<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-13756280</id><updated>2026-03-29T09:37:52.624-07:00</updated><category term="2007 predictions 2006 web application security"/><category term="3d graphs keynote osx pie charts line bar charts"/><category term="ITRadio Podcast Patrick Gray"/><category term="Preventing CSRF vulnerable XSS"/><category term="RSA 2007"/><category term="ajax security web application xhr attack surface xss jeremiah grossman article javascript"/><category term="blocking meta refresh with link tags javascript port scanning web application security"/><category term="browser port scanning without javascript malware"/><category term="business logic flaw abuse functionality yahoo games chess ladder"/><category term="bypassing firefox mozilla port blocking restrictions javascript scanning malware"/><category term="cross site request forgery CSRF XSRF cgisecurity"/><category term="css history browser history hack without javascript"/><category term="disclosure web application security vulnerability"/><category term="dns pinning anti google desktop"/><category term="dont trust server side security superbowl XLI internet explorer IE exploit defacement"/><category term="edit end user license agreements EULA bookmarklet"/><category term="future web application vulnerability assessment scale"/><category term="gmail contact list hack json javascript CSRF"/><category term="ideas for web application security projects"/><category term="input validation output filtering XSS"/><category term="interview picking brains jungsonn"/><category term="interview podcast stillsecure alan shimell mitchell ashely"/><category term="its funny"/><category term="javascript history hack theft security console error CSS"/><category term="javascript image type console error message suppression"/><category term="javascript nat ip address java"/><category term="laugh"/><category term="low hanging fruit automated scanners technical vulnerabilities business logic flaws"/><category term="maui vacation 2006 hawaii twin falls"/><category term="mythbusting ajax slashdot followup javascript malware"/><category term="rsa 2007 jordan wiens security innovations interactive testing challenge"/><category term="ryan barnett apache blogger modsecurity breach security waf"/><category term="samy pleads guilty"/><category term="secure code frameworks robert auger security pdp gnucitizen"/><category term="security assessments penetration tests difference"/><category term="sql dump"/><category term="subverting ajax xss prototype hijacking splitting stephano giorgio cross site scripting"/><category term="three wishes 3 web browser security javascript malware history intranet hacking"/><category term="top 10 ten web hacks 2006 bode for 2007"/><category term="top 10 web hacks 2006"/><category term="trusting client side security web application same-origin policy cookie vulnerability javascript malware browser ssl tls"/><category term="universal cross site scripting UXSS adobe rsnake pdf plugin browser DOM based"/><category term="user education"/><category term="vulnerability disclosure web applications"/><category term="waf web application firewall"/><category term="wasc meetup RSA 2007 san francisco web application security"/><category term="wasc rsa meetup 2007"/><category term="web application security formula motivation economist fight club jack"/><category term="web application security network coverage vulnerability measuring assessment scanning scan methodology"/><category term="web application security professionals survey statistics"/><category term="web application security professionals survey statistics january 2007"/><category term="web application security professionals survey statistics jeremiah grossman whitehat"/><category term="web application security scanner appscan webinspect anurag agarwal review comparison"/><category term="web application security scanner vulnerability statistics assessment methodology"/><category term="web application vulnerability assessment va low hanging fruite LHF neopets"/><category term="web application vulnerability scanning assessment owasp top ten 10 automated white paper"/><category term="web appplication security defense in depth SDLC"/><category term="whitehat security jobs Application Security Specialist hiring"/><category term="whitehat security tradeup promotion scanner service"/><category term="whitehat web application security risk report statistics severity technical logical"/><title type='text'>Jeremiah Grossman</title><subtitle type='html'>Venture capitalist (Grossman Ventures https://grossman.vc), Internet protector and industry creator. Founded WhiteHat Security &amp;amp; Bit Discovery. BJJ Black Belt.&#xa;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default?alt=atom&amp;redirect=false'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default?alt=atom&amp;start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>789</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-13756280.post-2168868448417184675</id><published>2024-07-10T15:36:00.000-07:00</published><updated>2024-07-10T15:47:10.997-07:00</updated><title type='text'>The Solution to Application Security’s Biggest Challenge, Vulnerability Remediation, May Finally Arrive</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBbVV1d6gkaQ5OMSqLT9AkGMJO6JLhAuGreoBbw_jZu0CZWoMjeJRtRlKC6Sn8lpDb2LMAVpEas4YYIe-PJ_4xs0iVQbJGnSqNz5g9hHOcUH09A_CfowgYXKAip2VNG9mTPuOhyphenhyphenM9lTeaI2Xv6EZd0btm2XGO9j8UntIiwqQgJZI0u5U2NPZRdYw/s1024/ai_powered_vulnerability_remediation_assisant_a6dde307-b51b-40f6-9128-d548acb34465.png&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1024&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBbVV1d6gkaQ5OMSqLT9AkGMJO6JLhAuGreoBbw_jZu0CZWoMjeJRtRlKC6Sn8lpDb2LMAVpEas4YYIe-PJ_4xs0iVQbJGnSqNz5g9hHOcUH09A_CfowgYXKAip2VNG9mTPuOhyphenhyphenM9lTeaI2Xv6EZd0btm2XGO9j8UntIiwqQgJZI0u5U2NPZRdYw/w200-h200/ai_powered_vulnerability_remediation_assisant_a6dde307-b51b-40f6-9128-d548acb34465.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;The importance of vulnerability management is simple — find and fix issues before an adversary finds and exploits them. Unfortunately, the remediation rates reported by leading application security vendors average only around 50% or far less. And when vulnerabilities are fixed it takes weeks or months. The rest of the vulnerabilities? They’re often never fixed and this has been the reality for many years [&lt;a href=&quot;https://www.veracode.com/sites/default/files/2024-02/SOSS-Report-2024.pdf&quot;&gt;1&lt;/a&gt;]&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;[&lt;a href=&quot;https://www.scmagazine.com/perspective/why-does-it-take-so-long-for-security-teams-to-remediate-vulnerabilities&quot;&gt;2&lt;/a&gt;]&lt;/span&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;[&lt;a href=&quot;https://www.getastra.com/blog/security-audit/cyber-security-vulnerability-statistics/&quot;&gt;3&lt;/a&gt;]&lt;/span&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;[&lt;a href=&quot;https://www.darkreading.com/application-security/key-application-security-metrics-show-little-sign-of-improvement&quot;&gt;4&lt;/a&gt;]&lt;/span&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;[&lt;a href=&quot;https://www.darkreading.com/vulnerabilities-threats/survey-appsec-maturity-hindered-by-staffing-budgets-vulnerabilities&quot;&gt;5&lt;/a&gt;]&lt;/span&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;.&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;The underlying reason for vulnerabilities not getting fixed is basically resource constraints. When application vulnerabilities are found, typically they must be fixed by an internal software development group, not the InfoSec team. And since software development resources are always scarce, allocation between vulnerability remediation and building new features is purely a business decision. And the needs of the business largely favor revenue generating features over security issues.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;At the same time, many companies have hundreds and often thousands of websites in total with an untold number of code repositories supporting them. And in my experience working in application security for ~20 years, such as WhiteHat Security and 1000+ customers, only ~20% of their websites are routinely scanned for vulnerabilities. And this essentially the same for the underlying code repositories as well.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;And the reason for the lack of pervasive application scanning is understandable: if a company already can’t keep up with their current remediation challenges, they’re certainly not going to want to spend more money to identify potentially thousands more vulnerabilities that they also can’t fix any time soon.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;A scalable vulnerability remediation solution is what holds back pervasive application scanning, and leaves thousands of companies at risk without viable options. Finding a way to remediate vulnerabilities faster, easier, and cheaper would be absolutely monumental and push the entire application security industry forward. That’s why I’ve been focusing and researching this problem for well over a decade.