ago. Overall, more organizations have better tooling, better frameworks, more experienced engineers, and far more institutional knowledge than they did 10, 20, or 30 years ago. This list can go on and on.</p><p>The question you might be asking is, &#8220;So why do we see more and more breaches?&#8221; Well, the answer is pretty simple: it&#8217;s because the attack surface we have to defend expands faster than anything anyone on the planet can contain.</p><p>Over the past several decades, we have seen the attack surface multiply every single year:</p><ul><li><p>Every year, we are shipping more and more code (this was true before AI, and it is even more true today)</p></li><li><p>Every year, IT environments are becoming more and more sprawled, fragmented, and complex (this is true regardless of what you look at - identity, cloud networks, etc.)</p></li><li><p>Every year, there are more and more connected devices of all kinds.</p></li></ul><p>The bottom line is that what used to be a handful of on-prem systems is now a constantly shifting mix of cloud infrastructure, SaaS, APIs, identities, remote users, vendors, containers, and ephemeral workloads. Every new layer adds flexibility and speed, but also complexity and exposure.</p><p>Let me draw what ends up happening because having a visual in front of us will make explaining this much easier. Here is a picture that captures what&#8217;s happening in security, where maturity is going up, and the attack surface is expanding.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AELX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AELX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!AELX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!AELX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!AELX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AELX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AELX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!AELX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!AELX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!AELX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ab8d09-a1e0-4a1a-86a9-fe489f0678eb_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Those of you who are very observant will look at this image and say, &#8220;How can we be getting more secure if the gap continues to increase?&#8221; You are right - the gap between our security capabilities and the attack surface is now the largest it has ever been. This gap is the main reason security teams experience so much pain and suffering, why they feel overwhelmed, and why buying &#8220;just one more product&#8221; rarely fixes the underlying problems. It is also because of this gap that we keep seeing more and more breaches.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YYW6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YYW6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!YYW6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!YYW6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!YYW6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YYW6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YYW6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!YYW6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!YYW6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!YYW6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff49d4ce2-984e-42a0-8b16-70a7741ec66c_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>All that said, the world still hasn&#8217;t collapsed under the weight of all the breaches despite what some predicted. A lot of the credit for that goes to people working tirelessly to keep us safe, but we cannot ignore the simple fact that defenses have improved dramatically. Security maturity continues to increase, security controls continue to get better, defaults are getting safer, detection is becoming faster, and misses, while still painful, are far more contained than they used to be.</p><p>Let&#8217;s continue our thought experiment and think about what things could look like if the defenses weren&#8217;t in fact improving. The attack surface would continue to expand regardless, and so the gap between the state of security &amp; attacks would be enormous.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QzPe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QzPe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!QzPe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!QzPe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!QzPe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QzPe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QzPe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!QzPe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!QzPe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!QzPe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed439cd8-1b7f-492e-9f80-1f95adc9ba6d_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>All this is to say that if we weren&#8217;t in fact getting more secure, things would have been as bad as some people imagine. This, however, isn&#8217;t at all what&#8217;s happening.</p><p>Every year, we continue to mature our defenses, and we cannot forget that security vendors play a critical role in educating the market about different ways of solving problems and providing customers with solutions. If some early adopters didn&#8217;t bet on a startup called CrowdStrike in 2011, we would still be using McAfee to secure the endpoints. If nobody worked with a startup called SafeChannel when it started in 2007, there would be no Zscaler (in 2008, SafeChannel changed its name to Zscaler). This list can go on and on. It would be misguided to say that CrowdStrike, Zscaler, Duo, and many other startups didn&#8217;t make us more secure because they did.</p><p>Here is what it comes down to: attackers are innovating all the time, but 99.999999% of security and IT teams are barely equipped and staffed to keep the lights on, let alone to build their own tools. This is why<a href="https://ventureinsecurity.net/p/why-we-need-more-startups-and-venture"> we do need more startups and more venture capital to go into security</a>.</p><p>You are probably still skeptical, thinking, &#8220;Sure, we need startups, but we don&#8217;t need that many of them!&#8221; It would indeed be amazing if we could just get a single company solving a single problem, and they would do it well, but sadly, that is not how innovation works. There is often a cohort of first entrants who work to educate the market about a new threat or a new way of doing things, and then someone else shows up and wins the market that has already been created. Case in point is CSPMs: there was already a decade-long history of attempts at solving the cloud security problem, and a lot of learning about what worked and what didn&#8217;t before Wiz was even founded. I will go on the record and say that without the first 10-15 point solutions trying to secure the cloud, Wiz would have never happened.</p><p>All this is to say that the answer to both of these questions is a resounding Yes. Yes, we do really need this many companies, and yes, we are getting more secure. That is where I stand and that is what I continue to both see and believe.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!M1yC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!M1yC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!M1yC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!M1yC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!M1yC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!M1yC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:83477,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ventureinsecurity.net/i/185973469?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!M1yC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!M1yC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!M1yC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!M1yC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67855fd5-d4b8-43f3-ae18-aa8b85660e3d_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/if-you-ask-these-two-questions-youre?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/if-you-ask-these-two-questions-youre?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Venture in Security&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Venture in Security</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[ServiceNow is betting on “workflow gravity” to win against the platforms of Palo Alto, CrowdStrike, Cisco, Zscaler, and Microsoft]]></title><description><![CDATA[How ServiceNow is planning to compete with Palo Alto, CrowdStrike, Cisco, Zscaler, and Microsoft and what advantages it has over the competition.]]></description><link>https://ventureinsecurity.net/p/servicenow-is-betting-on-workflow</link><guid isPermaLink="false">https://ventureinsecurity.net/p/servicenow-is-betting-on-workflow</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 13 Jan 2026 16:16:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iGga!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the past few months, ServiceNow announced two major acquisitions, Veza (acquired for over $1B) and Armis (acquired for $7.75B). The latter also happens to be the largest acquisition in ServiceNow&#8217;s history which is quite impressive for a $150-billion company not widely known as a security player.</p><p>Some people read these events as ServiceNow trying to become a security vendor, but this is not at all the case. Instead, it looks like the company is betting on &#8220;workflow gravity&#8221; to become a leader in security. In this piece, I am explaining what ServiceNow bet is and why it stands a real chance of becoming a sizable player in cyber.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://drata.com/c/demo/?utm_source=VentureInSecurity&amp;utm_medium=display&amp;utm_campaign=20260109_legacy_to_modern_DG_all_ALL&amp;utm_content=venture_blog">Drata</a>. </em></p><p><strong><a href="https://drata.com/c/demo/?utm_source=VentureInSecurity&amp;utm_medium=display&amp;utm_campaign=20260109_legacy_to_modern_DG_all_ALL&amp;utm_content=venture_blog">Real-Time Visibility for Modern Security Teams</a></strong></p><p>In a world where cyber threats evolve faster than manual audits, visibility and automation are key to reducing risk. Drata empowers security and compliance teams to continuously monitor and prove compliance across frameworks like SOC 2 and ISO 27001&#8212;without slowing business operations.</p><p>Our platform integrates with your existing tech stack to surface real-time risk insights, streamline evidence collection, and eliminate the manual overhead of compliance readiness.</p><p>Whether you&#8217;re protecting your organization&#8217;s reputation or building trust with customers and stakeholders, Drata helps you stay audit-ready and resilient&#8212;continuously.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://drata.com/c/demo/?utm_source=VentureInSecurity&amp;utm_medium=display&amp;utm_campaign=20260109_legacy_to_modern_DG_all_ALL&amp;utm_content=venture_blog&quot;,&quot;text&quot;:&quot;See Drata in action&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://drata.com/c/demo/?utm_source=VentureInSecurity&amp;utm_medium=display&amp;utm_campaign=20260109_legacy_to_modern_DG_all_ALL&amp;utm_content=venture_blog"><span>See Drata in action</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>The concept of workflow gravity effect</h1><p>To make sense of the strategy ServiceNow is going after, it&#8217;s important to understand the concept of workflow gravity and why it matters.</p><p>If you have read my<a href="https://ventureinsecurity.net/p/owning-the-control-point-in-cybersecurity"> previous deep dive about control points</a>, this is going to sound very familiar, but if you haven&#8217;t, here&#8217;s a quick context. Every function of security has a centralized system where most of the work happens (I call these control points). For example, the entirety of security operations currently lives in a security information and event management (SIEM), while identity governance platforms like SailPoint remain the main operating system for enterprise identity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_Z28!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_Z28!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!_Z28!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!_Z28!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!_Z28!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_Z28!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_Z28!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!_Z28!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!_Z28!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!_Z28!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7223fca-2ebe-4105-8ae1-8992cf25e766_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image Source: <a href="https://ventureinsecurity.net/p/owning-the-control-point-in-cybersecurity">Owning the control point in cybersecurity</a></p><p>If we take a few steps back and look at the entirety of the enterprise, it&#8217;s easy to see that where work happens is largely defined by two factors: data gravity and workflow gravity.</p><p>I have previously talked about data gravity, and although years have passed, the idea remains as relevant today as it was then. In simple words, data gravity is what we see when something becomes a system of record for a function, and as more and more data is centralized in a single interface, it attracts even more data, creating a flywheel. Think about any SIEM: the more data a company sends into a SIEM, the more insight it can extract, and the more it makes sense to send other data to the same system. Over time, it becomes possible to add other offerings on top of that data, especially in security, where so much of what we do is just different ways of analyzing and correlating the same data.</p><p>Workflow gravity, on the other hand, is when a system becomes the system of action where work happens, and then uses this position to pull other work into the platform. While Splunk has successfully centralized enterprise data, ServiceNow has effectively won the title of becoming an operating system for enterprise IT. In effect, ServiceNow has become an enterprise &#8220;system of action&#8221; with unified data and AI experiences built into workflows. This is an incredibly powerful position because once a company owns where work flows, it gets the ability to influence and eventually own how decisions are made.</p><h1>The workflow gravity effect creates a flywheel</h1><p>One of the things that makes the workflow gravity effect so powerful is the fact that it creates a flywheel.</p><p>First, all work is centralized in one place, and all the incidents, changes, approvals, exceptions, tasks, evidence, etc., all of that becomes a record in a single workflow system. The more this system is used, the more context it accumulates. This context comes in all forms - change history, comments, links to additional information, and so on. ServiceNow contains a treasure trove of historical data about everything from who requested what to why a certain person requested access to a new application three years ago. Every action leaves some paper trail, and in the vast majority of large enterprises, all this lives in ServiceNow.</p><p>Once a single system accumulates so much business and technical context as well as history of what changed, when, how, and why, it becomes possible to automate triage, routing, prioritization, approvals, and remediation in a way that point tools struggle to do. The more automated it becomes, the more likely it is that anything still operating outside of these centralized systems will be integrated into the same workflow, as that&#8217;s where most of the work already occurs.</p><h1>Cybersecurity is a perfect target for workflow gravity</h1><p>Cybersecurity has three characteristics that make it especially workflow-native.</p><p>First, security is cross-functional by default. Nearly every security function is a part of some business process: cloud security is a function that impacts cloud engineering, application security impacts software engineering, identity security impacts identity and IT, and so on. Consider identity and access management, for example. When a user submits a ticket to request access to some application, someone has to review the request, make sure the policy &amp; risk criteria are met, and then decide if it should be approved. At the end of this process, the user will be granted access, and the whole process will be documented as evidence for an audit.</p><p>Second, security is continuous (or rather, it should be continuous, though some companies are still stuck in the mindset of relying exclusively on periodic checks). Using identity as an example, it&#8217;s not enough to run quarterly checks to make sure that the right people have the right level of access (though they are still needed); the company needs to make sure that every request is evaluated and the risk implications of every single change are understood.</p><p>Lastly, security is a proof-driven discipline. Every single change needs to be documented along with its risk implications, so that the rationale for decisions is captured and stored for audit. The fact that ServiceNow is where workflows live makes it the place where audit evidence lives (this also means that ServiceNow is a treasure trove of data for companies using agents to automate manual GRC work, but that&#8217;s a separate conversation).</p><h1>ServiceNow&#8217;s unique strategy of absorbing security categories into a unified &#8220;see, decide, act&#8221; platform</h1><p>There is no shortage of companies fighting to win in the lucrative cybersecurity market. Each of the contenders is trying to capitalize on its core advantages:</p><ul><li><p>Palo Alto started as a firewall company and has now expanded into nearly all areas of security, which, as of recently, following their acquisition of CyberArk, includes identity. At the core, Palo Alto used the generous revenue it generates from its network security business to build an incredibly broad and deep cyber portfolio and push the idea of pjatformization to which the market responded very well.</p></li><li><p>Cisco, a<a href="https://ventureinsecurity.net/p/20-years-of-cybersecurity-consolidation"> company that acquired the largest number of cybersecurity companies</a>, has initially capitalized on its deep roots in the networking space and used cash from networking to fund its expansion in cyber. Today, with the acquisition of Splunk, it also has the data gravity working in its favor. Notably, Cisco&#8217;s strategy has always been very different than that of Palo Alto: instead of integrating the acquired companies into a single platform, Cisco likes to give them the freedom to operate independently, but with additional resources of a global powerhouse.</p></li><li><p>Microsoft has been highly successful relying on its strategy of bundling to get enterprises to consolidate a wide range of security capabilities with the same vendor that already handles a lot of their IT.</p></li><li><p>CrowdStrike has used its leadership in one of the largest cyber markets - endpoint - to also expand into adjacent security categories, and its growth over the past decade clearly shows that that strategy has been highly successful.</p></li><li><p>Zscaler, on its part, has relied on its ability to inspect traffic to add a wide range of security offerings and also become one of the top global cybersecurity leaders. Recently, the company has finally entered the security operations space with the<a href="https://www.zscaler.com/press/zscaler-completes-acquisition-red-canary-accelerate-innovations-agentic-ai-driven-security"> acquisition of Red Canary</a>.</p></li></ul><p>Each of the contenders for the title of the winner of the cybersecurity market is leveraging different strengths and taking a different path to the same goal.</p><p>ServiceNow stands out as a player with a distinctively unique set of advantages. ServiceNow&#8217;s core differentiator is its ability to turn messy cross-team work into structured workflows that can be measured, governed, automated, and secured at scale. Let me be clear though: the fact that ServiceNow has security ambitions isn&#8217;t new, as the company has had security operations offerings for years (incident response, vulnerability management, etc.), and it has a strong track record connecting security tools and streamlining response. To date, ServiceNow acquired six companies focused on security, compliance, and risk management: Intr&#233;is (<a href="https://itbrief.co.nz/story/servicenow-acquires-intreis-launches-new-grc-offering">2015</a>), Brightpoint Security (<a href="https://fortune.com/2016/06/01/servicenow-security-software-brightpoint/">2016</a>), Fairchild Resiliency Systems (<a href="https://www.servicenow.com/blogs/2019/fairchild-resiliency-acquisition-helps-companies-manage-risk">2019</a>), Mission Secure (<a href="https://www.servicenow.com/blogs/2024/mission-secure-enhance-ot-asset-visibility">2024</a>), Veza (<a href="https://www.businesswire.com/news/home/20251201652471/en/ServiceNow-to-Expand-Security-Portfolio-With-Acquisition-of-Vezas-Leading-AI-native-Identity-Security-Platform">2025</a>), and Armis (<a href="https://finance.yahoo.com/news/servicenow-buy-cybersecurity-startup-armis-140430631.html">2025</a>).</p><p>What&#8217;s different about this phase of ServiceNow strategy is that instead of integrating with security solutions, the new move is much more aggressive: to acquire control points in security where &#8220;visibility + prioritization&#8221; decisions start.</p><p>The acquisitions of Veza and Armis make this strategy rather obvious, as both of the acquired companies fit the gravity model very well. Identity decisions create constant work, from access requests, access reviews, managing exceptions, and remediation, which is exactly the space where Veza has been playing. From the security standpoint, the answer to identity problems isn&#8217;t just detection, it&#8217;s approval combined with enforcement and evidence collection, something that lands itself in the workflow territory. Armis, on the other hand, is an exposure management platform, and exposure management produces arguably the most &#8220;workflowable&#8221; output in security: prioritized risk that needs action (assignments, fixes, compensating controls, exceptions, etc.). Both platforms create cross-org coordination work: in the case of identity, it&#8217;s between employees, IT, and security, and in the case of OT/IoT/medical devices, it&#8217;s between facilities, biomed, IT, security, and so on. Put simply, Veza helps ServiceNow own &#8220;who/what can access,&#8221; and Armis helps it own &#8220;what&#8217;s out there and how risky it is.&#8221; Both of these are upstream decision points that feed everything else. It&#8217;s pretty obvious that these acquisitions aren&#8217;t about adding another security SKU to the broader portfolio; they&#8217;re about assembling a platform where security decisions get made and implemented. You can read it as a three-layer stack ServiceNow is trying to own: see (gain visibility into different aspects of security), decide (understand impact, prioritize, govern, etc.), and act (ServiceNow&#8217;s bread and butter of ticketing and workflows).</p><h1>Data may be the new oil, but it&#8217;s workflows that get redefined with AI agents</h1><p>People like to say that in the age of AI, data is the new oil. I am not going to dispute that, but I do want to point out an important nuance. Having quality data has been critical for over a decade, ever since tools like data science and machine learning became ubiquitous in the tech world. The impact of AI agents is not really changing the importance of data. What it&#8217;s doing is raising the importance of workflows.