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;I’ve worked with WAF technology, RASP technology, browser technology, leveraging third-party development shops, and anything else that might work. All these approaches have their pros and cons, and do work in certain scenarios, but ultimately they have so far been unsuccessful in broad market adoption. More product innovation is needed.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;AI technology provides an exciting opportunity to solve vulnerability remediation. We’re already seeing how developers are able to leverage AI to automatically generate code. In the same way, what if it was possible for AI to import Static Application Security Testing (SAST) results and automatically fix the code with an AI Agent built on LLM technology. Ideally, all a developer would need to do is review the fixed code and accept it for QA testing in a single click. This allows a developer to fix an issue while it&#39;s fresh in their mind in less than a minute, much better than getting a ticket 3 months after the code was written.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;There are at least a few vendors working on this approach. Recently I was introduced to a start-up called &lt;/span&gt;&lt;a href=&quot;https://amplify.security/&quot; style=&quot;font-family: verdana; text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Amplify&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: verdana; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;, who is building a product based on this exact concept. &lt;/span&gt;&lt;a href=&quot;https://amplify.security/&quot; style=&quot;font-family: verdana; text-decoration-line: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;Amplify&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: verdana; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt; provides developers with an AI-powered tool that automatically fixes vulnerabilities in a way that would be equivalent to having a Sr. Developer and Sr. Security Engineer sitting and solving the problem together. The potential of this technology is exciting and will only get better over time. I believed in the founder, the vision, and implementation enough to become an Angel investor.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana; white-space-collapse: preserve;&quot;&gt;I personally want to be part of solving this problem after spending most of my career in the application security industry. Success would enable every company to finally be able to scan their entire code repositories for vulnerabilities, and when vulnerabilities are found, they can do something about it quick and easy. Remediation rates would be drastically improved, mean-time-to-fix goes way down, and application breaches become rare. This is the entire goal of the application security industry — and it could be right around the corner!&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-e1c6a188-7fff-6d2b-d34a-ff284e1e0fb8&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/2168868448417184675/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/2168868448417184675' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/2168868448417184675'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/2168868448417184675'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2024/07/the-solution-to-application-securitys.html' title='The Solution to Application Security’s Biggest Challenge, Vulnerability Remediation, May Finally Arrive'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBbVV1d6gkaQ5OMSqLT9AkGMJO6JLhAuGreoBbw_jZu0CZWoMjeJRtRlKC6Sn8lpDb2LMAVpEas4YYIe-PJ_4xs0iVQbJGnSqNz5g9hHOcUH09A_CfowgYXKAip2VNG9mTPuOhyphenhyphenM9lTeaI2Xv6EZd0btm2XGO9j8UntIiwqQgJZI0u5U2NPZRdYw/s72-w200-h200-c/ai_powered_vulnerability_remediation_assisant_a6dde307-b51b-40f6-9128-d548acb34465.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-7278817540383596475</id><published>2024-07-09T08:59:00.000-07:00</published><updated>2024-07-09T09:00:34.093-07:00</updated><title type='text'>Why InfoSec Vendors Force Customers to Work with Sales</title><content type='html'>&lt;div class=&quot;separator&quot;&gt;&lt;span id=&quot;docs-internal-guid-5cd2a4bc-7fff-d233-07de-5fbf8642af2a&quot;&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;clear: right; float: right; font-family: verdana; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img height=&quot;187&quot; src=&quot;https://lh7-us.googleusercontent.com/docsz/AD_4nXfqiw_leF__hoz0it-eT9FgdUdv3bt1Ynq9dDY9sNUR9Oyw82FKzRdv-x-oystY4setoY978At30Bon4caxnpVwvar1qnHKPyTaDFXINVY3h9NLb3gwvtqYHIcB03eFMJ80-vdKzQkEvYmfflcDaK3zxPTP?key=Jb-4Md1P5VczBlxVWWi9nA&quot; style=&quot;font-family: Arial, sans-serif; font-size: 11pt; margin-left: 0px; margin-top: 0px;&quot; width=&quot;336&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 10.5pt; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;If you visit practically any enterprise InfoSec vendor’s website and are interested in trying out their products or services without speaking to a sales rep first, good luck — this is rarely allowed. Even just getting pricing info from a vendor without engaging in a sales process is next to impossible. The vast majority require customers to email or fill out an online form, schedule a meeting with a sales rep, sit through a PowerPoint presentation, and THEN they’ll let customers try the product. And all of this happens in a carefully scripted and supervised manner. For many customers, this experience is often frustrating and avoided whenever possible.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 10.5pt; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;I’ve long asked why sales leaders and reps insist on connecting in person with customers before even considering allowing demos or providing pricing. One explanation they give is if trials are allowed without an initial sales meeting, customers will struggle with installation, configuration, or usage and fail to comprehend ‘full’ value. Sales leaders are concerned about potentially losing deals to competitors who require a more hands-on white-glove process.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;As for pricing, sales reps will say if the website reveals pricing upfront and competitor’s websites don’t, customers might get sticker shock and avoid contacting them. This prevents sales reps from having an opportunity to demonstrate the product and justify the value while the customer looks into another solution. For these reasons and others, is supposedly why customers must endure a people-intensive, painstaking, pressured, slow, and frustrating sales process.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;While these enterprise sales philosophies may have once made sense in a previous decade, today, they feel antiquated and inferior. For example, we see the sales models of big cloud service providers such as Amazon, Google, and Microsoft. They’re capable of collectively selling hundreds of billions of dollars a year in IT services to the smallest of the small and largest of the large organizations in the world, basically friction-free. At any time, an interested customer can spin up thousands, hundreds of thousands, and even millions of dollars worth of services without ever having to speak to a sales rep or anyone in minutes. Why can’t or why isn’t every InfoSec vendor following their example?&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Is the value of today&#39;s InfoSec products really too complicated for customers to understand on their own? Are customers really incapable of figuring out how to deploy products without assistance from sales? Does making pricing info readily available actually drive customers away toward competitors? If so, then my contention is we have a serious and industry-wide product deficiency problem on our hands. And every problem is an opportunity to improve.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;For the average start-up I’ve worked with, the sales department generally represents 12-18% of the overall company budget. And the marketing department budgets are roughly the same. Marketing spending is an important consideration here because they have to find and push hard to convince customers to engage in a sales-led process rather than just clicking a link. Then, often because a vendor’s sales reps don’t have an existing relationship with a customer needed to get their attention, they’ll rely on the channels (i.e., VARs). For this very reason, many customers prefer to evaluate and buy through one of their ‘trusted partners.’ Tack on another 3-30% of the cost of sales in channel commissions.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;All of these sales and marketing costs add up and partially explain why enterprise security products are so expensive. And contribute to why they’re out of the price range of many small and medium businesses (SMBs). In the current model, it’s just not worth a vendor’s time to sell to SMBs unless they engage on their own. Personally, I see a huge opportunity for existing vendors and start-ups alike who successfully solve this problem.