</p><p>The current generation of AI, and specifically AI agents, makes it possible to automate a lot of work that has previously needed to be done by humans. The most impactful innovation of the present is about workflows, and guess what, no single system on the planet houses more enterprise workflows than ServiceNow. This is why, in my view, ServiceNow is the platform that has very high chances of benefiting from AI agents for everything, including automating security workflows.</p><h1>Closing thoughts</h1><p>I think that the ServiceNow strategy isn&#8217;t just a very smart move for the company, but it can also be great news for the industry. We like to talk about security by design and embedding security into the products from the very moment we design a new solution. This surely is something that we should be aspiring toward, but even if that were to happen (which I am not overly optimistic about), I don&#8217;t think it&#8217;d have as much impact as people believe it would. The majority of risks aren&#8217;t an outcome of poorly designed products; they are an outcome of organizational complexity. Since I&#8217;ve used identity as an example throughout this article, I&#8217;ll use it here as well. It&#8217;s not that all applications get shipped with broken authentication and authorization functionality, it&#8217;s that at enterprise scale, it&#8217;s insanely hard to get these right.</p><p>We&#8217;ve all read reports that over 99% of all breaches will be the result of misconfigurations, and I am a firm believer that that&#8217;s exactly what&#8217;s going to happen (if it hasn&#8217;t already). If we want to solve the problems of enterprise security, we need to find a way to embed security into the enterprise workflows. I don&#8217;t think there&#8217;s anyone who would be in a better position to do this than ServiceNow. If it plays its cards well and if it uses the advantages it gets with AI, it can very well reshape the way cybersecurity is done.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iGga!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iGga!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!iGga!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!iGga!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!iGga!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iGga!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iGga!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!iGga!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!iGga!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!iGga!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc944b70c-2258-42e1-9bda-2a44511888ec_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Going into 2026: what founders and security leaders need to know]]></title><description><![CDATA[A year-end reflection about the state of cyber]]></description><link>https://ventureinsecurity.net/p/going-into-2026-what-founders-and</link><guid isPermaLink="false">https://ventureinsecurity.net/p/going-into-2026-what-founders-and</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 16 Dec 2025 19:19:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!o9iq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The last post of the year is usually also the hardest to write because it always feels like it should be deeper, smarter, and more insightful than usual. The good news is that I was able to free myself from these self-imposed expectations, but the bad news is that this post is still going to feel a lot like a reflection of a sort. This has become a tradition: a year ago (gosh, it&#8217;s been a full year!) I invited readers to have an honest conversation about the state of cybersecurity, and this time around, I am going to talk about selling security as we go into 2026 and what the market expectations look like.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.tines.com/access/guide/the-security-leaders-playbook-to-grc-orchestration/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=primary/1612">Tines</a>. </em></p><p><strong><a href="https://www.tines.com/access/guide/the-security-leaders-playbook-to-grc-orchestration/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=primary/1612">The security leader&#8217;s playbook to GRC</a></strong></p><p>Manual compliance work is costing your team time - and fueling burnout. But the path forward from planning to action can feel ambiguous. Which workflows deliver the fastest value? How should APIs be configured?</p><p>In this new <a href="https://www.tines.com/access/guide/the-security-leaders-playbook-to-grc-orchestration/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=primary/1612">security leader&#8217;s playbook to GRC</a> by Drata and Tines guide, you&#8217;ll learn:</p><ul><li><p>Concrete steps to replace reactive compliance with continuous, automated GRC</p></li><li><p>Key use cases for GRC orchestration including streamlining evidence collection, and audit preparation and response</p></li><li><p>Metrics of success and a sample ROI model for a more resilient, proactive GRC program</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tines.com/access/guide/the-security-leaders-playbook-to-grc-orchestration/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=primary/1612&quot;,&quot;text&quot;:&quot;Get the Playbook&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tines.com/access/guide/the-security-leaders-playbook-to-grc-orchestration/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=primary/1612"><span>Get the Playbook</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>The one thing that makes selling security different than selling most other products</h1><p>We can talk all we want about how security is different from other industries. I do this pretty often because not everyone understands that<a href="https://ventureinsecurity.net/p/making-sense-of-the-cybersecurity"> security is a horizontal, not a vertical;</a> that in security,<a href="https://ventureinsecurity.net/p/game-of-thrones-in-cybersecurity"> there is a unique driver of innovation</a> that can&#8217;t really be found in any other market except for defense - the adversary, and that for a long list of reasons,<a href="https://ventureinsecurity.net/p/why-there-are-so-many-cybersecurity"> everything in our industry relies on trust</a>.</p><p>All this is true, but we&#8217;ll never be able to understand the complete picture until we discuss why selling security is different than selling most other products. The reason why that is the case is that most of the time, sales motions in cyber are defensive. What this means is that security leaders aren&#8217;t casually exploring &#8220;what new tools are available on the market&#8221; and instead, they are responding to the risk, compliance, or board-level concerns. Don&#8217;t take me wrong, CISOs and other security leaders are most definitely curious about what&#8217;s out there - what new startups, ideas, and approaches are companies trying. Yet when it comes to actually writing checks, most security leaders have fundamental challenges they need to address first, well before they do a test drive of some new cool idea. These fundamental problems tend to also be pretty boring, but that&#8217;s a topic for another article.</p><p>Think about how the buying motion works in other fields. As a product leader, I bought and advocated for my fair share of product management tools. I did that because I had certain goals to drive, but also because I wanted to experiment with different solutions to see if they could move the needle for us. Marketers are especially notorious for this, which is why they try - buy - churn their tooling nonstop. Most other functions have some breathing room to experiment, but security teams are always so behind and so overwhelmed with their existing problems that they barely ever have time to shop for &#8220;what&#8217;s new and interesting&#8221;.</p><p>Most security purchases have historically been rooted in helping companies not get screwed, and not in achieving efficiencies or helping CISOs be more innovative. This is why fear, uncertainty, and doubt (aka FUD) have worked as the only drivers for a while. While in other markets, new ideas have usually been focused on helping companies gain new competitive advantages, achieve efficiencies, or save costs, security buyers would want to see proof that they&#8217;re making a safe choice and that they will be protected when something bad happens.</p><h1>Changing reality of cybersecurity sales</h1><p>Over the past several years, the way cybersecurity products are being bought and sold is changing, and old playbooks are starting to fall apart. There are too many ways in which this is happening, so here&#8217;s just a taste.</p><h2>We&#8217;ve largely moved from proof of concept (POC) to proof of value (POV)</h2><p>This may sound like a play on words for some, but it&#8217;s not. One of the trends I am seeing is that we&#8217;ve largely moved from doing proof of concept (POC) to doing proof of value (POV). The difference is pretty simple. When a security product relied on some real deep tech and unique novel ideas, CISOs would do the so-called proof of concept (POCs) to understand how the solution works, what it does, and how it works with everything else already configured in their environment.</p><p>Fast forward to today, and we see that most concepts are pretty well understood. When someone says words like &#8220;runtime&#8221;, &#8220;posture&#8221;, &#8220;proxy&#8221;, &#8220;firewall&#8221;, &#8220;sensor&#8221;, etc., we have a good idea how things are going to work. In 2025, CISOs don&#8217;t really need to validate concepts; they need to see value, and that is a completely different game. Just because the sensor is looking at some telemetry, doing analysis at runtime, and generating findings, it doesn&#8217;t mean there&#8217;s going to be much value. The same applies to just about anything in security. The founders today aren&#8217;t going to get asked &#8220;How does it work?&#8221;, they&#8217;re going to get asked &#8220;So what?&#8221;.</p><h2>CISOs are starting to ignore FUD and look for ROI</h2><p>As I am starting on this paragraph, I am realizing that this whole section could have very well been called &#8220;going from one three-letter word to another&#8221;. Kind of expanding on the previous point, I am seeing that more and more security leaders are tired of FUD. Every startup keeps telling them, &#8220;If you don&#8217;t buy what we&#8217;re selling, you&#8217;re going to get breached&#8221;, and because everyone is repeating the same pitch while selling different solutions, I think this argument has become completely overused.</p><p>CISOs are starting to ignore tools trying to scare them, and instead look for enablers of business resilience and efficiency. Security leaders are starting to ask how the tool is going to help them make their company more successful - eliminate manual work, answer requests from other teams quicker, and so on. A part of me feels like this whole situation is pretty ironic. For the longest time, security vendors have been investing a ton of marketing dollars in helping spread the message that CISOs should be &#8220;business savvy and business enablers&#8221;. Now when we are at the point when CISOs are doing exactly that, we are learning that most of these vendors aren&#8217;t actually &#8220;enabling&#8221; anything for the business. They&#8217;ve helped create a buying criteria that they can&#8217;t satisfy, so to speak.</p><h2>The fact that CISOs are looking for ROI doesn&#8217;t make it easier to communicate it</h2><p>This is where what we want faces the harsh reality of cyber: just because we want to show ROI, it doesn&#8217;t make it any easier to do it. Money is no longer free, so most companies today are becoming smarter about their budget allocation. This is bad news for security because every time a CISO is pitching a security initiative to get the budget, it gets evaluated against other, revenue-generating projects. If a company is trying to double its revenue year-over-year, is it more likely to invest in a new security initiative, or something that marketing, product, or sales say is going to increase revenue and improve gross margin? The answer is obvious.</p><p>I don&#8217;t think most people truly recognize how hard it is for CISOs in many companies to secure new budgets. We often hear the nonsense that &#8220;many CISOs aren&#8217;t business leaders&#8221;, but I haven&#8217;t seen anyone recognize that any CISO who can get their executive team bought-in to fund new security initiatives when everything is about cost-cutting and top-line growth, is a master communicator, negotiator, and evangelist.</p><p>The challenge of communicating the value of security starts even before communication. How do we measure risk reduction? How do we explain the ROI and quantify the savings of the attacks that didn&#8217;t happen because we had security controls in place? These are rhetorical questions, but when a CISO is working to secure the budget for critical initiatives, they are forced to think about this. To be completely fair: many other execs have trouble tying their spend to outcomes, not just CISOs. Take marketers who struggle to attribute any sales activity to the specific initiatives they are driving. What&#8217;s different about CISOs, though, is that they also get less attention, and the only outcome boards are happy with (zero breaches) is not at all realistic.</p><h1>Cyber sales in 2025 are stuck in a limbo</h1><p>My conclusion is that cyber sales are getting stuck in a limbo. On one hand, FUD no longer works, unless the company has so much mindshare that buyers simply see it as the safest option (startups rarely fall under this category). On the other hand, we are continuing to struggle trying to communicate the business value of security controls, and with that, to come up with an alternative to FUD (which, by the way, hasn&#8217;t served the industry well, but which has most definitely enriched plenty of companies).</p><p>The biggest industry gap, in my view, has nothing to do with the ability of security leaders to communicate the value of security controls, even though that&#8217;s what is often being brought up at conferences and on social media. Instead, it is the fact that way too many entrepreneurs have no idea what problem they are solving. I remember having a chat with my friend Jonathan Haas, who put it really well: the reason most early-stage startups aren&#8217;t growing is that they haven&#8217;t figured out what it is they should be growing. To say it differently, they have no idea in what direction they&#8217;re moving, or even simply what problem they are trying to solve. Behind all that &#8220;next-gen&#8221; and &#8220;AI-powered&#8221; fluff is the fact that they can&#8217;t pinpoint which workflow they are addressing, what tool they are replacing, and who they are trying to sell to. It&#8217;s fine to not have these answers at the seed stage (after all, that&#8217;s what the seed stage is for - to get these answers), but shockingly, you&#8217;ll meet some companies that have been around for 5+ years and that are still struggling to figure out who they are and why they exist.</p><h1>Going into 2026: challenges and opportunities for security leaders</h1><p>I don&#8217;t think the lives of CISOs are going to get much easier going into the new year, but I do hope that they will continue to get more support from their leadership. In 2025, we&#8217;ve seen several cases when company founders and CEOs stood by their CISOs instead of throwing them under the bus when things went wrong, the most prominent being<a href="https://x.com/brian_armstrong/status/1922967787309256807?lang=en"> the story of Coinbase</a>. Also recently, we saw the SEC dismissing the case against Timothy G. Brown, the CISO of SolarWinds, who, by the way, remained the CISO of the company while going through the nightmare of continuous litigation.</p><p>The signs are pretty positive for CISOs, but for obvious reasons, I don&#8217;t think their jobs will get any easier. The budgetary pressure will continue to force them to do more with less, and the noise from all the vendors in the space will only make it harder to tell the difference between what&#8217;s real and what&#8217;s BS. The silver lining is that all this noise should serve as an opportunity for security leaders to refocus on fundamentals, because they are what truly matters. Companies continue to get breached because they are not doing the basics well, and not because they haven&#8217;t bought some next-gen whatever.</p><h1>Going into 2026: challenges and opportunities for founders</h1><p>Going into 2026, the market will only become more competitive. Over the past several years, tens (or maybe hundreds?) of new startups were founded, most of which are still in stealth, but all of which are trying to solve various problems and offer new solutions. Most of them aren&#8217;t trying to address new problems - they&#8217;re going after the exisign markets, which means they&#8217;ll have to convince buyers to replace their existing solutions. That&#8217;s going to be pretty hard. Nearly a year ago, Eyal Worthalter published this post on LinkedIn that I strongly agree with:</p><p>&#8220;The &#8220;better mousetrap&#8221; pitch is dead in cybersecurity. Here&#8217;s why. Most enterprises have already laid their security foundation. EDR, SASE, SIEM, CSPM - the core stack is in place. Not perfect, but good enough to handle almost everything.</p><p>Last year taught me this: After demonstrating 40% better detection rates in a flawless POC, the CISO still walked away. Why? Because &#8220;better&#8221; isn&#8217;t enough anymore. Think about what we&#8217;re really asking when we pitch a &#8220;better&#8221; solution:</p><ul><li><p>Rip out existing integrations</p></li><li><p>Retrain the entire security team</p></li><li><p>Rebuild automated playbooks</p></li><li><p>Revise procedures and documentation</p></li></ul><p>All for what? Incremental improvement. The hard truth? Unless you&#8217;re 10X better (not 50% - 10X), you&#8217;re fighting a losing battle against organizational inertia. &#8220;Good enough&#8221; is your real competitor, not other vendors. I think in 2025 we are only going to see deals close when:</p><ol><li><p>Compliance requirements force change (i.e. your product solves a niche industry requirement)</p></li><li><p>We solve a net-new problem their stack can&#8217;t touch</p></li></ol><p>Both A and B depend on the product. So not much sellers can do about it. Instead, if we demonstrate order-of-magnitude improvement that justifies the organizational pain and drives better business outcomes, we can land better deals. Everything else is just contributing to option fatigue in already overwhelmed security teams. Most honest feedback I got last year was: &#8220;Your solution is better. But &#8216;better&#8217; isn&#8217;t worth the change management overhead.&#8221; - Source:<a href="https://www.linkedin.com/posts/eyalworth_even-if-your-security-product-is-better-activity-7284981345754271746-YgzU?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABd70ggBHphNqkAOu3BA8zLOqO0H8zsPWZc"> Eyal on LinkedIn</a>.</p><p>Eyal&#8217;s words were true a year ago, and they&#8217;re going to be even more true a year from now. Obviously, as founders, we have to be betting on the fact that there will continue to be enough interest from CISOs to buy from the new generation of companies. I am sure there will be, but the bar for startups will continue to go up. While it&#8217;s not going to get easier, I think when the pressure is on, and survival instincts kick in, people will figure out what they stand for faster and more efficiently.</p><p>To close the year off, I must say that the industry continues to mature, and I continue to be incredibly optimistic about where things are headed (if you are not, please read the <a href="https://ventureinsecurity.net/p/cyber-optimist-manifesto-why-we-have">Cyber optimist manifesto: why we have reasons to be optimistic about the future of cybersecurity</a>). May the new year be the year when more companies develop clarity about their purpose, and may they have enough runway to be able to do it. Building startups is hard, and I wish everyone who is working tirelessly to defend our present and the future lots of success in the New Year! CISOs, founders, marketers, investors, security professionals, - regardless of who you are, we are all on the same side. Happy New Year!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o9iq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o9iq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!o9iq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!o9iq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!o9iq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o9iq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:695027,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ventureinsecurity.net/i/181818383?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o9iq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!o9iq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!o9iq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!o9iq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af5b1be-8477-43b2-826a-a0f4459edee7_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/going-into-2026-what-founders-and?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/going-into-2026-what-founders-and?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Going deeper into layer zero: must-know for the cyber industry insiders]]></title><description><![CDATA[A deeper dive into the concept that defines which cyber companies win and which lose]]></description><link>https://ventureinsecurity.net/p/going-deeper-into-layer-zero-must</link><guid isPermaLink="false">https://ventureinsecurity.net/p/going-deeper-into-layer-zero-must</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 09 Dec 2025 17:10:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Svyr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Several months ago, I proposed a concept that helps explain how our industry works and what the prerequisites are for a startup to become a billion-dollar company. I called this concept a &#8220;layer zero&#8221; because it is the foundation upon which everything else gets built. That article got a fantastic response and I&#8217;ve had tens of people reach out with comments and questions about it. Today, I am sharing a few additional perspectives that build on the original idea and make the picture around layer zero much clearer. A lot of the thoughts here are an outcome of a few back-and-forth messages I had with <a href="https://www.linkedin.com/in/billphelps/">Bill Phelps</a> after the original article came out (Bill brought some really great points that informed my own thinking and this piece). Thanks, Bill!</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://zeropath.com/demo?utm_campaign=ventureinsecurity">ZeroPath</a></em></p><p><strong><a href="https://zeropath.com/demo?utm_campaign=ventureinsecurity">Why Your SAST Tool Misses the Scariest Bugs</a></strong></p><p>ZeroPath has discovered critical vulnerabilities in curl, sudo, and Next.js that every traditional SAST, SCA, and secrets scanning tool missed. These are some of the most scrutinized open source projects in the world, but legacy security tools left them exposed. Conventional appsec tools rely on pattern matching and static rules that don&#8217;t understand how your code actually works. They miss the business logic flaws, authentication bypasses, and chained vulnerabilities that matter most. Instead, ZeroPath learns your codebase like a security researcher would, understanding how repositories, services, and dependencies interact.