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-size: 10.5pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Imagine for a moment if an InfoSec vendor found a way to cut down this sales and marketing overhead by enabling a self-provisioned sales process, and invested those dollars directly into their product that can [gasp] sell itself! The overall cost of sales goes down, customer satisfaction goes up, deals are done quicker, the vendors become more competitive, and opens up new market opportunities (eg, SMBs). The sales apparatus of the big incumbent security vendors will have a difficult time making such a shift because the entire sales department will resist. Therefore, the advantage goes to the start-ups. And we’re recently just starting to see trends of InfoSec vendors selling through Amazon’s marketplace, for example. I’m hoping this is a trend.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/7278817540383596475/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/7278817540383596475' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7278817540383596475'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7278817540383596475'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2024/07/why-infosec-vendors-are-force-customers.html' title='Why InfoSec Vendors Force Customers to Work with Sales'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh7-us.googleusercontent.com/docsz/AD_4nXfqiw_leF__hoz0it-eT9FgdUdv3bt1Ynq9dDY9sNUR9Oyw82FKzRdv-x-oystY4setoY978At30Bon4caxnpVwvar1qnHKPyTaDFXINVY3h9NLb3gwvtqYHIcB03eFMJ80-vdKzQkEvYmfflcDaK3zxPTP=s72-c?key=Jb-4Md1P5VczBlxVWWi9nA" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-219963626096006457</id><published>2024-06-27T07:55:00.000-07:00</published><updated>2024-06-27T10:01:00.173-07:00</updated><title type='text'>InfoSec Market Labor Shortage and Predictions</title><content type='html'>&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid4sGBrzci2Qxacljq27EL2HnAuEoQacSbPOA2vZseJjcLNkrlDuuRjBIsjnfv-KQLlPVo31vS16Dl7gSi_nfvCijci29zGqsbqqZ0hjJpDVQuCb4MVCszzpbAz21RQI7m9QpH8Bz5yPnCRu9gx9RpD_Ijm8cnEH8xQgs_c0RBclhAKWodYGPLtw/s806/Screenshot%202024-06-27%20at%208.15.34%E2%80%AFAM.png&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;644&quot; data-original-width=&quot;806&quot; height=&quot;208&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid4sGBrzci2Qxacljq27EL2HnAuEoQacSbPOA2vZseJjcLNkrlDuuRjBIsjnfv-KQLlPVo31vS16Dl7gSi_nfvCijci29zGqsbqqZ0hjJpDVQuCb4MVCszzpbAz21RQI7m9QpH8Bz5yPnCRu9gx9RpD_Ijm8cnEH8xQgs_c0RBclhAKWodYGPLtw/w260-h208/Screenshot%202024-06-27%20at%208.15.34%E2%80%AFAM.png&quot; width=&quot;260&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Observations&lt;/b&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;From my personal experience and through conversations I’ve had with many other security pros, we’ve observed that the average level of competency among enterprise InfoSec personnel is either flat or decreasing. And this has been steadily taking place for several years. This occurs despite the plethora of widely accessible educational content and professional training options. This is important to note because in order to remain effective the operational environment of InfoSec also requires professionals to learn an ever-expanding knowledge base. As an every expert will attest, this is a significant challenge for every individual and organization.&lt;br /&gt;&lt;br /&gt;Then as businesses digitize essentially every product and service in modern life, today’s IT environments have become incredibly sprawling and more complex by the day. This level of complexity, and the associated legacy IT backlog, makes it exceptionally difficult for practitioners to comprehend, monitor, and maintain robust security of the environments they’re meant to defend.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Causes&lt;/b&gt;&lt;br /&gt;The InfoSec market is growing rapidly (&lt;a href=&quot;https://www.fortunebusinessinsights.com/industry-reports/cyber-security-market-101165&quot;&gt;$172B annually with 10-12% CAGR&lt;/a&gt;), leading to a high demand for skilled professionals across the corporate spectrum. The demand and subsequent skill gap are exacerbated by new and emerging technologies such as IT/OT, cloud, virtualization, microservices, blockchain, low-code/no-code, new programming languages and frameworks, and of course, AI/ML.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Nobody can claim expertise in all these areas or even close. Additionally, InfoSec does not have structured and widely available pathways to onboard entry-level talent. Hiring managers also commonly struggle to accurately assess the level of expertise of potential hires due to the nuanced and complex nature of InfoSec skills.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Prediction&lt;/b&gt;&lt;br /&gt;In the near term, there are no scalable options yet on the horizon to broadly address these labor issues, and we have every indication and expectation that the skill gap will remain and likely even widen. If so, and for lack of better options, we can only expect organizations to continue placing inadequately trained and inexperienced personnel to fill vacant security roles who operate closer to program managers. This is a reasonable approach given the current constraints.&lt;br /&gt;&lt;br /&gt;Subsequently, many organizations lack confidence in their ability to sufficiently protect their environments from breaches — and for good reason. Many practitioner&amp;nbsp;surveys published over the years support this observation. While some people will suggest substantive wage increases as an immediate solution, to which I don&#39;t necessarily disagree, doing so can only help individual organizations. The larger net effect can only serve to shift labor shortages from one area of the market to another and will do little to solve the overall industry shortage.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Opportunity&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;An increasing number of organizations and their security programs will rely upon Managed Security Service Providers (MSSPs) for third-party assistance — especially MSSPs who are willing to take on contractual liability. Of course, reliance on MSSPs does not necessarily solve the core challenges; it only transfers the security problems from organizations to the MSSPs. Security product innovation remains a crucial component of the market.&amp;nbsp;The MSSP market winners will be those capable of offering a comprehensive suite of security controls capable of keeping up with an evolving threat landscape. That said, no amount of technology automation in any segment of InfoSec completely removes the need for human expertise. Therefore, the MSSPs who can best hire, train, and retain top talent will have the long-term competitive edge.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;If an increasing percentage of InfoSec budgets are going to flow through MSSPs, this becomes an increasingly attractive go-to-market strategy for both incumbent security vendors and start-ups alike. Especially for those capable of integrating seamlessly into the current MSSPs technology stack and processes.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Businesses are finding that cyber-insurance is becoming compulsory. And it makes sense because if you feel that you can’t protect against the breach, at least protect against the monetary loss. So we’re going to see an expansion of cyber-insurance carriers, both large and start-ups, offering insurance packages that come with a suite of security solutions bundled in — for free. The question is, will they build these technologies themselves, partner for the capability, or make acquisitions? &lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;My prediction is: All three.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/219963626096006457/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/219963626096006457' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/219963626096006457'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/219963626096006457'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2024/06/infosec-market-labor-shortage-and.html' title='InfoSec Market Labor Shortage and Predictions'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid4sGBrzci2Qxacljq27EL2HnAuEoQacSbPOA2vZseJjcLNkrlDuuRjBIsjnfv-KQLlPVo31vS16Dl7gSi_nfvCijci29zGqsbqqZ0hjJpDVQuCb4MVCszzpbAz21RQI7m9QpH8Bz5yPnCRu9gx9RpD_Ijm8cnEH8xQgs_c0RBclhAKWodYGPLtw/s72-w260-h208-c/Screenshot%202024-06-27%20at%208.15.34%E2%80%AFAM.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-3994800555817808607</id><published>2020-12-21T10:47:00.008-08:00</published><updated>2020-12-21T11:01:38.736-08:00</updated><title type='text'> 1950 Mercury Christmas Present</title><content type='html'>&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFEpzUiMEYdvePr6uqPHzFgXVrpMl6PRAl3L4R1dA_9C_fNMRQSDKQG7ebGhS2oCEOee2_tcD-BmTuKq0DipkDmc0WTA3DXmeo3bUebG6d3q2n2w-T7GeYyLTQVjfN69d_znGILg/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1044&quot; data-original-width=&quot;1514&quot; height=&quot;221&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFEpzUiMEYdvePr6uqPHzFgXVrpMl6PRAl3L4R1dA_9C_fNMRQSDKQG7ebGhS2oCEOee2_tcD-BmTuKq0DipkDmc0WTA3DXmeo3bUebG6d3q2n2w-T7GeYyLTQVjfN69d_znGILg/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;As a gift, or sometimes more like a curse,&lt;a href=&quot;https://blog.jeremiahgrossman.com/2020/12/a-1951-ford-for-dad.html&quot;&gt; my dad passed down his love of classic cars&lt;/a&gt; to his children. Each of us has our favorites, and one of mine is a 1950 Mercury. Not just any 1950 Mercury, but a particular highly customized “led sled” hot rod. Chopped, dropped, frenched, chrome out grill, shaved door handles, bagged with black paint and red flames. It’s the kind of car most people will only see in a classic car magazine or more likely a comic book. Such as car is not really supposed to exist in real life. You’re not going to see one on the road. You’re not even going to see one at a car show. In fact, I’d never seen one like it [in person] until last year, and I’ve searched for 20 years. It’s my unicorn.