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://zeropath.com/demo?utm_campaign=ventureinsecurity&quot;,&quot;text&quot;:&quot;Learn More &amp; Book a Demo&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://zeropath.com/demo?utm_campaign=ventureinsecurity"><span>Learn More &amp; Book a Demo</span></a></p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/going-deeper-into-layer-zero-must?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/going-deeper-into-layer-zero-must?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/going-deeper-into-layer-zero-must?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div><hr></div><h1>First, a quick recap</h1><p>To those of you who didn&#8217;t read the <a href="https://ventureinsecurity.net/p/competing-with-layer-zero-in-cybersecurity">original piece</a>, I highly recommend checking it out because it provides a broad overview of the idea foundational to this article. For those that did but need a quick refresher, here&#8217;s how I explained it: &#8220;&#8230;The entities best positioned to deliver real security are the ones building the core technologies. A cloud provider is logically in the best place to solve cloud security; an operating system vendor is closest to solve endpoint security; an email provider sees everything that flows through their infrastructure so they should be in the best position to solve email security; an identity provider already governs user access so they should be able to take care of identity threat detection and response effectively. These foundational providers own the systems that define how security boundaries are created, how access is enforced, and how data flows, so they have the ability to bake security in. It is these providers that I define as layer zero.</p><p>Layer zero refers to the foundational layer of infrastructure and technology that other tools depend on. It&#8217;s where<a href="https://ventureinsecurity.net/p/owning-the-control-point-in-cybersecurity"> control points</a> often emerge - identity platforms, cloud service providers, and operating systems. These are not just passive infra providers; they actively shape the rules of engagement for all other tools. For those that own layer zero, adding security is often just an architectural decision (a toggle, an API extension, a bundle, etc.), while for everyone else, namely the vendors operating on top of these platforms, delivering security becomes a negotiation with the underlying layer. That&#8217;s the power of owning the foundation, and the challenge for everyone who doesn&#8217;t.&#8221; - Source:<a href="https://ventureinsecurity.net/p/competing-with-layer-zero-in-cybersecurity"> Competing with layer zero in cybersecurity</a></p><p>The easiest way to understand what it looks like in the real world is to look at who the layer zero providers are:</p><ul><li><p>In the cloud, it is cloud service providers like AWS, Azure, and GCP.</p></li><li><p>In the network, it is networking providers like Cisco and Juniper.</p></li><li><p>In the endpoint, it is the OS providers like Microsoft (Windows) and Apple (macOS and iOS).</p></li><li><p>In identity, it&#8217;s identity providers (IdPs) like Microsoft Entra and Okta.</p></li><li><p>In the browser space, it&#8217;s the browser platforms like Mozilla (Firefox), Chrome (Google), and Edge (Microsoft).</p></li><li><p>In code security, it&#8217;s the platforms where the code is created and managed, like GitHub, and most recently Cursor.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Svyr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Svyr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png 424w, https://substackcdn.com/image/fetch/$s_!Svyr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png 848w, https://substackcdn.com/image/fetch/$s_!Svyr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png 1272w, https://substackcdn.com/image/fetch/$s_!Svyr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Svyr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png" width="1454" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1454,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Svyr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png 424w, https://substackcdn.com/image/fetch/$s_!Svyr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png 848w, https://substackcdn.com/image/fetch/$s_!Svyr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png 1272w, https://substackcdn.com/image/fetch/$s_!Svyr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e91b43b-d3f9-4237-8a2e-91e2e05af756_1454x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the previous article, I explained the market dynamics and what happens when layer zero providers start offering security (people usually prefer third-party solutions), and when security companies mess with the core business of the layer zero providers (bad idea), among other things. Now I would like to share a few other thoughts on this topic that may make it easier for people to solidify the mental model around this concept.</p><h1>Every new layer zero creates an explosion of security companies</h1><p>Layer zero is a pretty dynamic concept because things evolve all the time, and when they do, they create both shifts in infrastructure and the expansion of the attack surface. We talk about cloud, identity, and operating systems as if they&#8217;ve always been layer zero, but they weren&#8217;t inevitable per se. Instead, they became default control planes because some deeper infrastructure shifts created gravity around them. The explosion of personal computers created the endpoint layer, IP networking created the network layer, virtualized compute created the cloud layer, and the rise of SaaS turned the browser into a delivery mechanism for applications.</p><p>Every time a new foundational layer emerges, we see the same pattern when a large number of cybersecurity companies get created to take advantage of that shift. The speed with which it happens varies a lot and is largely dependent on the speed of the underlying infrastructure change. With the cloud, it happened almost overnight; identity took at least a decade to consolidate, and the browser is only now starting to get the recognition it deserved over 5 years ago. With AI, we see many companies making the bet on the fact that AI will become the new layer zero, which is why so much capital is being poured into security for the AI space. Regardless of the specific market segment, the dynamic is the same - when a new control plane forms, security companies chase the surface area around it.</p><p>This is why I think of layer zero as a creator of new security markets. When the foundation changes, thousands of new problems appear: posture, visibility, misconfigurations, gaps between old and new workflows, fragmented APIs, and inconsistent policy models. If you zoom out far enough, the 5,000+ cybersecurity vendors today aren&#8217;t a sign of market inefficiency; they&#8217;re a solid proof that we&#8217;ve had dozens of layer-zero shifts over 40 years, and each created its own cottage industry of &#8220;missing controls.&#8221;</p><h1>Why layer zero never delivers &#8220;enough&#8221; security</h1><p>There&#8217;s this idea that if layer zero platforms (endpoint OS, browsers, cloud platforms, etc.) were just built with stronger security controls, we wouldn&#8217;t need all the add-ons and point solutions. That&#8217;s partially true, but realistically, it&#8217;s impossible. Layer zero optimizes for reliability, scale, economics, and user experience, not for the edge cases enterprises run into. Historically, layer zeros weren&#8217;t even designed with access controls, logging, or basic security guardrails, and all these were added only after attackers forced the hand of the creators.</p><p>Layer zero players build new features with the same structural challenge: they need to serve the entire world with one architecture. Even if they can build some posture, policy, and detection capabilities, these will be weak, shallow, or overly generic. Even after customers get breached by adopting the basic layer, these platforms can&#8217;t go deep enough on security. This is partly because it&#8217;s not their bread and butter, but also because doing that is often counterintuitive to their business models. Doubling down on security often reduces compatibility, increases support burden, and complicates core workflows, something that makes these players sell less of their core products.</p><p>Having seen this story repeat itself several times, I don&#8217;t think that if the layer zero platforms shipped their products with much stronger security, it&#8217;d solve the problem here either. The bigger the enterprise, the more flexibility it needs in configuring things, and more flexibility always means more misconfigurations. I&#8217;d go as far as to say that the majority of security problems are really misconfiguration problems (which is probably why CSPMs and identity automation products have been exploding in growth). That&#8217;s why the first security category around every layer zero is always some form of &#8220;posture management&#8221;, the industry&#8217;s ongoing attempt to deal with complexity nobody could have imagined.</p><h1>The predictable evolution of security around any layer zero</h1><p>Once a new foundational layer develops, the security around it follows a repeatable evolution pattern:</p><p><strong>Step 1: Visibility and posture</strong></p><p>Security teams typically don&#8217;t have control over whatever is happening in IT or engineering, but they need to know whether the new thing is deployed safely. The earliest successful network tools were scanners, the earliest successful cloud tools were posture managers, etc. This sequence is very important because history has shown that starting with runtime instead of posture for a new layer zero is a mistake. When a new layer zero develops, the attackers need time to understand how to actually exploit it, and there&#8217;s rarely enough activity to justify going too deep. People start with configurations, and CSPM is actually a very good example of that in real life when Wiz was able to win the market despite not having all the deep-level controls that some of their competitors did on day one.</p><p><strong>Step 2: Threat detection</strong></p><p>Once posture is &#8220;good enough,&#8221; attackers figure out how to bypass it. This is when logging, behavior analytics, anomaly detection, and runtime monitoring come into play. In the cloud, we went from CSPM to runtime detection, and in other areas of security like data and appsec, we&#8217;re very much moving in the same direction. It always takes time for people to outgrow posture, and the reality is that that maturity curve is pretty steep, but it happens eventually.</p><p>The tricky part here is that the competitive dynamics of the market often forces security products to become more and more sophisticated, but some areas just don&#8217;t see attackers move as fast. When this happens, cyber vendors get too far ahead of the actual attacks and end up building detections that are only triggered by false positives. It doesn&#8217;t take long for people to get rid of these tools. The bottom line is that step one (posture) is always going to be applicable to every new layer zero, but whether or not the market ever gets to step 2 or 3 depends on many factors.</p><p><strong>Step 3: Operations and incident response</strong></p><p>Once (and if) detection tools get widely adopted, the alert volume becomes overwhelming to security teams, which drives all kinds of operational improvements like SOC platforms, SIEMs, response automation, etc. These tools are usually built to help humans deal with what I&#8217;d define as &#8220;human-made&#8221; problems, aka all the alerts produced by the tools in phases one and two. This, on its own, doesn&#8217;t really lead to the creation of new categories. What creates new categories is when the number of attacks focused on the new layer zero is increasing. At that point, companies typically realize that there&#8217;s a pretty big difference between just learning that something bad is happening and actually containing it. As always, we learn that apparently there are not enough people who can respond to this new attack, and that creates room for specialized incident response expertise.</p><p>This cycle explains why our industry is repeating the same pattern all over again, and for every new layer zero, we get posture, then detection, and then (sometimes) response tooling. This also explains why the companies that break out attach themselves to a fast-growing, widely deployed layer zero can inherit decades of relevance.</p><h1>More about layer zero</h1><p>At the beginning of the article, I mentioned a quick exchange with Bill Phelps. He shared some other points that I think are spot on:</p><ul><li><p>Maybe this is obvious, but layer zero is where the business process/data lives, and it is what adversaries are attacking. So it is also the ultimate target for pentesting/red teaming. Pentesting and malicious attacks start with a &#8220;naked&#8221; layer zero, then all the layers on top of layer zero are built to protect it from attack.</p></li><li><p>If a company can evolve into a layer zero platform, it can become a public company. I&#8217;d expand on this thought and say that another way to go public is to deeply embed into an existing layer zero, but it&#8217;s that depth that creates a competitive advantage. CrowdStrike is a good example, and the fact that it needed to go super deep to observe the endpoint is one of the factors that differentiate it from, say, the CSPMs I&#8217;ve mentioned that didn&#8217;t get to build that deep of an IP.</p></li><li><p>It is really hard to achieve scale in cyber if you are not some type of add-on to a dominant layer zero.</p></li></ul><p>All these are great insights, and frankly, it&#8217;s the feedback and ideas from the readers that help me refine and expand my own thinking. Thank you, Bill, and thank you to all the readers for supporting my blog years later!</p><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Top 12 deep dives to understand the cybersecurity market]]></title><description><![CDATA[A selection of 12 of the most critical deep dives for anyone looking to truly understand our industry]]></description><link>https://ventureinsecurity.net/p/top-12-deep-dives-to-understand-the</link><guid isPermaLink="false">https://ventureinsecurity.net/p/top-12-deep-dives-to-understand-the</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 02 Dec 2025 22:12:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eD2j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There are now nearly 250 deep dives into Venture in Security, many of which are essential for understanding the market, whether you are a CISO, a security professional, founder, investor, or anyone else interested in building a well-rounded view of security. You know as well as I do that there are plenty of reports about individual market segments, but the fundamentals are critical regardless which segment you look at. Venture in Security covers the fundamentals. In this issue, I&#8217;ve compiled a selection of 12 of the most critical deep dives for anyone looking to truly understand our industry.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.tines.com/access/guide/the-security-leaders-playbook-to-grc-orchestration/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-0212">Tines</a>.</em> </p><p>Manual evidence collection, scattered tools, and repetitive audits can take a real toll on security and GRC teams. <a href="https://www.tines.com/access/guide/the-security-leaders-playbook-to-grc-orchestration/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-0212">This new GRC playbook</a>, created by Drata and Tines, offers a practical look at how teams are shifting to continuous, automated compliance.</p><p>Inside, you&#8217;ll find: </p><ul><li><p>Detailed workflows for evidence collection, monitoring, audit prep, and vendor risk</p></li><li><p>Implementation guidance from credential setup to scaling</p></li><li><p>Best practices for building resilient, proactive GRC programs</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tines.com/access/guide/the-security-leaders-playbook-to-grc-orchestration/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-0212&quot;,&quot;text&quot;:&quot;Read the guide now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tines.com/access/guide/the-security-leaders-playbook-to-grc-orchestration/?utm_source=Venture_in_Security&amp;utm_medium=paid_media&amp;utm_content=newsletter-0212"><span>Read the guide now</span></a></p><div><hr></div><h1>Top 12 deep dives to understand the cybersecurity market</h1><h3><a href="https://ventureinsecurity.net/p/why-there-are-so-many-cybersecurity">Why there are so many cybersecurity vendors, what it leads to and where do we go from here</a></h3><p>It is common to hear that there are &#8220;too many vendors&#8221; in cybersecurity, and that &#8220;we don&#8217;t need 200+ products in the same category doing the same thing&#8221;. What is rare is seeing analysis as to why there are so many similar vendors - what is driving the establishment of the new companies, and fueling the cybersecurity gold rush.</p><p>In this article, I am looking at some of the factors that lead to the emergence of hundreds of &#8220;me too&#8221; startups, why relatively few businesses in the industry fail and equally, few win big, and why there are only 18 pure-play cybersecurity companies listed on the US stock exchange.</p><p>It&#8217;s been nearly 3 years since I published this article but it is as relevant today as it was back then.</p><h3><a href="https://ventureinsecurity.net/p/20-years-of-cybersecurity-consolidation">20 years of cybersecurity consolidation: how 200 companies became 11</a></h3><p>Everyone in cyber likes to talk about consolidation but very few people understand how it looks in the wild. This isn&#8217;t a usual article, it&#8217;s a lookback at the past 20 years of consolidation history in our industry. Here&#8217;s a preview:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sfPu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sfPu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png 424w, https://substackcdn.com/image/fetch/$s_!sfPu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png 848w, https://substackcdn.com/image/fetch/$s_!sfPu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png 1272w, https://substackcdn.com/image/fetch/$s_!sfPu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sfPu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png" width="1456" height="1019" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1019,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sfPu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png 424w, https://substackcdn.com/image/fetch/$s_!sfPu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png 848w, https://substackcdn.com/image/fetch/$s_!sfPu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png 1272w, https://substackcdn.com/image/fetch/$s_!sfPu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc346334c-7844-4b91-a0d2-e4bd317c9b61_1456x1019.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://ventureinsecurity.net/p/12-ways-to-fail-a-cybersecurity-startup">12 ways to fail a cybersecurity startup</a></h3><p>&#8220;Why do startups fail?&#8221; is one of the most commonly asked questions among anyone interested in building a startup. At first glance, a lot has been written about this problem. However, wherever I go, I continue to see three things:</p><ul><li><p>Most of the analysis is based on the consumer startups</p></li><li><p>Most of the analysis lacks the context of the cybersecurity industry</p></li><li><p>Cybersecurity founders repeat the same mistakes over and over again</p></li></ul><p>For a variety of reasons, both success and failure in cybersecurity look different compared to other industries. In this piece, I offer a guide to failing a cybersecurity startup, highlighting some of the reasons I have seen startups fail, and offering insights and advice to avoid the failure.</p><h3><a href="https://ventureinsecurity.net/p/splunk-okta-cylance-palo-alto-crowdstrike">Splunk, Okta, Cylance, Palo Alto, CrowdStrike, and Zscaler mafias in cybersecurity</a></h3><p>Some companies play an outsized role in shaping the industry: not just because of what they accomplish, but also because of the kind of startups their alumni create. In this piece, I dive into Splunk, Okta, Cylance, Palo Alto, CrowdStrike, and Zscaler mafias in cybersecurity.</p><p>This article is a continuation of the series about the cybersecurity mafia networks. I&#8217;ve also written about Check Point mafia, the impact of Foundstone, Juniper Networks &amp; Cisco, as well as @stake, NetScreen, IBM, Israel Defense Forces and the US Armed Forces mafia networks in cybersecurity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Do_y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Do_y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!Do_y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!Do_y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!Do_y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Do_y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Do_y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!Do_y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!Do_y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!Do_y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2941943d-a804-40c8-a937-f1a21007d85e_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qoxR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qoxR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!qoxR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!qoxR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!qoxR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qoxR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qoxR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!qoxR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!qoxR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!qoxR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec0e041d-88f7-4b43-bc3e-c268ae7b7a56_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://ventureinsecurity.net/p/lets-have-an-honest-conversation">Let&#8217;s have an honest conversation about the state of cybersecurity</a></h3><p>In this piece, I am offering a very direct and real perspective about what I think are the main drivers for companies to spend on security. Spoiler alert - yes, the majority of the companies buy security products for compliance, but there&#8217;s much more to this.</p><h3><a href="https://ventureinsecurity.net/p/cybersecurity-is-not-a-market-for">Cybersecurity is not a market for lemons. It is a market for silver bullets</a></h3><p>In this piece, co-written with my friend Mayank Dhiman, we are looking into the reasons why security is not at all a market for lemons; instead, it is a market for silver bullets. Neither Mayank nor I didn&#8217;t come up with this idea on our own. Our article is centered around the analysis of an excellent essay written by Ian Grigg back in 2008 titled &#8220;The Market for Silver Bullets&#8221;. Since we connect our own ideas to those expressed in Ian&#8217;s article, please assume that anything not listed in quotations is our perspective and not that of Ian.</p><p>Ian&#8217;s essay is a must-read for anyone trying to understand the dynamics of cybersecurity on a deeper level, and we hope this article will inspire many people in the industry to give &#8220;The Market for Silver Bullets&#8221; a read.