&amp;nbsp;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh12lGxdgcXpv1sYeuZ8OIcxM1_43tmTJscgOL0e2eEJJM-hT6oR-u3dtBO8cLCdNxAZqTfEagc7em_r07_D6fxZgy1y7H4Rurup9y0cT1_vcLL-F78rvt0p1-4-IG5aqbpB3KUwQ/&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh12lGxdgcXpv1sYeuZ8OIcxM1_43tmTJscgOL0e2eEJJM-hT6oR-u3dtBO8cLCdNxAZqTfEagc7em_r07_D6fxZgy1y7H4Rurup9y0cT1_vcLL-F78rvt0p1-4-IG5aqbpB3KUwQ/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;One might ask why I just didn’t buy an old broken-down Merc and restore it. It’s a fair question. I have helped my dad restore classic cars since I was a kid. However, a 1950 Mercury project like I described would have been very different, a whole other level of cost and difficulty. Believe me, I considered it for years. The shell of body, IF you can somehow find one somewhere in any condition, will still cost $15-20K due to the rarity. Then I’d somehow have to transport it to Hawaii because they don’t exist anywhere in the state. I looked. Then the customization requires a set of skills that only master body mechanic would be capable of, with heavy fabrication skills, and a machine shop to match. With the facilities at my disposal and of Hawaii in general, it just wasn’t going to be possible. Finding and buying one in relatively close condition was the only option.&lt;/span&gt;&lt;div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyHcsxU6L_mquhNMFOEjH-NXRRnb04wKLEV3pCEqY_4II_0xVGFDee6ryfByN8aYVlKvoSxuBfTWebd_2acBYBLYzkmCpruhWj2tfS7MXlxCu0Ohl4FSHLbI9B7ZNQlO6oxX0iSQ/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;810&quot; data-original-width=&quot;1440&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyHcsxU6L_mquhNMFOEjH-NXRRnb04wKLEV3pCEqY_4II_0xVGFDee6ryfByN8aYVlKvoSxuBfTWebd_2acBYBLYzkmCpruhWj2tfS7MXlxCu0Ohl4FSHLbI9B7ZNQlO6oxX0iSQ/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Over the last 25 years I’ve travelled a lot. 1 million miles on United Airlines alone, but who’s counting. In every state and city I’ve visited, I’d routinely fire up Craigslist and see if any of my bucket list cars were for sale in the area. The years rolled by, and while I did manage to buy pair of 19&amp;nbsp;64 Lincoln Continentals, I never ever came across my dream 1950 Mercury – that is until this time last year.&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Christmas of 2019 the family travels out from Hawaii to Tennessee to spend the holiday with relatives. I’ve been to Tennessee many times before, mostly Memphis and Nashville. Nice wide-open country, friendly people, and my favorite part are the fireworks stores. Hawaii and California basically outlawed everything except sparklers, but not Tennessee. Tennessee has stores that look like Target that sell everything in all shapes, sizes, and colors. Complete with push button video demonstrations in the store so you can see what you’re buying. On this trip I filled up two grocery carts to the brim and let loose inner child pyromaniac. Let me tell you, my kids and I had a blast lighting up the sky over the river out back. All eyebrows accounted for.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXATPksjT0aLPHUzerBiG_3W5X2-iesaQdzQnCpMq8dGn_P7b1tZqQddYYlX99FqIwHoMmD4L9STf_Yv_YwJx67I9SV6gcfX5hyY1SNvTGuOyerV5FUe3Lrkgc7X9qMzmgeHur8A/&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXATPksjT0aLPHUzerBiG_3W5X2-iesaQdzQnCpMq8dGn_P7b1tZqQddYYlX99FqIwHoMmD4L9STf_Yv_YwJx67I9SV6gcfX5hyY1SNvTGuOyerV5FUe3Lrkgc7X9qMzmgeHur8A/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;Early one evening, a couple days before the 25&lt;/span&gt;&lt;sup style=&quot;background-color: white; color: #050505;&quot;&gt;th&lt;/sup&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;, it was time to check Craigslist. To my utter astonishment, a 1950 Mercury showed up in the results located around a 1.5hr drive away. I couldn’t believe it. I was skeptical, very skeptical. No way this could be real. No way. At first I thought it must be a targeted ad or a scam or something based on my search history. It looked just like everything I’d hoped and dreamed for 20+ years. Again, I’m in a VERY rural area of Tennessee outside of Knoxville with an extremely small population.&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;I double-checked I was searching in the right area. Yup. Maybe the listing was outdated? Nope. Posted 2 days ago. Obvious signs of a scam? It didn’t look like it. The only way to know for sure is to call the seller. And just like that, Marvin picked up!&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNWP0jIOoEO4WX41j-vziOD_lfzAu7PJ99-GD7M6kcOVUjj-tFjgLsNBi1t_sYimtjpMcoSpXm5OGFIDgY2cTkq1lIeJoaXTM42cGkprBzzjTLwFKHQj9zHnk0XHiUQ4YsRF2AWA/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNWP0jIOoEO4WX41j-vziOD_lfzAu7PJ99-GD7M6kcOVUjj-tFjgLsNBi1t_sYimtjpMcoSpXm5OGFIDgY2cTkq1lIeJoaXTM42cGkprBzzjTLwFKHQj9zHnk0XHiUQ4YsRF2AWA/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;On the phone I asked Marvin every question about the car I could think of. Where’d you get it? Does it really look as good as in the pictures? Who built it? How’s it run? What’s wrong with it? Rust? The price? Well, let’s be honest, I didn’t care about the price. This was literally the opportunity of a lifetime and I wasn’t about to miss even the opportunity to see it – IN REAL LIFE! So, I scheduled a time for first thing the next morning, jumped in the rental car with my son (14) and uncle Jim, and we headed out to the boonies on a classic car adventure!&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;After a long drive, we pulled up to the address and right there we see it parked in the driveway. A gleaming and perfect 1950 Mercury coupe. My world stopped. The three of us just stared. It looked like a full-size hot&amp;nbsp;wheel. It didn’t look like real. Every detail was exactly how I’ve always imagined it. We lifted the hood, opened the doors, and crawled underneath it. E&amp;nbsp;very detail was perfect right down to the 3-inch chop, push-button trunk and door locks, and electric windows. The damn thing even had pin striping on the frame. THE FRAME! The only thing that was incomplete was the interior, which had late model Acura seats. I didn’t care, I could easily replace that later. Marvin explained that’s he’s a body guy and built the car himself over the last many years. Swapped out all the old Mercury internals and replaced everything with Chevy parts. He did all the body work personally, at home, in his homemade paint booth garage.&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;clear: right; float: right; font-family: verdana; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA_Lf5OSthKFdd2o6FSDJronLUQsaqT5EfMmXME4J9lRbbZ4Zkd6A5kWvN7Aw9UDoT9KE7bZa2A78mwTrS1Hn-4N3xsfv7SfjTgu2ZVzO0_mZanfiZZpHYlNGI8mvnTgUj27icRg/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;We took the car on a short drive around the neighborhood. This thing hadn’t seen the road in a couple of decades. It rolled, it stopped, it ran great. Because I wasn’t prepared, and typically avoid impulse purchases, I tried to find any reasonable excuse to NOT buy this car. I mean I wasn’t in Tennessee to buy a car, and this wasn’t on a work trip. I was there on a family vacation, completely unprepared. Still, I couldn’t say no, I had to have it. This opportunity was never going to come up again. Never. Ever.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Marvin wanted 4 stacks of high society and not a penny less. Not a bank wire. Not a cashier’s check. Not PayPal. Not Bitcoin. Marvin was a good ol’ country boy through and through. He wanted cash in hand. I explained to Marvin that I’m from out of town and didn’t travel prepared to make such a large cash transaction. If he could give me a little time to figure things out, and NOT sell the car to anyone else, I’d appreciate it. He agreed. I’m guessing there wasn’t going to be someone else showing up ready to buy THE car, in THIS part of the country, for THAT much in cash, 2 days out from Christmas anyway.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color: #050505; font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(5, 5, 5); font-size: 15.333333015441895px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; font-family: verdana; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAlTAxSWfm24wkLeM_-McdhmfX5kBh0I2f5Vtc6J6LADb9GY3Qpy8y6csvr2hoPPS7SmYZsb-UcnktbwGesXQsvnIQEPLkSyP58XFusJvGTyKoP2Zoi8hrRuX9Lwzmm1uchGx75Q/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The next day my son and I visited a local bank branch, let them know we needed to make a large cash withdrawal to buy a car. After some identify check verification, they said the bank manager who can authorize the amount wasn’t in – holiday vacation. Dah! Back in the car and rush off to the next branch. I don’t have much time to get this done because we’ll be flying out in a couple days.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;Arrived at bank branch #2, waited through another series of identity checks, manager approved the amount, but they informed me that they don’t have nearly enough cash on hand. The holiday apparently wiped out their cash reserves. They’d have to order it, which would take at least a few days. I explained that I needed it now as I’d be flying out by then and asked what my options where. So, the manager called two other branches in the area. The only one that could help was another hour drive away, and maybe they had enough. Off we go!&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;clear: right; float: right; font-family: verdana; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGBSwxmuSzxe-sxjWPM5bmVb6GlVHa1fyc46wZ1IWsH30X8lO1Q5HjUc9HF9AzpNNBePCCrDRd-_flOsUuOHjS3B5fTHNdqofcOp1dflMa-eCN0WABytXbRWFl0UxegNO1trd7yA/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Bank branch #3. By this point I learned to immediately ask to speak to the manager. I explained what I needed, and again went through the identity check procedure. Unfortunately, the bank didn’t have enough hundred-dollar bills to cover the amount, nor enough fifties, so we had to accept the remainder in twenties. Whatever. Cash is cash right!? Success!&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Now, how many times does a young kid get to feast their eyes on so much money and be able to physically hold it? So, we just had to take the obligatory photo of the experience. Our next step was to contact the seller and drive back out to buy the car and get it picked up.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;Let’s pause for a moment to reflect on the visual of this moment. My son and I are two out of towners from Hawaii, in rural Tennessee, driving a rented mini-van cross country, carrying a large of amount of cash in mixed denominations, and after just having visited 3 banks. You better believe I was following every single traffic law making sure to avoid getting pulled over and caught up in some kind of civil asset forfeiture situation. “No sir, I swear, we’re just trying to buy a classic car.”&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAlTAxSWfm24wkLeM_-McdhmfX5kBh0I2f5Vtc6J6LADb9GY3Qpy8y6csvr2hoPPS7SmYZsb-UcnktbwGesXQsvnIQEPLkSyP58XFusJvGTyKoP2Zoi8hrRuX9Lwzmm1uchGx75Q/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;In the meantime, I’m calling around the area trying to find a tow truck driver that’s working and has the equipment to pick up a classic car in a remote region. 5 companies later, I finally found someone whose up for the job. I tell him the time and please. We’re set!&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;We finally arrive back at the seller’s house, and strangely his entire family is there waiting. His wife, one of his daughters, and her husband. Weird. The invite us in the house, and I get the distinct impress this affair was something far more important than just a car transaction but didn’t know what it was. My son and I sat at the kitchen table making small talk while the family divided up each brick of cash, counted it, and visually inspected each bill for counterfeits. They tell us fake bills have been a problem recently in the local area. They’d hold each bill up to the light, looking for the mag strip and watermark. The painstaking process took 2 hours. It was fine though, the family was very nice, and we got to know them and the car a little bit better.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color: #050505; font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: white; caret-color: rgb(5, 5, 5); font-size: 15.333333015441895px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBqTPDq-_1JP3p_szu8xMo89bGjjqVvBc_jxB-fNjbeGcK5Ov2uBjG0vGY_OyNw0GbWiTqrvR9R1GvV1ACnacLjp_MW1KNzPBaJf-vrT3o8VW8mBcQ0z4kCL0esTTJ80v7ZodPfA/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBqTPDq-_1JP3p_szu8xMo89bGjjqVvBc_jxB-fNjbeGcK5Ov2uBjG0vGY_OyNw0GbWiTqrvR9R1GvV1ACnacLjp_MW1KNzPBaJf-vrT3o8VW8mBcQ0z4kCL0esTTJ80v7ZodPfA/&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Here’s where things become truly incredible. Once they’re nearly done counting the money, no issues, Marvin’s wife gets up from the table to make a call on the cordless phone. I hadn’t even seen one of those in years. I make out that the call is to another daughter that lives nearby. She explained that her dad just sold the Merc, and that’d be paying off her mortgage with the money as a Christmas gift. My jaw about hit the floor and my eyes are open double-wide.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;They shared that Marvin had been working on the Merc for 3 years, night and day, and it was finally in good enough condition to sell. Then my son and I somehow showed up. Apparently, their daughter had recently lost her husband, leaving children behind and they’d fallen on tough times. The money was to help make sure that she and the kids would be taken care of. Like I said, this might be the ONLY way that someone would very build or part with such a car.&lt;span style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;My son Jaye and I are witnessing this. A pure and special moment in a family taking place right in front of us in the most impossible of circumstances. Talk about an experience. I got my dream car, they paid off their house. Merry Christmas.&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background-color: white; margin: 0in;&quot;&gt;&lt;span style=&quot;color: #050505; font-size: 11.5pt;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/3994800555817808607/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/3994800555817808607' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/3994800555817808607'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/3994800555817808607'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2020/12/1950-mercury-christmas-present.html' title=' 1950 Mercury Christmas Present'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFEpzUiMEYdvePr6uqPHzFgXVrpMl6PRAl3L4R1dA_9C_fNMRQSDKQG7ebGhS2oCEOee2_tcD-BmTuKq0DipkDmc0WTA3DXmeo3bUebG6d3q2n2w-T7GeYyLTQVjfN69d_znGILg/s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-3241392921227061271</id><published>2020-12-21T10:27:00.008-08:00</published><updated>2020-12-21T10:49:53.025-08:00</updated><title type='text'>A 1951 Ford for Dad</title><content type='html'>&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfObO-X9m1WA11RFoqi-DwrC285cxshzScPlivDu5nzWpreuArIhyphenhyphenqQVh5PiXMd7T6HFjjq2nYmcQotiEE90s-dpXPNTl2s0q85T8jGTQ0ZzyFHHOvnRWqv0eb4AQt0xwMC48OwA/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfObO-X9m1WA11RFoqi-DwrC285cxshzScPlivDu5nzWpreuArIhyphenhyphenqQVh5PiXMd7T6HFjjq2nYmcQotiEE90s-dpXPNTl2s0q85T8jGTQ0ZzyFHHOvnRWqv0eb4AQt0xwMC48OwA/&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;I wanted to get my dad a gift, but not just any gift. The perfect gift. For a diehard hot-rodder like my dad, there can only be one thing -- a car. Of course, not just any ol&#39; thing with four wheels. He quite literally has 50 mostly junkers and clunkers already. Only THE DREAM CAR would do. What kind of car that was I really didn&#39;t know. I had to find out exactly, EXACTLY what that kind of car without letting my dad know and spoil the surprise. For this I asked my brother Zach for help. Discreetly, while both of them were watching a hotrod show on TV, Zach found out that dad&#39;s all-time favorite car is a 1951 Ford 2 door with the original flathead v8 engine. Score!&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;As the story goes, this is the very same car his dad, my grandfather, had bought for him at age 16 for $50. Cars have a way of making a lasting impression on people like this. True to the stereotypical ethnicity of our namesake, grandpa Hyman was worried that he might have overpaid. For reasons I still don’t know, my dad had never owned another like it since. We’re talking 50 years! This is extremely odd because over the years he’s owned essentially every other kind of car, having always been somehow connected to the car business. It probably had to do with their rarity, especially on Maui, as I came to find out to the hard way.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;For months, and months, and months, Zach and I scoured Craigslist national wide and the whole rest of the Internet. We found only the trailer queen show cars selling for many tens of thousands, or on the other end of the spectrum, a pile of rusty incomplete junk. Neither option could be considered for our perfect gift. We wanted something in between. Something decent, or at least restorable, but the make and model had to be exactly right. Zach and I weren’t about to give up.