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YwZF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YwZF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png 424w, https://substackcdn.com/image/fetch/$s_!YwZF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png 848w, https://substackcdn.com/image/fetch/$s_!YwZF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png 1272w, https://substackcdn.com/image/fetch/$s_!YwZF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YwZF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png" width="1072" height="646" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:646,&quot;width&quot;:1072,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YwZF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png 424w, https://substackcdn.com/image/fetch/$s_!YwZF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png 848w, https://substackcdn.com/image/fetch/$s_!YwZF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png 1272w, https://substackcdn.com/image/fetch/$s_!YwZF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bab16c9-060c-4a7f-87b8-6b3e6b8087ab_1072x646.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Source: &#8220;<a href="https://iang.org/papers/market_for_silver_bullets.html">The Market for Silver Bullets</a>&#8221;</p><h3><a href="https://ventureinsecurity.net/p/the-only-six-cybersecurity-markets">The only six cybersecurity markets large VC funds actually care about and why security startups don&#8217;t have a moat</a></h3><p>At first glance, there are hundreds of important problems that need to be solved in cybersecurity. This, in turn, presents opportunities for thousands of security startups, making the whole security technology landscape look like a bingo card.</p><p>The reality, however, is very different. Most security problems are niche, and hence why they simply have no potential to lead to outsized, venture-scale returns. The problems that aren&#8217;t niche, tend to follow specific patterns. In this piece, I am taking a closer look at what these patterns are, and what areas of security actually constitute large markets. The short of it is simple: while things change, tech changes, and attackers also change, decades later, the top markets remain the same:</p><ul><li><p>Network remains foundational despite the fact that many proclaimed that &#8220;network is dead&#8221;. As companies started to move away from traditional networks, the problems of connectivity and security came up once again. The solution which became known as Secure Access Service Edge (SASE) combined networking and security into one product.</p></li><li><p>Endpoint security remains critical for security and ransomware prevention since people still do their work on the workstations the way they did it a decade ago. For better or for worse, ChromeOS is not yet a OS standard heavily used in enterprises, and it&#8217;s unlikely to become one anytime soon.</p></li><li><p>Identity has truly become the new perimeter, and since access is now based on user and machine identity, the market has exploded.</p></li><li><p>Email security remains big because, despite the introduction of Slack, Teams, and other collaboration tools, that is still how businesses communicate with the outside world.</p></li><li><p>Security information and events management (SIEM) remains the foundational technology that allows security teams to aggregate, correlate, and analyze data, or in other words, to do their jobs.</p></li></ul><p>One new kid on the block that VCs care about is cloud security:</p><ul><li><p>As companies started to move to the cloud, cloud security emerged as a new player. Two decades later, we now have players such as Wiz that are centralizing that space.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8swY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8swY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!8swY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!8swY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!8swY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8swY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8swY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!8swY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!8swY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!8swY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139963f1-507c-45e5-808a-7a6b5d34a58d_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://ventureinsecurity.net/p/to-solve-security-problems-you-dont">To solve security problems, you don&#8217;t have to build a security company</a></h3><p>If you were to ask security founders what they think are the best ways to make companies more secure, they would probably tell you different ideas about getting CISOs to buy new security tools. That&#8217;s not wrong per se - CISOs control security budgets, set strategy, and are responsible for the organization&#8217;s security posture. This thinking, however, is very limited for a simple reason: some of the biggest improvements in security have come from products that were never sold as &#8220;security&#8221; at all.</p><p>In this issue, I discuss the concepts of security as the product vs. security as a byproduct, and what they mean for founders.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vXMX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vXMX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!vXMX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!vXMX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!vXMX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vXMX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vXMX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!vXMX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!vXMX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!vXMX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1fd49c-a2b8-4282-8642-ad91631e6872_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://ventureinsecurity.net/p/competing-with-layer-zero-in-cybersecurity">Competing with layer zero in cybersecurity</a></h3><p>Exploring the idea of a &#8220;layer zero&#8221; - why it matters, what makes it powerful, and how security startups can strategically position themselves around it.</p><p>The entities best positioned to deliver real security are the ones building the core technologies. A cloud provider is logically in the best place to solve cloud security; an operating system vendor is closest to solve endpoint security; an email provider sees everything that flows through their infrastructure so they should be in the best position to solve email security; an identity provider already governs user access so they should be able to take care of identity threat detection and response effectively. These foundational providers own the systems that define how security boundaries are created, how access is enforced, and how data flows, so they have the ability to bake security in. It is these providers that I define as layer zero.</p><p>Layer zero refers to the foundational layer of infrastructure and technology that other tools depend on. It&#8217;s where control points often emerge - identity platforms, cloud service providers, and operating systems. These are not just passive infra providers; they actively shape the rules of engagement for all other tools. For those that own layer zero, adding security is often just an architectural decision (a toggle, an API extension, a bundle, etc.), while for everyone else, namely the vendors operating on top of these platforms, delivering security becomes a negotiation with the underlying layer. That&#8217;s the power of owning the foundation, and the challenge for everyone who doesn&#8217;t.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eD2j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eD2j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!eD2j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!eD2j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!eD2j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eD2j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eD2j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!eD2j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!eD2j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!eD2j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdf819ed-36e5-4bcc-81ba-249e6f936a01_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://ventureinsecurity.net/p/owning-the-control-point-in-cybersecurity">Owning the control point in cybersecurity</a></h3><p>In every business function, there are control points - systems that teams rely on the most and that concentrate the most power and influence over operations. In cybersecurity, identifying these control points is critical for understanding where decisions are made, where workflows converge, and where to prioritize investment. Dave Yuan offers a useful heuristic: &#8220;If you had to turn off all the systems in your stack, which ones would you turn off last?&#8221; The answer to this question is a good heuristic to figure out which platforms are core to the function and which are secondary.</p><p>For most cybersecurity teams, the primary control point is their SOC platform, usually a SIEM or XDR. It&#8217;s where telemetry is aggregated, alerts are prioritized, and investigations happen. It&#8217;s the default interface for day-to-day security work, and often the first system looked at during a breach or audit. While the tools used may vary, nearly every mature team has something in place that acts as the operational center of gravity for detection and response.</p><p>Other domains within security have their own control points. Whoever owns the control point, gets an opportunity to build a billion-dollar company.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7sW-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7sW-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!7sW-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!7sW-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!7sW-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7sW-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7sW-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!7sW-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!7sW-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!7sW-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa266fd27-d872-431c-b1bd-f47ff8edd647_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://ventureinsecurity.net/p/explaining-the-complex-world-of-channel">Explaining the complex world of channel partners in cybersecurity and looking at their past, present, and future</a></h3><p>Channel partners are critical for cybersecurity because no company can reach millions of businesses around the world on its own. Establishing and maintaining relationships spanning countries, languages, time zones, and industries is not feasible without reliance on partner networks.</p><p>Over the past decade, the world of channel partners has been evolving. In this piece, I am diving deep into this evolution, what it means for the industry, and the future of security.</p><h3><a href="https://ventureinsecurity.net/p/enmeshment-in-cybersecurity-blurring">Enmeshment in cybersecurity: blurring boundaries between products and services</a></h3><p>A decade ago, anyone looking to segment and classify cybersecurity companies would first split them into two buckets: products and services. Today, that difference has been disappearing as more and more service providers have been building products, while product companies are now offering services. In the deade to come, I think the line between the two is going to fully disappear.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!edAs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!edAs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!edAs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!edAs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!edAs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!edAs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!edAs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!edAs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!edAs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!edAs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff972387b-c4b5-4494-b74d-05a9bc860f27_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5><strong>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></strong></h5><h5><strong>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</strong></h5><h5><strong>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</strong></h5><h5><strong>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</strong></h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Most cyber companies simply can’t scale as fast as the new AI startups]]></title><description><![CDATA[How AI is changing what solid growth looks like and what this means for cyber startups]]></description><link>https://ventureinsecurity.net/p/most-cyber-companies-simply-cant</link><guid isPermaLink="false">https://ventureinsecurity.net/p/most-cyber-companies-simply-cant</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 25 Nov 2025 19:01:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ire-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s now pretty obvious that AI is transforming the way the world works. It feels like a massive movement, and because so much capital continues to get allocated to AI, and so many smart people are dedicating their efforts to making use of it, it&#8217;s clear that the transformation is already underway. We can debate whether or not there&#8217;s a bubble, but that&#8217;s kind of immaterial to the topic I wanted to discuss today (besides, when everyone is jumping on the same opportunity, it&#8217;s always going to lead to a bubble, whether we&#8217;re talking about mortgages, bitcoin, or AI).</p><p>The topic I want to touch on instead is how AI has been reshaping the expectations around company growth (spoiler alert: it changed them completely). In this piece, I&#8217;ll discuss how AI is changing the trajectory of startup growth, and then I&#8217;ll talk about our industry and why I think that, for better or for worse, the vast majority of the cybersecurity startups won&#8217;t grow as fast as the new AI companies. I&#8217;ve initially wanted to say that &#8220;the rate of growth of cyber startups will never match the rate of growth of the new AI companies,&#8221; but then someone will always find an example that makes the point seem wrong, even if it applies to 99.99% of the market, so I would rather maintain some credibility and frame that differently.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.intruder.io/research/shadow-it-risks?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|shadow_it">Intruder</a>.</em></p><p><strong><a href="https://www.intruder.io/research/shadow-it-risks?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|shadow_it">30M Domains Later, Here&#8217;s What We Found Hiding In Shadow IT</a></strong></p><p>How much Shadow IT can you uncover with only public data? We ran the experiment and the answer was: too much. From backups holding live credentials to admin panels with no authentication, these exposures stay invisible to you but wide open to attackers. Read the research to see what we found and how Intruder helps you find it first.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.intruder.io/research/shadow-it-risks?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|shadow_it&quot;,&quot;text&quot;:&quot;See what we found&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.intruder.io/research/shadow-it-risks?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|shadow_it"><span>See what we found</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>The new $100M ARR growth curve for AI startups</h1><p>Several months ago, Bessemer published<a href="https://www.bvp.com/atlas/the-state-of-ai-2025"> The State of AI 2025</a> report (if you haven&#8217;t seen it, I highly recommend giving it a read). In this report, they discuss the trends in the AI world and put forward some predictions about the coming years. It&#8217;s a good read overall, but what stood out to me is the idea that before AI, top companies would on average need ~7 years to reach $100M ARR. In the post-AI world, the amount of time has been shortened dramatically. Today, according to Bessemer, great AI startups (they call them &#8220;AI Shooting Stars&#8221;) get to $100M in 4 years, and exceptional AI companies, which Bessemer calls &#8220;AI Supernovas,&#8221; get to $100M ARR in some 1.5 years.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ire-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ire-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!ire-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!ire-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!ire-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ire-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ire-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!ire-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!ire-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!ire-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F846721a2-7d76-4691-aa8c-d0fbb8526f59_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image Source:<a href="https://www.bvp.com/atlas/the-state-of-ai-2025"> Bessemer&#8217;s State of AI 2025 report</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aj9l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aj9l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!aj9l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!aj9l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!aj9l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aj9l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aj9l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!aj9l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!aj9l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!aj9l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93685128-7629-43f4-8ad1-203dc1f6bc0c_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image Source:<a href="https://www.bvp.com/atlas/the-state-of-ai-2025"> Bessemer&#8217;s State of AI 2025 report</a></p><p>These are fantastic numbers. Let&#8217;s have a look at a few pieces from the report: &#8220;Supernovas are the AI startups growing as fast as any in software history. These businesses sprint from seed to $100M of ARR in no time, often in their first year of commercialization. These are at once the most exciting and the most terrifying startups we see. Almost by definition, these numbers arise from circumstances where revenue may appear vulnerable. They involve fast adoption that either belies low switching costs or signals massive novelty that may not align with long-term value. These applications are often so close to the functionality of core foundation models that &#8220;thin wrapper&#8221; labels could be thrown. And in red-hot competitive spaces, margins are often stretched close to zero or even negative as startups use every tool to fight for winner-take-all prizes.&#8221; - Source:<a href="https://www.bvp.com/atlas/the-state-of-ai-2025"> Bessemer&#8217;s State of AI 2025 report</a></p><p>&#8220;Shooting Stars, by contrast, look more like stellar SaaS companies: they find product-market fit quickly, retain and expand customer relationships, and maintain strong gross margins&#8212;slightly lower than SaaS peers due to faster growth and modest model-related costs. They grow faster on average than their SaaS predecessors, but at rates that still feel anchored to traditional bottlenecks of scaling an organization. These businesses might not yet dominate headlines, but they&#8217;re beloved by their customers and are on the trajectory to making software history.</p><p>On average, these Shooting Stars reach the ~$3M ARR range within their first year of revenue while quadrupling in YoY growth with ~60% gross margins, and ~$164K ARR / FTE in their first year.</p><p>If T2D3 (triple, triple, double, double, double) defined the SaaS era, then Q2T3* (quadruple, quadruple, triple, triple, triple) better reflects the five-year trajectory we&#8217;re seeing from today&#8217;s AI Shooting Stars. These startups grow meaningfully faster than traditional SaaS, but still operate closer to SaaS benchmarks than the explosive AI Supernovas.&#8221; - Source:<a href="https://www.bvp.com/atlas/the-state-of-ai-2025"> Bessemer&#8217;s State of AI 2025 report</a>.</p><p>Overall, I think this report does a great job outlining how building software companies is different today compared to some 2-3 years ago. At the same time, for me, it raised a lot of questions, the biggest of which is &#8220;So&#8230; what does this mean for cyber?&#8221;.</p><h1>Cyber startups in the age of AI</h1><h2>AI changes the speed of shipping products, but not so much the speed of GTM</h2><p><a href="https://www.linkedin.com/posts/ddewalt_cyberspotlight-dave-dewalt-founder-of-activity-6563824225239601152-5Ccf/">Paraphrasing Dave DeWalt</a> a bit, in cyber, product is the game of inches, but GTM is the game of miles. This has been the case five years ago, and whether you like it or not, it&#8217;s even more the case today. The most technologically superior products rarely win against better distribution (for once, that&#8217;s why startups often struggle where large vendors just bundle new capabilities into their platforms).</p><p>AI has, without any doubt, made it faster for companies to ship new products, faster to iterate, and faster to learn what works and what doesn&#8217;t. However, in cyber, shipping features quickly hasn&#8217;t been a problem (for once, Israeli startups have figured that out). Growth in our industry is all about distribution, and distribution, in turn, is all about trust.</p><p>Security moves with the speed of trust, not the speed of shipping new features. Interestingly enough, as AI is accelerating the speed of shipping new features, it&#8217;s actually slowing down the speed of trust, so POCs can become longer. Enterprises are questioning how exactly AI is being used, what it will do with their data, and so on, and getting the answers only extends the amount of time it takes for startups to close deals.</p><h2>Some security startups may become &#8220;AI Shooting Stars,&#8221; but the majority will remain in that &#8220;Cloud Centaur&#8221; spot</h2><p>Let me first say that ARR is a funny metric these days, as some companies in our industry have been rumored to be pretty creative about how they define it, allowing them to boast numbers far higher than the amount of money that was flowing into their bank accounts. The peculiarities of the non-GAAP term &#8220;ARR&#8221; aside, the fact of the matter is that security revenue isn&#8217;t often a flywheel. Enterprise sales (and most cyber companies sell to enterprises) are a slog, with sales cycles often spanning more than 6-12 months. It&#8217;s pretty hard to become an &#8220;AI Supernova&#8221; when the POC is going to take 9 months, and the first purchase may come from the &#8220;innovation budget&#8221;.</p><p>I have no doubt that some security startups will indeed be able to move through procurement faster. And yet, (and I am sorry for having to say this), it most likely isn&#8217;t going to be because of AI. At the end of the day, AI-powered vulnerability management is probably going to go through the same procurement cycle (plus even more checks and steps) as vulnerability management, and AI-powered SIEM will most likely go through the same process as a regular SIEM. From what I&#8217;ve seen and from what I know, AI-native companies do often offer superior experience, and some problems that can now be solved with the help of AI were previously completely unsolvable. And yet, procurement teams are still taking them through the same series of steps as before (and then some).