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Finally, on Dec 30, 2013, a Craigslist listing came up in a place called Yantis, TX. Ever heard of it? We hadn’t either. It’s 2.5 hours East... yes... East of Dallas, TX. And remember, all of us live 4,000 miles away on the Hawaiian island of Maui. We had no idea how to get the car back to paradise. We’ll solve that problem later. Undeterred, I immediately called the seller asking if the car was available. It was! W00T! From the description, if the car was anything close to what was advertised, this was exactly what we were looking for. The price was right, perhaps even a deal. Zach and I were seriously excited!&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm95tdQbUfm8UdE6ldA7reQaKIlPGByJzK6UmEbySeNCfeK30PI7wRIeas9x_O2dDn55uw-cho-54YD3ZLDbisVk8yO_L7R7GHp2I6UEv-r4dK3-prf7mcI-OJ3b7D_7V5zDvpsQ/&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm95tdQbUfm8UdE6ldA7reQaKIlPGByJzK6UmEbySeNCfeK30PI7wRIeas9x_O2dDn55uw-cho-54YD3ZLDbisVk8yO_L7R7GHp2I6UEv-r4dK3-prf7mcI-OJ3b7D_7V5zDvpsQ/&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;Next, Zach calls the seller to ask a bunch of questions to make 100% certain this was everything we wanted. It was. Our search was over. Well, sort of. 24 hours later, I call the seller prepared to pay the asking price, sight unseen. I said I&#39;d fly out immediately to get if necessary. This was more than a little shocking to the seller. “Long drive,” he says to me after revealing where I live. The seller said he was a little uncomfortable allowing me to purchase the car sight unseen, especially since he doesn&#39;t know me and I&#39;m so far away. He didn’t want me to be disappointed upon arrival and not buy it. Obviously, a really nice guy. He did say another interested party is coming to look at the car the following day, on New Year’s Day!&lt;/span&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Uh, oh. At this point in the conversation, I&#39;m extremely worried. This person might buy the car that was in my mind already MY DAD’s CAR! Who knows when I might get another chance like this?! I tried everything I could to lock in the deal over the phone, but to no avail. The seller assured me it’s more likely the other guy is just looking and won&#39;t buy it, and if they don&#39;t, it&#39;s mine. I&#39;m asked to phone the next day to get my answer. Talk about a stressful waiting period. All I can do now is hope for the best and prepare for an immediate flight out to Dallas in case things go well.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Now, I there are two problems to sort out and less than a day to do it. 1) I have to convince my dad to take a short notice trip with me to Texas without letting him know the exact reason why. 2) The seller requires either cash in hand or a cashier’s check from a local Texas bank.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Fortunately, my dad is always up for an adventure. So, I said asked if he&#39;d like to take a business trip with me to visit WhiteHat in both Santa Clara and Houston. He&#39;d never really visited the company before to see what I built. It was a fortunate coincidence the car and a WhiteHat office was in Texas. He agreed.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Next, getting a sizable amount of cash over New Year’s Day, 4,000 miles away, when I bank at a local Hawaii bank that has no out of state branches, proved to be a far more significant challenge. Western Union and Money Orders would were of no use even if the locations were open at the time. Darn holidays! Their daily limits were too small for my current needs. FYI: The dollar amount here is less than an average new car off a lot, but still something you’d not want to carry around, let alone on a plane flight.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;I call the seller the following day, he green lights the deal, and I’m overjoyed. I quickly buy some plane tickets, ouch on the short notice price, and let my dad know we&#39;re leaving in 5 hours. He was a little stunned I moved so quickly, and didn&#39;t think I was serious at first, but again... he&#39;s normally game for whatever. This time proved no different.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh47Ppe96Kal2xpu5XLsnlGP5_lLyS3vHKu7LzN8J_rh4R-tE_Ob6Evf7v8-AEOr7RftB_gGI63-l8kxJMzsixdRYBKYiGTwJ3efJUkdZnAJWltmiTIEQGecoc8_y9i8VpzgiOhRA/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh47Ppe96Kal2xpu5XLsnlGP5_lLyS3vHKu7LzN8J_rh4R-tE_Ob6Evf7v8-AEOr7RftB_gGI63-l8kxJMzsixdRYBKYiGTwJ3efJUkdZnAJWltmiTIEQGecoc8_y9i8VpzgiOhRA/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Note: I didn’t have a way to solve the cash problem, so was I no choice but to figure it out upon arrival in Dallas. And, we&#39;re gone, just like that.&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;A 7-hour red-eye flight later and we&#39;re in Dallas at 6am on Jan 2. Oh, did I mention it was friggin’ cold — like 35F. I can tolerate frigid temperature OK, but Dad&#39;s lived for 30 years in Maui and will wear sweaters when it dips below 70F. While he’s always up for an adventure, life and death circumstance and all that not being a problem, it just better not be cold. I can tell he&#39;s having second thoughts about this trip right when we step outside of the terminal. He quickly puts on every piece of clothing he packed.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;We grab a rental car, check-in to a hotel, get a bite to eat, and head to the bank -- &quot;to open a new bank account just in case”… of a zombie apocalypse is my cover story. Turns out the best way to get cash in a hurry, given my constraints, is calling your source bank, asking them to raise the daily limit on your debit account to whatever you need, and having the destination bank perform a cash advance. This essentially looks a typical debit card transaction, but instead of a 50in TV, you get cash. The process took some doing and some waiting, but I got it done. Whew!&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;I call the seller, tell him I&#39;m in town and ready to go. He&#39;s quite surprised because in the same 12-hour period I&#39;m in Maui and then in Texas. Hey, I move quick. I ask for directions. By now it&#39;s about 2pm and time to head out for a 2.5 hour drive to get the car. My dad still has no idea what I’m up to.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;We start getting noticeably WAY out in the boonies, and we have no cell phone reception for miles. That’s when dad finally asks me, “Are we meeting someone out here for business?” I reply, “yes, we&#39;re meeting someone.&quot;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Then it happened, not 60 seconds later, I see the car, sitting perfectly out in an open driveway. It&#39;s red, shiny, gorgeously chromey, and at 1/4 mile away, completely unmistakable.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf4_EovZz_BAiaisk_Dm75NIg7B5MGDiBNvCwgxv8GZEhqYzgjRV-pZSNnfZ78fXxFVIGokOTznLgaDWmDgk4KnMTnkkTPKUQOTe1GWsrdq8T0BAS0LED12RvsmwvVMZqTcfemww/&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf4_EovZz_BAiaisk_Dm75NIg7B5MGDiBNvCwgxv8GZEhqYzgjRV-pZSNnfZ78fXxFVIGokOTznLgaDWmDgk4KnMTnkkTPKUQOTe1GWsrdq8T0BAS0LED12RvsmwvVMZqTcfemww/&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;I slyly point the car out to dad, who doesn’t see it yet, and say inquisitively, &quot;Hey, what&#39;s that car over there?&quot; He squints and instantly says in a more than surprised, curious, and somehow measured tone, &quot;That&#39;s... that&#39;s a 1951 Ford!&quot;&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;“Dad,” I say, &quot;That&#39;s why we&#39;re here.”&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;“What!?” He exclaims, even more confused now than before.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;“See that man coming out of the house over there, he’s expecting us. He&#39;s selling us that car today.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;We&#39;re in the driveway now and dad gets out without a word, surveys the car at 10 feet, barely acknowledging the seller. Like a little boy again, he can’t take his eyes off the car. Clearly, it’s like it&#39;s a dream, and he can&#39;t believe he&#39;s actually seeing this car, his dream car, with his own eyes. Again, you never see these cars anywhere. He mutters, “Oh my God,” obviously overwhelmed. I introduce myself to the seller then stand back quietly to take photos of the moment while the seller introduces his gem. He tells us all about the car, it&#39;s history, and on and on like only true car aficionados can appreciate.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;At long last, I ask the most important question. “Dad, do you want this car?” He&#39;s not quite sure how to answer, but clearly, it&#39;s a “yes.” I pay the man and then let dad know we have to either drive or trailer his ‘new’ car back to California for shipping. He opts for the former. Obvious to anyone sane, driving an untested 60 year old car 2,000 miles cross country, is ill advised. But whatever, this car was getting back to Maui. Nothing was going to stop that from happening now. My dad tells me he would have bought this car even if the engine was missing.&amp;nbsp;&lt;img alt=&quot;😉&quot; height=&quot;16&quot; src=&quot;blob:https://www.blogger.com/39e03ab3-1933-4b76-8bbe-d02ce014f330&quot; style=&quot;background-color: white; color: #050505; font-size: 11.5pt;&quot; v:shapes=&quot;Picture_x0020_1&quot; width=&quot;16&quot; /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;We return the rental car and set out for a LONG drive back to the California’s SF Bay area to ship out the car to Maui. I don&#39;t think I drove the car for the first 1,000 miles of the journey. Hah! We had a handful of various close calls along the way, but overall nothing major. Hundreds of people waved at us along the way. Everyone from the motorcycle gangs to others in high-end BMW&#39;s. The car performed amazingly well by any standard. We&#39;ve dropped it off for shipping and it took a few weeks to get to its new home in Maui, Hawaii.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;background-color: white; color: #050505; font-family: verdana; font-size: 11.5pt;&quot;&gt;Remember, we’re all here on earth for just a tiny moment in time. Make it count. Take the time, MAKE the opportunity, and be open to spontaneous adventure with the people you love. No matter what happens, you’ll be happy that you did.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/3241392921227061271/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/3241392921227061271' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/3241392921227061271'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/3241392921227061271'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2020/12/a-1951-ford-for-dad.html' title='A 1951 Ford for Dad'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfObO-X9m1WA11RFoqi-DwrC285cxshzScPlivDu5nzWpreuArIhyphenhyphenqQVh5PiXMd7T6HFjjq2nYmcQotiEE90s-dpXPNTl2s0q85T8jGTQ0ZzyFHHOvnRWqv0eb4AQt0xwMC48OwA/s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-2260924740863160757</id><published>2018-08-29T10:03:00.000-07:00</published><updated>2018-08-29T10:03:13.960-07:00</updated><title type='text'>Evolution of The Press</title><content type='html'>&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;&lt;i&gt;Below is a working theory on the evolution of The Press in the United States as it relates to their relationship with the government and the people. I expect to continue refining the theory as new perspectives and competing ideas are discussed.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Phase 1) &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;TL/DR; The press’s primary value in the system is transmitting a message from the government to the people. The press’s customers are their subscribers who purchase news.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Consider the early days of United States of America throughout the late 1700s and 1800s. As elected officials governed and managed the business of a young country, operationally it was crucial they had a way to broadly communicate with their citizens. They needed to let the everyone know that there was a strong hand was on the tiller, that the people are safe, and they can sleep well at night.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Imagine government’s options to communicate across the country. Think about the technology that was available. How ideas and thoughts were recorded and how they were transmitted. There was no radio. There was no television. There certainly wasn’t an Internet. Ink and paper was the state of the art. While the government could physically write down their message, outside of standing at podiums surrounded by small local gatherings of people or leafletting, they did not have a scalable means of transmitting their message to the masses. So, the government and the country needed assistance. This need is where an entity called “The Press” established it’s value in the larger system — transmission of the government’s messages.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;The press had journalists with the necessary tools to record the government’s message down &lt;u&gt;on paper&lt;/u&gt;, who would perform some amount of fact checking, and then package the information as a cohesive and largely transcribed story. The press also had access to a new invention called the printing press enabling them to productize the message, such as a newspaper. And most importantly, the press created channels of distribution, such as horses automobiles, and the telephone to deliver the message to a variety of locations where it could be easily purchased. Put simply, the process was the press would be invited in by the government to document their message, print a large number of copies of newspapers, and then make the materials widely available to the people where the had the opportunity to buy it.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;This predominately was the value the press provided to the system — transmission. Of course it was important for the press to be mindful about what they printed, particularly the accuracy and relevancy of the message, otherwise people might stop paying for it in favor of another newspaper. The people depended upon the credibility of the press to tell the story right. Let’s not forget this. This dynamic between the government, the press, and the people carried through until about the 40s and 50s when the radio and television began changing the paradigm.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Phase 2) &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;TL/DR; The press’s value proposition in split between transmitting the government’s message to the people to telling them how to think about the message. The press’s customers are their subscribers and advertisers.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Over time communications technology advanced and became far more affordable. Radio became common place in society and television sets started appearing in the average U.S. household in the early 1950s. With these modern tools the government could transmit their message directly to the people across the country and cut out the middleman — the press. The government no longer exclusively needed the press to get its message out to the masses.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;And since the government could bring their message directly to the people, and the country was in a more stable position, they didn’t necessarily have to always help people sleep at night. In fact, often the opposite was true. Causing some amount of fear actually helped the government further consolidate their power. As a result, the press needed to find a new way to provide value to the system, beyond just message transmission, in order to maintain their survival.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;During this period the press began shifting their value proposition from solely message transmission to &lt;u&gt;telling people how to think about the government’s message&lt;/u&gt;. The press would take the governments message, create a compelling narrative to help people interpret the story, and transmit their product to the masses over the television and radio airwaves. As a product, this method of news packaging and delivery was attractive to people. There had become a significant increase of information to parse from a variety of sources, too much for any one individual to decide what was important to consume. The Ted Koppel’s and Tom Brokaw’s of the television news world became the credible sources of the press and filled a void left by the government to help the country sleep well at night.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;There were a couple of problems the press needed overcome though. For example, it was not possible for the press to make money with electronically broadcast news in the same way they did with print media. It was not mechanically possible to charge viewers or listeners for news transmitted electronically. The press’s solution was sponsored advertising. News content accompanied by commercials. As such, the more people that watched and listened, and the longer they did so, the more valuable their advertising slots became. Another challenge the press needed to overcome with television and radio was that the physical time available to watch or listen to content was more limited. There is far more space to pack in far more content into the pages of a daily newspaper than what’s possible in a couple of hours of daily broadcast news spots.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Collectively, the new adversing-based business model and a limited amount of space for content changed how the press covered the government’s message in two profound ways. First, it shifted the priority for the transmission and accuracy of the message as their main value proposition in favor of whatever kept people watching and listening. And secondly, the press had to be more choosey with what message and narrative filled the available time and what didn’t. Furthermore, the press had to narrowly cater to a particular demographic of person with their content than what was originally necessary with print. In television and radio the more the news captures emotions and attention, the better the press does financially.