</p><p>Then there&#8217;s the fact that many security products don&#8217;t need AI. Ironically, for non-AI companies, it may take less time to get through the POC compared to their AI-native counterparts. The bottom line is that while some security startups may become &#8220;AI Shooting Stars&#8221;, the majority will remain in that &#8220;Cloud Centaur&#8221; spot. They will still be growing, they will still be durable businesses, and they&#8217;ll often still have fantastic exits, but they&#8217;ll look different than these &#8220;AI Supernovas,&#8221; which brings me to one of the most interesting points of this article: venture capital.</p><h2>It&#8217;s not that security startups are bad investments; they&#8217;re just different</h2><p>It&#8217;s not that security startups are bad investments; they&#8217;re just different, and these differences are structural. Security is slow because, by its very nature, it is about reducing risk, and everything new is risky. Trust always decides the pace in cyber. For those interested in this topic, I previously wrote several deep dives about trust in security, including<a href="https://ventureinsecurity.net/p/why-there-are-so-many-cybersecurity"> Why there are so many cybersecurity vendors, what it leads to and where do we go from here</a> and<a href="https://ventureinsecurity.net/p/time-to-trust-what-it-is-why-cybersecurity"> Time to trust: what it is, why cybersecurity startups must shorten it to accelerate growth, and how to do it</a>.</p><p>Growth in security is slow, and it requires a lot of patience. Take, for example, Zscaler, which<a href="https://ir.zscaler.com/news-releases/news-release-details/zscaler-reports-fourth-quarter-and-fiscal-2025-financial-results"> recently celebrated</a> crossing $3B ARR - an astronomical number for most cyber companies. What most people don&#8217;t realize is that it took Zscaler 10 years to get to $100M in ARR, and then just 5 more to $1B in ARR. A decade to $100M ARR is surely not an &#8220;AI Supernova,&#8221; but nobody is going to argue that Zscaler is not a huge success. CrowdStrike, founded in 2011,<a href="https://medium.com/@alexfclayton/crowdstrike-ipo-s-1-breakdown-3f00b06f7a3a"> did $250M ARR</a> in 2019, during the year it went public (it took them 8 years to get to that number). Today, 6 years later, the company&#8217;s ARR<a href="https://ir.crowdstrike.com/news-releases/news-release-details/crowdstrike-reports-second-quarter-fiscal-year-2026-financial"> reached $4.66B</a>. These numbers show that growth in security is about consistency, hard work, and the compound effect of trust. It is not about growth hacks or marketing gimmicks; it&#8217;s about continuous value delivery and discipline. Companies that went for something else (rapid scaling, etc.) have historically struggled to build lasting business.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><h2>I think we&#8217;ll see more generalist VCs leaving security</h2><p>Over the past decade, cybersecurity has become one of the hottest categories in tech from a VC standpoint. In just the past year alone, we&#8217;ve seen massive outcomes, from Wiz&#8217;s acquisition to the recent CyberArk deal, along with a steady stream of smaller but solid exits. Naturally, every VC watching these big M&amp;A moments wishes they had been an early investor in Wiz. And for a while, they all acted like they were chasing the next one. Until now.</p><p>You see, Wiz is still just one company. It&#8217;s an outlier. Although VCs like to say that they are into betting on outliers, the majority want to see a path of how their investment is going to become that one in a thousand. In cyber, that can be pretty hard. Security does have great stories (Palo Alto, Zscaler, Cloudflare, CrowdStrike, and you name it), but it&#8217;s not an easy market to make sense of, especially in a world where there seems to be an easier path.</p><p>For cyber VCs, making investment decisions is simpler because their freedom of choice is pretty limited (after all, they&#8217;ve committed to their LPs that they&#8217;ll be investing capital precisely in security). Sure, they can get creative and count some drone startups as &#8220;security&#8221;, or some anti-fraud solution, or maybe even AI voice startups if they try really, really hard. Outside of that, they have to allocate capital in the industry they&#8217;ve committed to. Most importantly, they know well that for those who understand what they&#8217;re doing, slower growth in cyber doesn&#8217;t mean less potential for fantastic returns.</p><p>Generalist VCs operate under a different set of incentives. They aren&#8217;t bound to a specific vertical, and even their &#8220;specialties&#8221; tend to be broad, like SaaS, fintech, enterprise software, AI. So let&#8217;s bring back that Bessemer stat about hitting $100M ARR in 1.5 years. Now imagine a generalist VC evaluating a fintech startup with $5M ARR after 10 months versus a cybersecurity startup that&#8217;s been selling for a year and a half and is on track for $1.7M ARR. In the cybersecurity world, $1.7M at that stage is considered very good, sometimes exceptional. But when compared side-by-side with a fintech startup sprinting at 3x the revenue in less time, a generalist VC isn&#8217;t likely to be impressed. It&#8217;s not ignorance; it&#8217;s just rational portfolio decision-making. Faster growth in a bigger category is hard to argue against.</p><p>If the current trend continues, I think it&#8217;s going to drive a lot of the tourist VCs out of cyber because they just won&#8217;t be able to justify investing in &#8220;slower-growing&#8221; security companies over all these &#8220;AI Supernovas&#8221; with $10M-40M ARR after one year. Looking at this chart from Bessemer, cyber is most likely gonna stay as &#8220;Cloud Centaur&#8221; by default and by design, with few companies getting into the &#8220;AI Shooting Star&#8221; category as exceptions rather than the new norm. The cyber specialists VCs who understand the space and who underwrite deals with a good idea of how different markets evolve, I think, will not only stay but will continue to generate great returns. At the same time, I fully expect the interest from generalist VCs to dry up as they&#8217;ll continue to struggle with how to compare what&#8217;s by the new standard, &#8220;an average-looking company,&#8221; to the AI superstars.</p><h1>Looking into the future</h1><p>Predicting the future is never easy, but sometimes the writing is on the wall. Unless security budgets keep expanding indefinitely, and unless security buyers suddenly become less risk-averse (neither of which seems likely), security startups will struggle to compete for VC attention against the new wave of AI companies. The contrast is becoming increasingly stark as more AI-native startups report record-breaking ARR numbers. Yes, some of those figures are inflated, and many of these companies will collapse as fast as they raise, but the impact of AI across industries appears real, and so is the competition it introduces.</p><p>For now, there&#8217;s still plenty of capital flowing into security startups, but it&#8217;s likely to get harder soon. As strange as it sounds, that might actually be healthy for the industry. Once the &#8220;tourists&#8221; lose their enthusiasm for cyber, the VCs who truly understand security, and who spend real time with security buyers, should find their jobs easier. It becomes a kind of natural selection: companies solving real, urgent problems will endure, while those built on hype or weak signals will inevitably struggle.</p><div><hr></div><h5>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></h5><h5>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</h5><h5>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</h5><h5>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/most-cyber-companies-simply-cant?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/most-cyber-companies-simply-cant?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Venture in Security&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Venture in Security</span></a></p>]]></content:encoded></item><item><title><![CDATA[Nobody ever gets credit for fixing security problems that never happened]]></title><description><![CDATA[We in security aren&#8217;t unique in our challenges, but we sure know how to take the problems everyone else has and crank them up to eleven.]]></description><link>https://ventureinsecurity.net/p/nobody-ever-gets-credit-for-fixing</link><guid isPermaLink="false">https://ventureinsecurity.net/p/nobody-ever-gets-credit-for-fixing</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 18 Nov 2025 16:29:33 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f08ae691-e8c7-4fb5-a1d0-a8ddac709bb1_2000x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over 20 years ago, Nelson Repenning and John Sterman published an article in the Engineering Management Review, IEEE titled &#8220;<a href="https://web.mit.edu/nelsonr/www/Repenning=Sterman_CMR_su01_.pdf">Nobody ever gets credit for fixing problems that never happened: creating and sustaining process improvement</a>&#8221;. When you read this article, you&#8217;ll realize that security is not unique in facing the problems it does, but also that our industry amplifies a lot of the challenges common in other fields and makes them much harder to tackle.</p><p>In this piece, I am doing a deep dive into the aspects of that great article that are most relevant to security. First and foremost, there&#8217;s the fact that nobody ever gets credit for fixing security problems that never happened. This has serious consequences for security teams and startup founders alike, as it effectively defines what initiatives (or products) are likely to be doomed from the start. It also answers many other questions, like why we blame people and not processes, why people are conditioned to work harder instead of working smarter, and why we love shortcuts even if the long-term impact of taking them can be pretty bad.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.intruder.io/research/shadow-it-risks?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|shadow_it">Intruder</a>.</em></p><p><strong><a href="https://www.intruder.io/research/shadow-it-risks?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|shadow_it">30M Domains Later, Here&#8217;s What We Found Hiding In Shadow IT</a></strong></p><p>How much Shadow IT can you uncover with only public data? We ran the experiment and the answer was: too much. From backups holding live credentials to admin panels with no authentication, these exposures stay invisible to you but wide open to attackers. Read the research to see what we found and how Intruder helps you find it first.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.intruder.io/research/shadow-it-risks?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|shadow_it&quot;,&quot;text&quot;:&quot;See what we found&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.intruder.io/research/shadow-it-risks?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|shadow_it"><span>See what we found</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>Working harder vs. working smarter</h1><p>Nelson and John, authors of the IEEE article, explain in very simple terms why security teams, similar to other functions, get stuck in the endless cycle of firefighting.</p><p>The idea here is simple. Security teams spend all their time dealing with incidents, tickets, and alerts - all the stuff that causes the well-known fatigue. Everything is on fire, the amount of work is overwhelming, and it&#8217;s impossible to ever reach a point where the team has time to pursue more strategic initiatives. Because the teams are bogged down doing all this manual, repetitive, low-value work, they never get the time to prioritize investing in foundational hygiene, architecture changes, or resilience. This creates a vicious cycle: the more they firefight, the more fragile the system becomes, and the more fragile the system, the more they need to firefight to keep it from falling apart.</p><p>Nelson and John explain that the core reason for this is that working harder leads to immediate performance improvements. The more time and effort people dedicate to work, the better the results. Moreover, the improvement is immediate, and it&#8217;s easy to measure. The problem is that the benefits of working harder are pretty short-lived. As less time is spent improving processes, the capabilities slowly worsen, and eventually hit the point when simply working more won&#8217;t achieve much. This is why the authors describe working harder as &#8220;better before worse&#8221;: at first, working harder leads to immediate improvements, but over time, things get worse.</p><p>The so-called working smarter approach is the opposite. When the company decides to prioritize some larger-scale improvement initiatives, in the short term, things slow down because people are distracted by all the improvements and can&#8217;t work as hard on their day-to-day operational tasks. Eventually, however, the capabilities &amp; the level of maturity increase more than enough to compensate for the initial productivity losses, and security teams become much more effective long-term. The article authors describe this as a &#8220;worse-before-better&#8221; dynamic.</p><p>We see how these things play out in the real world all the time. Foundational work like inventorying all assets, refactoring IAM, redesigning network segments, documenting architectures, and implementing zero trust initially slows everything down, and it can be hard to see how it can immediately reduce incidents. Over time, however, it is these operational improvements that give security teams superpowers and make them more effective, efficient, and productive in the long run. Since most people aren&#8217;t comfortable with the initial productivity dip that comes with working smarter, they prefer to focus on initiatives that lead to an immediate visible bump in productivity, even if, long-term, they&#8217;re actually less effective.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZGR1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZGR1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png 424w, https://substackcdn.com/image/fetch/$s_!ZGR1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png 848w, https://substackcdn.com/image/fetch/$s_!ZGR1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png 1272w, https://substackcdn.com/image/fetch/$s_!ZGR1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZGR1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png" width="1456" height="1078" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1078,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZGR1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png 424w, https://substackcdn.com/image/fetch/$s_!ZGR1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png 848w, https://substackcdn.com/image/fetch/$s_!ZGR1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png 1272w, https://substackcdn.com/image/fetch/$s_!ZGR1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c1c1188-6b1f-4744-adf6-9901e20a6cb7_1600x1185.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image Source:<a href="https://web.mit.edu/nelsonr/www/Repenning=Sterman_CMR_su01_.pdf"> California Management Review</a></p><h1>Good security is destroyed by shortcuts</h1><p>It can be said that good security is destroyed by shortcuts, not just those of people across the organization, but also shortcuts that security teams themselves are taking.</p><p>When security teams are pressured to do more with less time, they have to cut corners, and what naturally suffers are things that feel less urgent, like improvement initiatives, documentation, maintenance, and root-cause analysis. On one hand, this is understandable because in the short-term, taking this path can enable security teams to accomplish more in other areas and go heads-down on some operational day-to-day tasks. In the long term, they end up paying for these luxuries. Skipping threat modeling, not patching fully, ignoring IaC misconfigurations, not cleaning up IAM exceptions, and postponing other foundational work creates invisible long-term risk that adds up and eventually blows up in somebody&#8217;s face.</p><p>Here&#8217;s how authors of the article explain this phenomenon: <em>&#8220;Shortcuts are tempting because there is often a substantial delay between cutting corners and the consequent decline in capability. For example, supervisors who defer preventive maintenance often experience a &#8220;grace period&#8221; in which they reap the benefits of increased output (by avoiding scheduled downtime) and save on maintenance costs. Only later, as equipment ages and wears do they begin to experience lower yields and lower uptimes.[...] Similarly, a software engineer who forgoes documentation in favor of completing a project on time incurs few immediate costs; only later, when she returns to fix bugs discovered in testing does she feel the full impact of a decision made weeks or months earlier.&#8221;</em></p><h1>Power of the attribution error</h1><p>Our industry is a prime example of what psychologists call the &#8220;fundamental attribution error&#8221;. Here is how the authors of the article explain this phenomenon.</p><p><em>&#8220;Suppose you are a manager faced with inadequate performance. Your operation is not meeting its objectives and you have to do something about it. [...] You have two basic choices: get people to work harder or get them to work smarter. To decide, you have to make a judgment about the cause of the low performance. If you believe the system is underperforming due to low capability, then you should focus on working smarter. If, on the other hand, you think that your workers or engineers are a little lazy, undisciplined, or just shirking, you need to get them to work harder.</em></p><p><em>How do you decide? Research suggests that people generally assume that cause and effect are closely related in time and space: To explain a puzzling event, we look for another recent, nearby event that might have triggered it. People also tend to assume each event has a single cause, underestimate time delays, and fail to account for feedback processes. How do these causal attributions play out in a work setting? Consider a manager observing a machine operator who is producing an unusually high number of defects. The manager is likely to assume that the worker is at fault: The worker is close in space and time to the production of defects, and other operators have lower defect rates. The true cause, however, may be distant in space and time from the defects it creates. Perhaps the defect is actually the result of an inadequate maintenance procedure or the poor quality of the training program. In this case, the delay between the true cause and the defective output is long, variable, and often unobservable. As a result, managers are likely to conclude that the cause of low throughput is inadequate worker effort or insufficient discipline, rather than features of the process.&#8221;</em></p><p>We see this in security all the time. Security teams say that breaches happen due to user errors because users &#8220;are dumb, not security-conscious, ignore policies, and can&#8217;t stop clicking on links,&#8221; instead of the system (overload, bad processes, etc.). On their part, company executives blame breaches on &#8220;bad security teams&#8221; instead of on systemic issues like chronic underinvestment, technical debt, complexity, and lack of automation.</p><h1>The cycle of firefighting creates a hero culture</h1><p>The fact that security teams are stuck in firefighting mode, and only relatively few are able to buy themselves time and space to prioritize strategic initiatives focused on working smarter, not harder, leads to serious consequences. Here&#8217;s what Nelson Repenning and John Sterman saw in their experience:</p><p><em>&#8220;As organizations grow more dependent on firefighting and working harder to solve problems caused by low process capability, they reward and promote those who, through heroic efforts, manage to save troubled projects or keep the line running. Consequently, most organizations reward last-minute problem solving over the learning, training, and improvement activities that prevent such crises in the first place. As an engineer at an auto company told us, &#8220;Nobody ever gets credit for fixing problems that never happened.&#8221; Over time, senior management will increasingly consist of these war heroes, who are likely to groom and favor other can-do people like themselves. As described by a project leader we interviewed, &#8220;Our [company] culture rewards the heroes. Frankly, that&#8217;s how I got where I&#8217;ve gotten. I&#8217;ve delivered programs under duress and difficult situations and the reward that comes with that is that you are recognized as someone that can deliver. Those are the opportunities for advancement.&#8221;</em></p><p>Reading this makes it clear that while security is certainly not the only place where people struggle to buy themselves time and space to work smarter, not just harder, it is surely a good example of this phenomenon.</p><p>Generally speaking, it is pretty rare to see security teams that are given enough power in their organization to implement preventative controls and prevent problems from happening. Prevention means friction, so it&#8217;s not only that &#8220;Nobody ever gets credit for fixing problems that never happened&#8221;, but it&#8217;s also that nobody can afford to introduce more friction.</p><p>Stuck in circumstances when they don&#8217;t have enough control, enough resources, and enough support, it&#8217;s no wonder that security professionals often fall victim to the so-called hero culture. It&#8217;s honestly hard to blame them: after all, most security people are trying to do their very best with the little support and resources they&#8217;ve got. If you are interested in learning more about hero culture and how it manifests itself in security, I recommend reading a piece Kymberlee Price and I published nearly 2 years ago, titled<a href="https://ventureinsecurity.net/p/hero-culture-in-cybersecurity-origins"> Hero culture in cybersecurity: origins, impact, and why we need to break the toxic cycle</a>. (Spoiler alert - it&#8217;s as relevant today as it was two years ago).</p><h1>Putting all this together</h1><p>One of Venture in Security&#8217;s readers, Michael A. Davis, once left a comment under one of my other articles where he explained the consequences of the topics I am discussing here better than I ever could. He said: <em>&#8220;What if this isn&#8217;t unique to cyber but is how ALL organizations handle prevent vs. react? I think the same dynamics appear in manufacturing (specifically quality control), healthcare (preventive medicine), and construction/infrastructure (the maintenance vs. repair cycle).</em></p><p><em>The pattern seems to be:</em></p><p><em>1. Organizations get trapped in firefighting mode because that&#8217;s what&#8217;s visible and rewarded.</em></p><p><em>2. First movers try to sell the organization that they should &#8220;work on tomorrow&#8217;s problems&#8221; to teams drowning in today&#8217;s crises and issues.</em></p><p><em>3. Only external forces like breaches or regulatory mandates create enough pain to break the cycle.</em></p><p><em>4. Second movers arrive just as the market tips from &#8220;theoretical risk&#8221; to &#8220;urgent need&#8221;.</em></p><p>This is a pretty good summary of what&#8217;s happening. The only thing that I would add is that while historically, preventative security products have had a harder time than those that are more detection and response (aka firefighting)-focused, in recent years, prevention is starting to get a good amount of traction. Not only are we seeing a new generation of companies emerge, including startups like<a href="https://bfore.ai/"> BforeAI</a>,<a href="https://www.aryon.security/"> Aryon</a>, and<a href="https://r6security.com/"> R6 Security</a>, but even Gartner seems to be putting forward the<a href="https://www.gartner.com/en/articles/preemptive-cybersecurity-solutions"> idea of &#8220;preemptive cybersecurity&#8221;</a>. Time will tell if we&#8217;ll be able to overcome the organizational inertia traditionally associated with preventative and preemptive security measures, but I think when many smart and stubborn people take a shot at something, it&#8217;s generally a good sign.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QDW4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QDW4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png 424w, https://substackcdn.com/image/fetch/$s_!QDW4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png 848w, https://substackcdn.com/image/fetch/$s_!QDW4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png 1272w, https://substackcdn.com/image/fetch/$s_!QDW4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QDW4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png" width="1360" height="766" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:766,&quot;width&quot;:1360,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QDW4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png 424w, https://substackcdn.com/image/fetch/$s_!QDW4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png 848w, https://substackcdn.com/image/fetch/$s_!QDW4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png 1272w, https://substackcdn.com/image/fetch/$s_!QDW4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F910f4bc5-ac37-4390-822e-1ae2e3ee2b6c_1360x766.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Source:<a href="https://www.gartner.com/en/articles/preemptive-cybersecurity-solutions"> Gartner</a></p><p>This isn&#8217;t all about getting a new Gartner category for preemptive security. I think it&#8217;s much more about giving security teams permission to prioritize working smarter, getting ahead of the issues, planning for the future, and finding time to pursue the large-scale initiatives every security team I know would like to find time and resources for. It&#8217;s about hygiene and a mindset of preventing issues from happening, much more than specific products or product categories. </p><h1>Looking into the future</h1><p>It&#8217;s been over 20 years since Nelson Repenning and John Sterman published their<a href="https://web.mit.edu/nelsonr/www/Repenning=Sterman_CMR_su01_.pdf"> article</a>, where they explained that nobody ever gets credit for fixing problems that never happened. They were talking about how businesses in general approach decision-making. While none of this was about security, our industry only amplifies the problems seen in other areas of business.</p><p>In the coming years, I hope that more security leaders will get the trust credit and political capital to advocate for prioritizing working smarter in their organizations. I see so many CISOs trying to do the right thing but running into internal obstacles that I have no choice but to be optimistic that things will get better. I am also hopeful that we will be seeing more startups coming up with ideas that reinvent old problems and find modern solutions, not merely automating and codifying the old, ineffective ways we have always been doing things. This is the same problem that Tomer Weingarten described as thinking incrementally in<a href="https://insidethenetwork.co/episodes/tomer-weingarten-from-cyber-outsider-to-building-sentinelone-into-a-1b-arr-category-leader"> our recent episode of Inside the Network</a>. We can all do better as an industry, and I do not doubt that we will.</p><div><hr></div><h5>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></h5><h5>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</h5><h5>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</h5><h5>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/nobody-ever-gets-credit-for-fixing?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/nobody-ever-gets-credit-for-fixing?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Venture in Security&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Venture in Security</span></a></p>]]></content:encoded></item><item><title><![CDATA[Not getting incentives right can kill a security initiative or a security startup]]></title><description><![CDATA[And it can make the lives of security teams really hard]]></description><link>https://ventureinsecurity.net/p/not-getting-incentives-right-can</link><guid isPermaLink="false">https://ventureinsecurity.net/p/not-getting-incentives-right-can</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 11 Nov 2025 18:30:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eWpP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I have been thinking about this topic for a while, and I am glad I have finally found the time to gather my thoughts into an article. I feel like it&#8217;s pretty rare to see people discuss incentives in cybersecurity (except for my friend <a href="https://www.linkedin.com/in/resilientcyber/">Chris Hughes</a>, who emphasizes this topic frequently in his blog and on LinkedIn). This is quite surprising given that everything in our industry centers around incentives. In this piece, I share some thoughts about this problem, discuss what I think are its most important aspects, and why more people should care.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.intruder.io/downloads/exposure-management-index?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|index">Intruder</a>.</em></p><p><strong><a href="https://www.intruder.io/downloads/exposure-management-index?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|index">As AI Enables Bad Actors, How Are 3,000+ Teams Responding?</a></strong></p><p>Shadow IT, supply chains, and cloud sprawl are expanding attack surfaces - and AI is helping attackers exploit weaknesses faster. Built on insights from 3,000+ organizations, <strong>Intruder&#8217;s 2025 Exposure Management Index</strong> reveals how defenders are adapting.</p><ul><li><p>High-severity vulns are up <strong>nearly 20%</strong> since 2024.</p></li><li><p><strong>Small teams fix faster</strong> than larger ones - but the <strong>gap&#8217;s closing</strong>.</p></li><li><p>Software companies lead, fixing criticals in just <strong>13 days</strong>.</p></li></ul><p>Get the full analysis and see where defenders stand in 2025.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.intruder.io/downloads/exposure-management-index?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|index&quot;,&quot;text&quot;:&quot;Download the Report&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.intruder.io/downloads/exposure-management-index?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|index"><span>Download the Report</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>Incentives define how different departments prioritize security</h1><p>If you read Verizon DBIR, CrowdStrike report, or any of the other credible, regularly produced reports about the root causes of breaches, or even if you simply follow the news, you&#8217;ll notice a consistent pattern:</p><ol><li><p>Most breaches aren&#8217;t caused by some novel technology like AI or blockchain, nor are they the result of mysterious, never seen before zero-days.</p></li><li><p>The vast majority of security problems are not really security problems; they are problems that originate in other types of organizations and introduce security risks.</p></li></ol><p>To put it differently, the vast majority of all the breaches happen because of some basic and boring problems. Someone forgot to change the password. Someone wasn&#8217;t able to track all the assets in a centralized system. Someone decided to grant a contractor more permissions than they needed, but forgot to revoke access when the contractor left. This list can go on and on, but the fact that matters here is that most of the time, what gets companies breached is something the security team can&#8217;t fix on their own. It is what my friend Yaron Levi calls &#8220;lack of operational discipline&#8221;.</p><p>None of this is rocket science, and anyone who has worked in security for over a year gets this. And yet, it still amazes me how often security professionals insist that things should be different, i.e., that engineers should care more about secure coding, that IT should prioritize access hygiene, that teams should think about security by default.  The question that usually gets lost is Why should they? Why should any of this be true if nobody in the organization is appropriately incentivized to think about security? There&#8217;s the adage saying that &#8220;What gets measured, gets done&#8221;. To put it more bluntly, people will do what they&#8217;re incentivized to do.</p><p>A simple way to understand incentives is by looking at 2 things: what gets people promoted, and what gets them fired. At the highest level, the answer to both these questions is tied to organizational goals and key performance indicators (KPIs). Software engineers and product teams are incentivized to ship fast. Anything that hurts their ability to achieve this objective (extra design reviews, extended testing, and yes, lengthy security reviews) - all of that becomes an obstacle to be avoided. IT teams live in ticketing systems and are incentivized to close as many tickets as possible as quickly as possible without making people annoyed. Every IT support request (grant access to X, enable Y, open a connection to Z) means that there is a person in an organization who is looking for something, and they want it to happen yesterday. Everything is urgent, everything is on fire, everything has been requested by the manager, and everything needs to happen without any delays. Unsurprisingly, IT is incentivized to close the ticket as soon as possible and to immediately move to another (also urgent) request.</p><p>Every department has its own KPIs, and guess what, there&#8217;s only one team that gets measured on risk reduction, so it&#8217;s no wonder that, within most organizations, the only executive truly incentivized to care about security is the CISO. Until secure behavior becomes a part of everyone&#8217;s performance reviews, alongside execution, teamwork, and communication skills, this is not going to change.</p><h1>Incentives define how different companies and industries prioritize security</h1><p>The problem of incentives is even more apparent once we look outside of individual security teams and at the industry at large.</p><p>Every now and then, the whole industry gets excited about some new grand idea. Several years ago, it was about SBOMs, and as recently as a few months ago, it was about signing the<a href="https://www.cisa.gov/securebydesign/pledge/secure-design-pledge-signers"> Secure by Design Pledge by CISA</a> (there are now 328 companies that have signed it). Obviously, I think Secure by Design Pledge is a good initiative; after all, it raises awareness that it&#8217;s important to think about security ahead of time, or as they say, designing security instead of bolting on security later. At the same time, thinking that an initiative like this is going to lead to any real consequences means not understanding how incentives work. To be clear, this has nothing to do with CISA or any of its programming; the problem is, once again, incentives.</p><p>I&#8217;ve talked about this before. When a company is just starting, it&#8217;s generally a few people in a garage, so all focus is on figuring out what to build and what direction to pursue. Obviously, thinking about security at this stage would be ridiculous: when the chances are 90-99% or higher that the whole venture will fail within a few months, the biggest risk isn&#8217;t a security breach, it&#8217;s not finding the right entry point. Let&#8217;s say the founders got this right and they were able to survive. From this point onward, the pressure only increases. The next challenge is getting to product-market fit (most startups never get there, so prioritizing it is paramount to company success). When the company has a product and zero customers, the number one priority isn&#8217;t to make the product secure; it is to get that first customer. Then the second, then the third, and on and on until the few lucky startups that get to survive and get to the growth stage are fully focused on growth. At no point in the company journey is security the number one priority.</p><p>Secure by design sounds great because, in theory, every company should indeed be making sure that its products are secure by design. In practice, security often slows business down, and in a world that prioritizes speed and execution over anything else, putting security first is never going to be easy. This is how, once again, incentives kill security, not just on the company level but also on the industry level.</p><h1>Not getting incentives right can kill a security startup</h1><p>For security leaders and practitioners, understanding how incentives work in our industry can help increase the success of security initiatives. After all, when security initiatives fail, it&#8217;s rarely because the tech isn&#8217;t there or because CISOs haven&#8217;t tried hard enough. Most security initiatives that fail fail because of misaligned incentives. A good example is the &#8220;shift left&#8221; movement, which failed because developers were never incentivized to own security. No security champions program can make developers prioritize security over velocity when they get promoted for the latter, not the former.</p><p>For cybersecurity startup founders, misunderstanding incentives can be the difference between building a successful company and a company that fails to get adoption. Many startups fail because they assume that different departments inside the company will care more about security than they actually do. This is especially the case for large enterprises that most security startups go after to begin with. The larger the company, the less likely it is that IT, infrastructure, or engineering will ever pay for, or be excited to implement a product, the primary value proposition of which is security. I have previously explained that<a href="https://ventureinsecurity.net/p/to-solve-security-problems-you-dont"> to solve security problems, you don&#8217;t have to build a security company</a>, and that the only way IT and engineering teams will buy a security product is if that product offers security as a byproduct of a different value prop they do actually care about.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eWpP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eWpP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!eWpP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!eWpP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!eWpP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eWpP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eWpP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png 424w, https://substackcdn.com/image/fetch/$s_!eWpP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png 848w, https://substackcdn.com/image/fetch/$s_!eWpP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png 1272w, https://substackcdn.com/image/fetch/$s_!eWpP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e11e33-fe22-4feb-8acf-7ff590010a62_1456x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image source:<a href="https://ventureinsecurity.net/p/to-solve-security-problems-you-dont"> Venture in Security</a></p><p>It&#8217;s not enough to understand organizational incentives and how different teams fit into the picture. I&#8217;ve also met founders trying to pursue large, ecosystem-level initiatives that also run into challenges with incentives. Every once in a while, someone with a great vision puts forward an idea of sharing threat intel or collaborating on detection data, only to learn that there are misaligned legal incentives (companies don&#8217;t want to expose breaches, spend time sharing data, or are afraid of accidentally sharing something that can be traced back to them). Many visionary ideas were killed by the realities of how legal liability, insurance, and other concerns make companies behave. What sounds like an obvious idea at a BSides talk oftentimes is simply not possible because of how the incentives work.</p><h1>Looking into the future</h1><p>Those who know me on a personal level can tell you that I am an optimist (and it&#8217;s not just because<a href="https://ventureinsecurity.net/p/cyber-optimist-manifesto-why-we-have"> I wrote a manifesto of a security optimist</a>). And yet, even I am struggling to see how, without radically shifting incentives, we can change the way security works. A lot needs to be done there, both on the organizational and industry levels. Some things generally evolve on their own, but incentives rarely do until something major happens.</p><p>I don&#8217;t think I have a good perspective on what can be done to change the way companies and society as a whole treat security. All I can hope is that the work we do as startups will make a small dent and help companies that care to improve their security.</p><div><hr></div><h5>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></h5><h5>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</h5><h5>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</h5><h5>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Venture in Security&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Venture in Security</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/not-getting-incentives-right-can?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/not-getting-incentives-right-can?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Behind every successful security company is a software engineer you’ve never heard of]]></title><description><![CDATA[Software engineers are building the future of security, not just adding vulnerabilities]]></description><link>https://ventureinsecurity.net/p/behind-every-successful-security</link><guid isPermaLink="false">https://ventureinsecurity.net/p/behind-every-successful-security</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 04 Nov 2025 17:18:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hpva!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the past several months, as everyone everywhere seems to predict that software engineering will soon be done entirely by AI, I&#8217;ve been noticing things that suggest a very different story: that AI makes great software engineers more, not less, important. I can go as far as to say that for a startup, attracting great software engineers is much more important than having a great idea. It&#8217;s ultimately the talent that will define if the company succeeds or fails, and nowhere is it more true than in cyber.</p><p>What most in the industry don&#8217;t realize is that behind every successful security company is a software engineer you&#8217;ve never heard of. Palo Alto, Zscaler, CrowdStrike, Cloudflare - all these and most other security companies have people who envisioned, architected, and built their platforms without becoming widely known, and even without holding the CTO title. In this piece, I am sharing some of their stories. </p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.intruder.io/downloads/exposure-management-index?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|index">Intruder</a>. </em></p><p><strong><a href="https://www.intruder.io/downloads/exposure-management-index?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|index">As AI Enables Bad Actors, How Are 3,000+ Teams Responding?</a></strong></p><p>Shadow IT, supply chains, and cloud sprawl are expanding attack surfaces - and AI is helping attackers exploit weaknesses faster. Built on insights from 3,000+ organizations, <strong>Intruder&#8217;s 2025 Exposure Management Index</strong> reveals how defenders are adapting.</p><ul><li><p>High-severity vulns are up <strong>nearly 20%</strong> since 2024.</p></li><li><p><strong>Small teams fix faster</strong> than larger ones - but the <strong>gap&#8217;s closing</strong>.</p></li><li><p>Software companies lead, fixing criticals in just <strong>13 days</strong>.</p></li></ul><p>Get the full analysis and see where defenders stand in 2025.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.intruder.io/downloads/exposure-management-index?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|index&quot;,&quot;text&quot;:&quot;Download the Report&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.intruder.io/downloads/exposure-management-index?utm_source=ventureinsecurity&amp;utm_medium=p_referral&amp;utm_campaign=global|fixed|index"><span>Download the Report</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>Software engineers turn a vision for security into a reality</h1><p>I am well aware that when security professionals hear that software engineers are going to be defining the future of security, they quickly tune out, thinking, &#8220;Well, this idea hasn&#8217;t worked well for us in the past&#8221;. The whole &#8220;shift left&#8221; movement has failed everywhere except for the world&#8217;s most mature and tech-forward companies (and even there, the reality is rarely as awesome as BSides talks suggest). The idea that software engineers are going to get excited about doing security work has proven to be, at best, overly optimistic and, at worst, a somewhat delusional fantasy.</p><p>I am not here to argue that this is about to change. Instead, I want to talk about something else: the role software engineers play in defining the very direction of the security industry itself. In all these conversations about &#8220;developers using AI to generate vulnerable code&#8221;, what often gets missed is that the very same software engineers are also the ones building the solutions that define how security gets done.</p><p>If you agree that companies like CrowdStrike, Palo Alto, Wiz, and Zscaler have done a decent job solving real enterprise problems, then you have to also acknowledge that the vast majority of these companies weren&#8217;t built by a bunch of security engineers. Now, I know there will always be people eager to comment that security vendors aren&#8217;t truly making any difference, but that&#8217;s not the point I&#8217;m making here, and I think we can agree that uninstalling antivirus software and replacing password managers with a single password won&#8217;t make us more secure. While founders and CEOs often get the credit for the vision and execution, not nearly enough is said about the engineers who turn that vision into reality. That is to me what matters, and that&#8217;s what I want to focus on.</p><h1>Technical visionaries behind top security companies often remain unknown</h1><p>What I find really interesting is that the majority of the brilliant minds behind the world&#8217;s largest security companies remain unknown. How many people know Yuming Mao, Chief Architect and one of the co-founders of Palo Alto Networks? He served as Chief Architect and a Distinguished Engineer at Juniper Networks, which he joined through the acquisition of NetScreen, but I was barely able to find one picture of him on the internet. How many people know Fengmin Gong, who worked with Nir and Yuming and led the conception, architecture design, and implementation of the appID/threat engines in the next-gen app-aware firewall? It&#8217;s fascinating how big a role brilliant Chinese engineers played in the early days of Palo Alto, yet history has largely lost their names.</p><p>Similarly, most of the people in security have never heard of Alex Ionescu, a brilliant technical powerhouse who served as CrowdStrike&#8217;s founding Chief Architect and Vice President of Endpoint Engineering. Early employees of CrowdStrike will tell you that there would be no Falcon as we know it without Alex Ionescu, but he doesn&#8217;t often talk about his story. Having left CrowdStrike in 2021, Alex came back in early 2025, which is most likely not a coincidence given what the company had been through a few months before he rejoined.</p><p>Another software engineering powerhouse behind one of the most valuable security companies in the world is Zscaler co-founder Kailash Kailash. In the case of Kailash, there&#8217;s actually quite a bit of information about him online, as Jay, Zscaler co-founder &amp; CEO, always credits him with all the technological brilliance. Here is how Kailash himself<a href="https://www.zscaler.com/blogs/company-news/celebrating-15-years-innovation"> talks</a> about the origins of Zscaler, which was formerly known as SafeChannel: &#8220;It was during dinner at Jay&#8217;s house when he first proposed the idea of a cloud security platform. After we spoke, I was so convinced that this is the future, but the problem wasn&#8217;t easy to solve from a technology standpoint, and it hadn&#8217;t been done. After four months of development, discussion, and lots of trial and error, it seemed that we had a viable solution.&#8221;</p><p>The truly tragic story that few people in the industry know is what happened to the brilliant technologist behind Cloudflare. While today most know Matthew Prince (CEO) and Michelle Zatlyn (President), three people started Cloudflare. Lee Holloway, Cloudflare&#8217;s third co-founder and the technical genius who architected the platform and recruited and led the company&#8217;s early technical team, stepped down from Cloudflare in 2015, suffering a truly tragic form of dementia when he was only 36 years old.<a href="https://www.wired.com/story/lee-holloway-devastating-decline-brilliant-young-coder/"> Wired</a> discussed this story (there&#8217;s also<a href="https://www.youtube.com/watch?v=kFUFZS3M6Nw"> this</a> 2-minute video), but given how tragic it truly is, it is not surprising that there is no good place to talk about it.</p><p>All these stories are just examples that illustrate the core point of this piece: that every great security company was built by incredible engineers. In some cases, the main founder and CEO is that engineer, but in the majority of cases, they are not. Even if we don&#8217;t always know the names of technical geniuses behind each platform, there is always someone, and it&#8217;s usually a team, not a single person.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hpva!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hpva!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!hpva!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!hpva!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!hpva!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hpva!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hpva!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!hpva!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!hpva!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!hpva!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbfcfcf1-6a8b-4a41-9fcc-c1a05a6f254a_1600x1066.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Israel wins in part because of its pool of software engineers who know security</h1><p>There are many reasons why the Israeli security ecosystem has exploded in the past number of years - the continuous pipeline of great security talent, the culture of risk-taking, and the presence of value-add capital. All that is true. However, I think a large part of Israel&#8217;s success is its large pool of software engineers who understand security.</p><p>The United States arguably has much more security talent than Israel, which makes sense given the population. However, there are relatively few software engineers who combine 3 attributes:</p><ul><li><p>Having a background in software engineering and experience building customer-facing products</p></li><li><p>Having experience, understanding, or passion for security</p></li><li><p>Having experience working at a startup or otherwise shipping products 0 to 1</p></li></ul><p>Each of these attributes matters.</p><p>In the US, there are plenty of security engineers, and while many are great at writing automation scripts, connecting different tools, or even building some internal tools, the majority of them don&#8217;t have experience building products. But building products is a different discipline altogether because it requires thinking in terms of systems, scale, and user experience, not just functionality. Product engineering means understanding how to design for reliability, performance, onboarding, and long-term maintenance. It&#8217;s about solving a problem, not just once for your team, but for thousands of organizations with different architectures, constraints, and use cases. Product building demands a blend of creativity and rigor that extends beyond security expertise. It&#8217;s one thing to secure an environment; it&#8217;s another to build the platform others will depend on to secure theirs. This is why every successful security company has needed great product engineers alongside security domain experts (domain experts make sure that the product solves the right problem, and software engineers translate that domain knowledge into tools that scale).</p><p>At a startup, people need to be able to cut corners and to know which corners to cut. It&#8217;s a compromise between designing for scale, but also shipping something quickly, because without quick iteration, that scale will most likely never come. This is why startup experience also matters a lot. Many great software engineers who understand security in the US work at large enterprises like Microsoft, Google, AWS, Cisco, or even agencies like the NSA, but what makes an engineer successful working at Cisco is very different from what makes an engineer great at building products at a startup. Let me be clear: a person who has worked at any of the big companies can be a great fit for a startup, but someone who has only worked at big companies for a decade or longer is less likely to successfully adapt.</p><p>Lastly, either expertise or passion for security matters a lot as well. Sure, security is just another domain, and the vast majority of engineers are domain-agnostic. That is true, but security does require people to go a bit deeper, and if an engineer has absolutely zero interest in immersing themselves in that depth, they&#8217;re less likely to be successful.</p><p>Israel has created a fantastic pipeline of software engineers with experience working at startups and a strong passion for security. That&#8217;s one of their secrets, and to replicate their success, we have to replicate that.</p><h1>Closing thoughts</h1><p>I am sure I am biased. As an early-stage founder, hiring great engineers has been my main focus lately, so I&#8217;ve spent a lot of time thinking about what &#8220;great engineering&#8221; even means in the age of AI. While I read about companies trying to replace engineers with AI agents, my co-founder and I have been doubling down on the opposite bet: that the real breakthroughs will come not from AI itself, but from the best engineers who know how to use AI to get even better. It&#8217;s really bizarre to me that this is a contrarian idea in 2025, but there we are.</p><p>For people in the security industry (CISOs, security engineers, etc.), my message is simple: recognize that software developers aren&#8217;t just introducing vulnerabilities, they&#8217;re very much building the future of our industry, just as they&#8217;ve done in the past. Every breakthrough in cyber, be it endpoint or cloud security, has been built through the hands of software engineers who took ambitious visions and translated them into working products.</p><p>For founders, the lesson is also pretty clear: think of AI as a tool for engineers, not as a replacement. Hire great engineers and give them what they need to do their best work - autonomy, support, recognition, and an environment surrounded by other brilliant minds. Sure, give them the latest AI tools, but equally (or I&#8217;d argue even more) important, create room for real ownership, and make sure their impact is visible and rewarded.</p><p>Lastly, if you&#8217;re an engineer passionate or curious about security, or someone who wants to work on hard, foundational problems that matter, I&#8217;d love to connect. Not only because I&#8217;m hiring, but also because I know many other founders looking for great builders.</p><div><hr></div><h5>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></h5><h5>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</h5><h5>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</h5><h5>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Venture in Security&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Venture in Security</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/behind-every-successful-security?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/behind-every-successful-security?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[AI doesn’t make it much easier to build security startups]]></title><description><![CDATA[A somehow contrarian take on how AI impacts the ability to build security companies]]></description><link>https://ventureinsecurity.net/p/ai-doesnt-make-it-much-easier-to</link><guid isPermaLink="false">https://ventureinsecurity.net/p/ai-doesnt-make-it-much-easier-to</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 28 Oct 2025 16:05:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!A3dI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There are many discussions about how AI is changing the way the cybersecurity industry operates, and I am certainly the last person to argue with this thought. At the same time, I have developed the perspective that for startups, it doesn&#8217;t change the game as much as many assume it does. Before I lose you completely, let me explain.</p><p>For this conversation to make sense, I think we need to separate two lines of thought: what AI enables for customers, and what AI solves for startups. These are two very different conversations, and while I want to focus the article on the latter, it won&#8217;t fully make sense if I don&#8217;t briefly address the former.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.harmonic.security/harmonic-mcp-gateway-early-access?utm_source=vis&amp;utm_medium=email&amp;utm_campaign=mcpoct25">Harmonic Security</a>. </em></p><p><strong><a href="https://www.harmonic.security/harmonic-mcp-gateway-early-access?utm_source=vis&amp;utm_medium=email&amp;utm_campaign=mcpoct25">Early Access Open: MCP Gateway with Intelligent Data Controls</a></strong></p><p>Agentic AI is moving fast and most teams have no visibility into what&#8217;s actually happening.</p><p>Harmonic&#8217;s MCP Gateway changes that.</p><p>It&#8217;s a lightweight, developer-friendly gateway that gives security teams visibility into MCP usage and the ability to set real controls, blocking risky clients or data flows before something slips through.</p><p>We&#8217;re opening early access to a limited number of forward-leaning security teams. Request early access for your team here:</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.harmonic.security/harmonic-mcp-gateway-early-access?utm_source=vis&amp;utm_medium=email&amp;utm_campaign=mcpoct25&quot;,&quot;text&quot;:&quot;Request Early Access&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.harmonic.security/harmonic-mcp-gateway-early-access?utm_source=vis&amp;utm_medium=email&amp;utm_campaign=mcpoct25"><span>Request Early Access</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>For customers, AI is transforming how security is done</h1><p>Over the past year, it has become clear to me that AI is already transforming how security is done. Now, this is not because LLMs are perfect at detection, or that AI has no gaps (they aren&#8217;t, and it does). A much more important reason why I am bullish on the opportunities this wave of AI unlocks is simple. Well over 90% (and some people would even say 95-97%) of security teams&#8217; day-to-day is not some advanced incident response or dealing with nation-states. Most of the security teams&#8217; work has nothing to do with chasing advanced adversaries. Much more than that, it&#8217;s boring, mundane stuff like:</p><ul><li><p>Updating reports and dashboards for leadership</p></li><li><p>Collecting screenshots and evidence for audits</p></li><li><p>Responding to repetitive access and compliance requests</p></li><li><p>Reconciling data across tools and systems</p></li><li><p>Investigating low-priority alerts that never amount to much</p></li><li><p>Documenting findings and closing out endless tickets</p></li></ul><p>I previously wrote a dedicated deep dive about this if you are interested in reading more:<a href="https://ventureinsecurity.net/p/most-of-the-security-teams-work-has"> Most of the security teams&#8217; work has nothing to do with chasing advanced adversaries</a>.</p><p>The main point here is that all this manual stuff is exactly the kind of work that lends itself to automation opportunities, and where AI agents can make a lot of difference. As an industry, I think we should be excited to use AI to streamline or eliminate the time-consuming but necessary work, and buy ourselves time to focus on the high-value work that we simply can&#8217;t get to. This is what scaling security teams means and I am very optimistic about the opportunities this creates, for both enterprises and startups. </p><h1>The impact of AI for security startups is trickier to evaluate</h1><p>When it comes to what AI enables for security startups, my opinion diverges from a lot of the stuff I read online. I&#8217;ve seen some people suggest that AI makes it possible to quickly validate demand, to radically shorten time to market, and even to avoid having to hire senior engineering talent. Some even think that enterprises will replace all of their expensive SaaS subscriptions with homegrown agentic solutions. I don&#8217;t quite agree with either of these statements.</p><h3><strong>AI doesn&#8217;t really make it significantly easier to validate demand in security</strong></h3><p>I am a huge fan of AI prototyping tools (<a href="https://v0.app/">V0</a> is one of my favorites, but if you have suggestions for even better ones, I&#8217;d love to hear them). Prototyping makes it possible to iterate on designs in minutes and to generate good enough working prototypes for testing with prospects. They are fantastic. So why do I then say that AI doesn&#8217;t really make it significantly easier to validate demand in security? The answer is pretty basic: because getting feedback about prototypes is pretty far from real demand validation.</p><p>I recently wrote an article titled<a href="https://ventureinsecurity.net/p/the-real-dilemmas-of-cybersecurity"> The real dilemmas of cybersecurity startup ideation, discovery, and validation</a> where I expanded on some thoughts shared online by Stephen Ward and referenced an amazing illustration of the ideation journey he shared on LinkedIn.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3DxD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3DxD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png 424w, https://substackcdn.com/image/fetch/$s_!3DxD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png 848w, https://substackcdn.com/image/fetch/$s_!3DxD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png 1272w, https://substackcdn.com/image/fetch/$s_!3DxD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3DxD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png" width="1456" height="660" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:660,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3DxD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png 424w, https://substackcdn.com/image/fetch/$s_!3DxD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png 848w, https://substackcdn.com/image/fetch/$s_!3DxD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png 1272w, https://substackcdn.com/image/fetch/$s_!3DxD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500c59ac-49a3-4924-995d-bbccc83129ac_1456x660.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image source:<a href="https://www.linkedin.com/feed/update/urn:li:activity:7350515781765398528/"> Stephen Ward</a></p><p>What I am talking about here is different. It is more about the fact that real validation in B2B only really comes when someone is writing a check. Ideally you want this someone to not have any incentives to be doing this, aside from wanting to solve a painful problem at their company.</p><p>People will always be willing to share their perspectives, and having a visual illustration of an idea is very, very important. AI prototyping tools can help gather feedback, learn about the problem, and even plan what capabilities should be prioritized first based on user feedback. The one thing prototypes do a poor job at is validating that someone is going to pay real money (based on my observations, anyway).</p><h3><strong>AI doesn&#8217;t significantly expedite go-to-market in security</strong></h3><p>I have heard many people in the industry say things like &#8220;Now that I can ship new features much faster, I can scale with 3x-10x speed&#8221;. In other markets - looks like it, in consumer space - for sure, but in security, not so much.</p><p>It is true that founders can now ship new features faster, but the biggest obstacle to fast growth in security has never been the speed of shipping new features. The number one obstacle security founders have to grapple with is years-long sales cycles, and that isn&#8217;t changing anytime soon.</p><p>Andrew Peterson of Aviso Ventures, and formerly founder &amp; CEO of Signal Sciences, put it really, really well in<a href="https://www.linkedin.com/posts/andrewmarshallpeterson_ai-is-changing-how-fast-you-can-build-products-activity-7335473079093010432-NGFx?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABd70ggBHphNqkAOu3BA8zLOqO0H8zsPWZc"> his post on LinkedIn</a>: &#8220;AI is changing how fast you can build products and features but it isn&#8217;t changing how slow sales cycles are in security. This will continue to hamper the speed of growth in infosec despite the increased speed to build features.</p><p>You might think the costs of the products could go down a ton and drive speed of adoption but the price of security products have almost always been driven by sales and marketing costs, not dev costs or gross margins (that tend to be legendarily good in security).</p><p>Until we see sales cycles improve for security, we&#8217;re gonna be stuck with slow adoption curves for the time being. How I&#8217;d expect to see this change is a longer convo but short version is I don&#8217;t. Mainly because security relies on eng for install of meaningful controls and they&#8217;re rarely a priority (despite being easier and easier to actually implement).</p><p>All this said the growth of security start ups have always been strong and I predict will continue to be cause of constant new opportunities and innovation. I just don&#8217;t predict the growth to accelerate cause of AI despite expecting this in other sectors.&#8221;</p><p>I don&#8217;t think I can add much to this rather perfect summary of what I&#8217;ve also been seeing. If a feature that could take 9 months to ship now takes 6 months, that&#8217;s a dramatic improvement (30% shorter). But if the same feature takes a year to sell, then suddenly the math is different. What would usually take 1 year 9 months from concept to first paying customer can now take 1 year 6 months. In reality, it can be even longer because security teams afraid of risks introduced by AI-generated code are likely to extend their evaluation periods and ask to see more architectural diagrams and so on. We may cut time on writing software, but if the sales cycles remain the same or even become longer, we aren&#8217;t going to see radical differences in GTM speed.</p><h3><strong>AI doesn&#8217;t make it possible to avoid hiring senior engineering talent</strong></h3><p>Then there&#8217;s the question about talent. I&#8217;ve heard from several people that with tools like Claude Code, companies can hire fewer senior engineers and instead startups can attract young and hungry talent eager to use new tools. As someone smart once said, in theory, there is no difference between theory and practice, but in practice, there is. This very much applies when it comes to developers and AI-generated code.</p><p>My thought process is simple: from first principles, not much has changed, and most likely, not much will:</p><ol><li><p>People who are hungry to learn and grow and do new things, but who don&#8217;t have solid experience, will, over time, outperform those who have experience but are much less motivated to learn and grow. This was the case before AI, and there will be no changes with AI. AI will only amplify the difference between motivated and non-motivated engineers. It&#8217;s 2025 and any software engineer that &#8220;didn&#8217;t have the time&#8221; to get started with AI coding assistants yet is probably on their way out of the industry.</p></li><li><p>People humble enough to admit they don&#8217;t have all the answers and smart enough to always look for shortcuts will, over time, outperform those who have more answers but feel like looking for shortcuts hurts their ego or makes them lesser. This was true before AI, when some devs were just &#8220;too good&#8221; to go to Stack Overflow or to just ask their colleagues for help and would waste hours trying to do things themselves. AI just makes the difference between two kinds of engineers more stark.</p></li><li><p>People who embrace new tech and new ways of working will always outperform those who don&#8217;t. There were plenty of developers who were against cloud, against agile, against shipping in smaller increments, against shipping continuously, etc. History has proven them all wrong big time. I don&#8217;t think it will be any different with AI: developers who don&#8217;t embrace it will go the same way as those who didn&#8217;t want to embrace the cloud.</p></li><li><p>Experience will continue to matter when it comes to building for scale and building for deterministic precision. It&#8217;s one thing to build a service, and it&#8217;s another thing to build a service that will perform at enterprise scale.</p></li><li><p>Domain expertise will continue to matter even more in a world where people think they can just AI their way into areas they don&#8217;t know anything about.</p></li></ol><p>Companies that hire a bunch of engineers and ask them to use Claude to generate code without establishing real guardrails to make sure the quality of that code is solid will drown in technical debt before they close their first paying customer. In my opinion, senior engineers without AI tools are simply too slow and too expensive; junior engineers with no experience but drive and AI coding tools are likely to break too many things and create mountains of tech debt. The best answer is to hire great engineers and to give them all the latest and greatest tools. This does, however, mean that attracting amazing talent is as critical today as it was before (or arguably even more!).</p><p>Another interesting thing people miss is that AI is making building software harder, not easier. Mrinal Wadhwa<a href="https://www.linkedin.com/posts/mrinalwadhwa_counterintuitively-building-software-is-activity-7385350056087838720-obK_/"> articulated</a> that thought several weeks ago: &#8220;Most software, until now, was focused on forms. Most software engineers spent their careers building 3-tier web apps. Products with agents, in contrast, are stochastic; each request has a long lifecycle; communication happens over bi-directional streams of messages; state is distributed across agents; etc. This is harder engineering. Sure, generating code has gotten easier, but to build reliable products that scale and are secure we now need much more complex architectures.&#8221; I recommend listening to this short 7-minute snippet because it offers a good perspective as to why strong engineering talent is even more critical today compared to several years ago.</p><h3><strong>AI isn&#8217;t going to kill security products anytime soon</strong></h3><p>Over the past several months, I have heard some people say, &#8220;I can now vibe code most of the security products over the weekend&#8221;, predicting that the wave of vibe coding will lead enterprises to stop buying SaaS. In my opinion, this could not be further away from the truth.</p><p>People who believe enterprises buy software only because they can&#8217;t build it in-house fundamentally misunderstand how large organizations operate. Open source has been around for decades, so why do enterprises still spend millions on freely available software? Because at their scale, the real cost isn&#8217;t in per-seat licenses; it&#8217;s in maintenance, reliability, and support.</p><p>Once a company reaches 5,000 employees (and definitely beyond 25,000), it needs scalable systems of ownership, maintenance, and accountability. If everyone just vibe coded their own tools and moved on, the whole structure would collapse. Every large enterprise already has a few internal tools whose creators have left (or even passed away), leaving behind fragile systems no one is brave enough to touch. That&#8217;s exactly why they choose to buy, not build, and that&#8217;s why they are so careful about throwing AI at problems.</p><p>Another aspect of security is that it is all about depth. Sure, anyone can vibe code some high-level basic system that will ingest cloud configs and output some findings. That is indeed very easy. However, to make it work for enterprise scale, enterprise complexity, and enterprise environments, for that, no vibe coding will be enough. More critically, to identify risks in complex systems, security products have to be five inches wide and 10 feet deep, and that depth is something that comes from human expertise, research, and clear focus, not from telling Claude to write some &#8220;cloud detection logic&#8221;.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A3dI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A3dI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!A3dI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!A3dI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!A3dI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A3dI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:129998,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ventureinsecurity.net/i/177382330?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!A3dI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png 424w, https://substackcdn.com/image/fetch/$s_!A3dI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png 848w, https://substackcdn.com/image/fetch/$s_!A3dI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png 1272w, https://substackcdn.com/image/fetch/$s_!A3dI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73cce07-ea83-4711-832d-0164ea4a1ad9_2000x1333.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Closing thoughts: for startups, AI is a great amplifier, but it&#8217;s not a compensator</h1><p>There are many discussions about how AI makes it drastically easier to build startups. It may be the case in other industries and market segments, but I don&#8217;t think it&#8217;s true for security. Let me be clear and reiterate that AI does enable startups to solve problems that were fundamentally unsolvable before. In addition, it amplifies a lot of the security problems our industry has been trying to solve (data security, SaaS security, third-party risk management, etc.). All this creates new possibilities, new problems, and therefore new markets and new opportunities.</p><p>However, what AI doesn&#8217;t do in my view is change how security companies are built. It does make some things like prototyping easier, but it doesn&#8217;t make a bad idea a good one, and it doesn&#8217;t make &#8220;this looks good&#8221; a real validation. AI makes great developers even more productive than before, but it doesn&#8217;t turn a junior developer into a senior, or an unmotivated developer into a 10x high-performing engineer. In other words, AI is a great amplifier, but it&#8217;s not a compensator.</p><p>Most importantly, AI doesn&#8217;t really change the fundamentals:</p><ul><li><p>That security is about trust, and unpredictability of AI only increases the bar for developing trust.</p></li><li><p>That enterprise sales are about navigating people and complexity, and AI does little to reduce that complexity.</p></li><li><p>That building great products requires depth and expertise, and you cannot win by relying on what is literally the average of human knowledge.</p></li></ul><p>Fundamentals for building a successful company don&#8217;t really change: a large market, a strong team, and ten million decisions that have to be made right, with the hope that the wrong decisions will be insignificant enough to matter.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!svgN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!svgN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png 424w, https://substackcdn.com/image/fetch/$s_!svgN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png 848w, https://substackcdn.com/image/fetch/$s_!svgN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png 1272w, https://substackcdn.com/image/fetch/$s_!svgN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!svgN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png" width="1456" height="928" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:928,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!svgN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png 424w, https://substackcdn.com/image/fetch/$s_!svgN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png 848w, https://substackcdn.com/image/fetch/$s_!svgN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png 1272w, https://substackcdn.com/image/fetch/$s_!svgN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F601119fb-23e6-4ed0-ab41-c905c37d1f17_1456x928.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h5>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></h5><h5>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</h5><h5>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</h5><h5>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Venture in Security&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Venture in Security</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/ai-doesnt-make-it-much-easier-to?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/ai-doesnt-make-it-much-easier-to?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Redefining “critical infrastructure” for the modern age]]></title><description><![CDATA[Why it&#8217;s not just power grid and water, but also tools like Stripe and Twilio that should be defined as critical infrastructure]]></description><link>https://ventureinsecurity.net/p/redefining-critical-infrastructure</link><guid isPermaLink="false">https://ventureinsecurity.net/p/redefining-critical-infrastructure</guid><dc:creator><![CDATA[Ross Haleliuk]]></dc:creator><pubDate>Tue, 21 Oct 2025 16:59:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_myp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If there is one thing regular readers of my blog have probably realized, it is that I rarely talk about the &#8220;hot&#8221; events. It is not that I don&#8217;t care what&#8217;s happening in the world (quite the opposite), or that I don&#8217;t think the news matters (they do). Instead, I prefer to discuss topics that are evergreen, meaning they remain relevant beyond the news cycle. A part of that is just me not having the time to keep up with everything and be up to speed on everything that would make me feel that I have an informed perspective. Another reason is that it&#8217;s pretty hard to offer something of value when your voice has to fight a lot of noise to be heard. However, equally importantly, I want Venture in Security to be relevant weeks and months following the newest, the hottest story, and a way to do it is to talk about problems that endure the booms and busts of social media excitement.</p><p>I am saying all this as a preface to the fact that this article is going to be different. Today, I am diving headfirst into the topic of the day, namely the AWS outage. Yet, even here, I&#8217;ll be doing it mostly my way.</p><div><hr></div><p><em>This issue is <a href="https://ventureinsecurity.net/p/sponsor">brought</a> to you by&#8230; <a href="https://www.dropzone.ai/ai-soc-benchmark-study?utm_campaign=25817487-%5BDigital%20Sponsorship%5D%20Ross%20Haleliuk%2010-21-25&amp;utm_source=sponsorship&amp;utm_medium=newsletter&amp;utm_content=CSA%20Benchmark%20Study">Dropzone AI</a>.</em></p><p><strong><a href="https://www.dropzone.ai/ai-soc-benchmark-study?utm_campaign=25817487-%5BDigital%20Sponsorship%5D%20Ross%20Haleliuk%2010-21-25&amp;utm_source=sponsorship&amp;utm_medium=newsletter&amp;utm_content=CSA%20Benchmark%20Study">Most AI SOC Tools Are Still Unproven. This Study Actually Measured Them.</a></strong></p><p>Your board wants proof that AI delivers on security operations, not vendor promises. The Cloud Security Alliance independently tested 148 real SOC analysts investigating actual alerts with and without AI assistance. No sales pitch, no cherry-picked results.</p><p>The findings? AI-assisted teams completed investigations 45-61% faster with 22-29% higher accuracy. Even skeptical analysts became advocates after hands-on use. More importantly, CSA maintained complete control over methodology and results, making this the independent validation your stakeholders actually trust.</p><p>If you&#8217;re evaluating AI for your SOC or need data that survives board scrutiny,<a href="https://www.dropzone.ai/ai-soc-benchmark-study"> </a><a href="https://www.dropzone.ai/ai-soc-benchmark-study?utm_campaign=25817487-%5BDigital%20Sponsorship%5D%20Ross%20Haleliuk%2010-21-25&amp;utm_source=sponsorship&amp;utm_medium=newsletter&amp;utm_content=CSA%20Benchmark%20Study">get the full CSA benchmark study here.</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.dropzone.ai/ai-soc-benchmark-study?utm_campaign=25817487-%5BDigital%20Sponsorship%5D%20Ross%20Haleliuk%2010-21-25&amp;utm_source=sponsorship&amp;utm_medium=newsletter&amp;utm_content=CSA%20Benchmark%20Study&quot;,&quot;text&quot;:&quot;Get the CSA Study&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.dropzone.ai/ai-soc-benchmark-study?utm_campaign=25817487-%5BDigital%20Sponsorship%5D%20Ross%20Haleliuk%2010-21-25&amp;utm_source=sponsorship&amp;utm_medium=newsletter&amp;utm_content=CSA%20Benchmark%20Study"><span>Get the CSA Study</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Welcome to Venture in Security! Before we begin, do me a favor and make sure you hit the &#8220;Subscribe&#8221; button. Subscriptions let me know that you care and keep me motivated to write more. Thanks folks!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>The news about the AWS outage is not really about the AWS outage</h1><p>Now I need to clarify something here: I am not actually going to be talking about the AWS outage. There are so many people talking about the ins and outs and reasons and outcomes and whatnot that having one more voice would not add any value. Instead of talking about AWS, I think it&#8217;s worth talking about the problem at hand in the broadest possible way.</p><p>It doesn&#8217;t take long to draw parallels between the AWS outage and the CrowdStrike outage some year and a half ago, and that is a fair comparison. I am sure there will be zealots saying &#8220;they are different events because&#8230;&#8221; (and many will be right), but as far as the outcomes go, these two events look pretty similar to me. In both cases, an important platform went down, which has led to the platforms that depend on it going down.</p><p>This brings me to the main point of today&#8217;s piece. In our discussions about supply chain risk, we have forgotten that there is something else at play here, which is that our digital world is powered by many components that are critical and virtually irreplaceable. I believe this is exactly the definition of critical infrastructure.</p><h1>Redefining &#8220;critical infrastructure&#8221; for the modern age</h1><h2>The outdated definition of critical infrastructure</h2><p>In most countries, the term &#8220;critical infrastructure&#8221; is defined by the government policy frameworks that go back many years and often even decades. CISA, a part of the U.S. Department of Homeland Security,<a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors"> explains</a> that &#8220;There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.&#8221; If you look at the list of these sectors, it will make a lot of sense: energy, water, transportation, communications, healthcare, financial services, manufacturing, and other areas are indeed all critical.</p><p>The US isn&#8217;t the only country that has compiled this kind of list. There&#8217;s the EU&#8217;s NIS2 Directive, Canada&#8217;s National Strategy for Critical Infrastructure, and I am sure if you ask ChatGPT, you&#8217;ll get examples of something similar for most countries (hopefully, all real).</p><p>All these frameworks originated at a time when national stability was closely connected to the physical world: electricity generation, oil pipelines, airports, and emergency response systems. The idea was that we need to protect infrastructure and systems that, if disrupted, can harm a lot of people or interrupt critical public services. This approach gave governments a consistent way to prioritize what matters most and allocate resources where they can make the most difference. Agencies can assign responsibilities to sector-specific regulators, figure out resilience requirements, and set up things like public-private partnerships to protect critical functions. These frameworks have proven very valuable to protect traditional infrastructure and coordinate emergency response during events like earthquakes. But, over time they also proved to be insufficient.</p><p>As time went by, people realized that the digital world matters, and we now see IT systems that support many critical functions also on the list. On paper, everything seems to suggest that we&#8217;ve learned that the digital world does matter. Certainly, the fact that AWS, Microsoft, Accenture, Oracle, and many other organizations are now a part of <a href="https://www.cisa.gov/resources-tools/groups/information-technology-sector-coordination-council">CISA&#8217;s Information Technology Sector Coordination Council</a> is great news. What worries me is something else.</p><h2>What modern critical infrastructure actually is</h2><p>Transparently, I don&#8217;t know what this Information Technology Sector Coordination Council does (maybe I would if I had enough patience to read through its<a href="https://www.cisa.gov/sites/default/files/2024-08/information-technology-scc-charter-2023.pdf"> charter</a>). To me, that&#8217;s not even the most important part. It all starts with who is on that council.</p><p>If you look closer, you&#8217;ll see that a large percentage of the organizations on that list are tech giants like Oracle, HP, IBM, Dell, AWS, and Microsoft, and cyber companies. This makes sense because these companies support the computing, storage, and network environments that government agencies, healthcare providers, and enterprises rely on every day. They provide the foundational technologies that power data centers and enterprise software, the modern equivalents of the roads and power lines that keep the digital economy functioning.</p><p>What&#8217;s less obvious is that the new generation of companies that I&#8217;d argue should be considered &#8220;critical&#8221; is not on the list. Take Twilio, for instance: it provides messaging and communications infrastructure embedded in everything from hospital appointment systems to two-factor authentication flows used by banks and government portals. If Twilio goes down, the entire authentication and notification systems can fail across thousands of organizations simultaneously. Similarly, Stripe processes payments for millions of businesses around the world, making it a critical layer of the global financial system. When Stripe&#8217;s services go down, the impact cascades across every single business that processes transactions online, like e-commerce, subscription platforms, and a large number of enterprises.</p><p>Then there are companies like Snowflake and Databricks, which have become central to how modern organizations store, process, and analyze data. These platforms host sensitive data for enterprises across healthcare, finance, manufacturing, and the public sector. Their availability directly influences an organization&#8217;s ability to operate, make decisions, and respond to incidents. Add to this list platforms such as Atlassian (which powers engineering collaboration), Okta (identity and access), Cloudflare (web and network security), and GitHub (software development infrastructure). An even better example is GoDaddy, a platform that manages a huge chunk of the world&#8217;s domain addresses. Each of these tools supports core business operations at scale, across companies of all sizes, and if any were to experience a prolonged disruption, the number of companies and whole sectors that would be impacted would be incredibly high.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_myp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_myp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!_myp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!_myp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!_myp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_myp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_myp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png 424w, https://substackcdn.com/image/fetch/$s_!_myp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png 848w, https://substackcdn.com/image/fetch/$s_!_myp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!_myp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb69fbb36-dbaa-4fb3-9d49-e81b3074e207_1600x1066.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>All this is to say that the present-day definition of &#8220;critical infrastructure&#8221; is completely outdated. Nearly everything in the digital world is interdependent, and a failure of one part of the system can lead to a cascading effect in ways we cannot even predict. If you want proof, think back to the CrowdStrike outage. In theory, an outage of the endpoint security platform should not have caused airports to crumble, but guess what, it did. I surely hope that we won&#8217;t see a growing number of outages, but we all know that our digital world is starting to look more and more like this famous meme from ages ago.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8tpz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tpz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png 424w, https://substackcdn.com/image/fetch/$s_!8tpz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png 848w, https://substackcdn.com/image/fetch/$s_!8tpz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png 1272w, https://substackcdn.com/image/fetch/$s_!8tpz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tpz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png" width="1456" height="624" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:624,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8tpz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png 424w, https://substackcdn.com/image/fetch/$s_!8tpz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png 848w, https://substackcdn.com/image/fetch/$s_!8tpz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png 1272w, https://substackcdn.com/image/fetch/$s_!8tpz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3d62a-54d4-423f-ad13-dbf77e1898f1_1600x686.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Looking into the future: this isn&#8217;t about words</h1><p>When we think about the problem of protecting critical infrastructure, it&#8217;s definitely important to prioritize things that can impact the safety and well-being of people. Water, electricity, financial systems, and other areas are certainly the right things to think about first. And yet it&#8217;s important not to forget that the digital world relies on its own digital infrastructure that is all interconnected and, as we&#8217;re learning every year, incredibly fragile.</p><p>I don&#8217;t know what the future of this problem will look like, but I do know that this isn&#8217;t about playing with words. Recognizing what truly constitutes critical infrastructure has real, tangible consequences. How we define &#8220;critical&#8221; determines what gets regulated, what resilience standards are enforced, and what kinds of incident response and redundancy planning will be put in place. If we continue to treat cloud platforms, SaaS ecosystems, and digital intermediaries as ordinary vendors rather than as essential systems, we risk underestimating the scale of disruption a single outage can cause. A modern economy that runs on APIs, cloud workloads, and distributed services depends on a different kind of backbone, one that is global, digital, and deeply interconnected. We live in a world where an outage of Microsoft Entra ID can disrupt planes, an outage of Duo can disrupt hospitals, and an outage of Webex and Microsoft Teams can disrupt emergency response. We have to be able to at least acknowledge this reality and admit that many of the startups are now as critical to our functioning as a society as large tech giants. That, in my opinion, is the first step toward building resilience for the world we actually live in, not the one we used to.</p><div><hr></div><h5>If you like my blog, please subscribe &amp; share it with your friends. I do this in my free time, so seeing the readership grow helps me to stay motivated and write more. I don&#8217;t send anything except my writing and don&#8217;t sell your data to anyone as <a href="https://www.linkedin.com/in/rosshaleliuk/">I have better stuff to do.</a></h5><h5>If you are a builder - current or aspiring startup founder, security practitioner, marketing or sales leader, product manager, investor, software developer, industry analyst, or someone else who is building the future of cybersecurity, check out my best selling book, <a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/">Cyber for Builders</a>.</h5><h5>If your company is interested in sponsoring Venture in Security, check out <a href="https://ventureinsecurity.net/p/sponsor">Sponsorships</a>.</h5><h5>Lastly, check out the <a href="https://insidethenetwork.co/">Inside the Network</a> podcast where we bring you the best founders, operators, and investors building the future of cybersecurity.</h5><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Venture in Security&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Venture in Security</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/p/redefining-critical-infrastructure?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/p/redefining-critical-infrastructure?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ventureinsecurity.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://ventureinsecurity.net/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>