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Fast forward several decades under these conditions and the people begin to clearly see a lot of bias in the press and an agenda. And while bias and agenda is certainly present, how could there NOT be, but in this context it’s best not to think the press is taking a principled stand. They’re not. Instead think of their bias and agenda as simply the press’s way of focusing their product at a particular customer like any business would. The press is drawing a circle around a suitable demographic for their product and value proposition, which again is to both transmit the government’s message and tell people how to think about in a way that helps to maximize ears and eyeballs. For example, there effectively isn’t a left-wing or right-wind press in a truly principled manner. The exact opposite is true. There are left-wing and right-wing people where the press tailor makes a narrative based on the government’s message that is compelling to them.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Phase 3)&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;;&quot;&gt;TL/DR; The press’s value proposition is telling people how to think about the government’s &amp;nbsp;message. The press’s customers are advertisers.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Enter the Internet in the early 1990s where transmission of information had become easy and inexpensive for everyone, and not just within the United States, but the entire modern world. The government no longer needed the press to transmit their message to the people at all. The government could transmit directly to the people or the people could go directly to the government. No middleman required. Without anyone needing the press for message transmission, as a business, print media fell off a cliff in under two decades. &lt;u&gt;For survival sake, the press had to complete the transition away from transmission of the government’s message as a value proposition to nearly exclusively telling people how to think about it.&lt;/u&gt; That’s all of value they offer and in doing so message accuracy can be sacrificed whenever necessary. And of course the press’s content is heavily layered with advertisements.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;As is turns out, the best way to attract more viewers for longer is to connect on a deep emotional level. Do whatever you can to rile up your viewers and they’ll continue coming back for more, even share the content forward to others in their social group, where even more ads can be lucratively served. Press outlets such as Fox News, CNN, MSNBC, and more all cross the political spectrum have strongly adopted this approach. The press outlets that didn’t adapt, died. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;As a product, these sources offer people a compelling and packaged way to validate their worldview — and THAT’s what keep the press ultimately credible and trustworthy in their minds. As evidence notice how the Ted Koppel’s and Tom Brokaw’s of the press have been replaced by Alex Jones, Bill O’Reilly, Keith Olbermann and Don Lemon’s. Is this change of their starting lineup designed to give viewers access to more accurate news or instead get people emotionality invested? Even when the press is demonstrably biased, factually incorrect, call it ‘Fake News’ if you like, it’s extremely difficult for people to suddenly distrust the press they decided to loyally watch for so long and find another compelling source. Perception becomes reality and exists long after the occasional and quietly posted retraction.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;b&gt;Phase 4) TL/DR; If via the Internet people once again adopt a direct paid-for news model, the press’s primary value become providing people with an individually relevant, timely, and accurate news source of the government’s message.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Going forward into the future, many feel there is a demand for relevant, timely, and accurate news sources. News that’s devoid of the influences of advertisements and paid directly by the people. Several press outlets have set-up paywalls and the business model is showing signs of success. All people have to do is register an account on a website or mobile application and supply a credit card online to become a subscriber. Another business model is micro-payments, where viewers pay for their content a la carte — by the article. A relatively new web browser named &lt;a href=&quot;https://brave.com/&quot; target=&quot;_blank&quot;&gt;Brave&lt;/a&gt;, which includes ad blocking, offers native push button micro-payment functionality which supports participating content publishers.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;Here’s the thing: If any transition back to directly paid-for news truly starts gaining enough traction to threaten to the ad-based model, fierce resistance by the advertising industry is sure to follow. Google and Facebook, which dominate the online advertising industry, who along side many others who make all their billions annually off ‘free’ content, will do everything they can to prevent the transition. Their livelihoods depend on it. Regardless, if it so happens that the paid-for model once again takes hold, many positive externalities may also come with it. Fake news goes away. Click-bait headlines go away. Online spam goes away. Privacy invading ads go away. All of these shady practices found on the Internet depend wholly on advertisements to function. The adoption of &lt;a href=&quot;https://www.ublock.org/&quot; target=&quot;_blank&quot;&gt;ad blockers&lt;/a&gt;, which now stands over 20% marketshare, indicates that people are making a choice, even if they aren’t yet paying for their content. Broad access to new technology is once again causing a shift in the press and how the government communicates it’s message.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 11px; font-stretch: normal; line-height: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/2260924740863160757/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/2260924740863160757' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/2260924740863160757'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/2260924740863160757'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2018/08/evolution-of-press.html' title='Evolution of The Press'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-4593583049839863833</id><published>2018-07-17T17:38:00.002-07:00</published><updated>2018-07-17T17:39:57.622-07:00</updated><title type='text'>The evolutionary waves of the penetration-testing / vulnerability assessment market</title><content type='html'>Over the last two decades the penetration-testing / vulnerability assessment market went through a series of evolutionary waves that went like this…&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #38761d;&quot;&gt;&lt;i&gt;&lt;b&gt;1st Wave&lt;/b&gt;: “You think we have vulnerabilities and want to hire an employee to find them? You’re out of your mind!&quot;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The business got over it and InfoSec people were hired for the job.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #38761d;&quot;&gt;&lt;i&gt;&lt;b&gt;2nd Wave&lt;/b&gt;: &quot;You want us to contract with someone outside the company, a consultant, to come onsite and test our security? You’re out of your mind!&quot;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The business got over it and consultant pen-testing took over.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #38761d;&quot;&gt;&lt;i&gt;&lt;b&gt;3rd Wave&lt;/b&gt;: &quot;You want us to hire a third-party company, a scanning service, to test our security and store the vulnerabilities off-site? You’re out of your mind!’&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The business got over it and SaaS-based vulnerability assessments took over.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #38761d;&quot;&gt;&lt;i&gt;&lt;b&gt;4th Wave&lt;/b&gt;: &quot;You want us to allow anyone in the world to test our security, tell us about our vulnerabilities, and then reward them with money? You’re out of your mind!&quot;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Businesses are getting over it and the crowd-sourcing model is taking over.&lt;br /&gt;
&lt;br /&gt;
The evolution reminds us of how the market for ‘driving’ and ‘drivers’ changed over the last century. People first drove their own cars around, then many hired personal drivers, then came along cars-for-hire services (cabs / limos) with ‘professional’ drivers that you didn’t personally know, and now to Uber/Lyft where you basically jump into some complete stranger’s car. Soon, we’ll jump into self-drivers cars without a second thought.&lt;br /&gt;
&lt;br /&gt;
As we see, each new wave doesn&#39;t necessarily replace the last -- it&#39;s additive. Provided there is an economically superior ROI and value proposition, people also typically get over their fears of the unknown and will adopt something new and better. It just takes time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/4593583049839863833/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/4593583049839863833' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/4593583049839863833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/4593583049839863833'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2018/07/the-evolutionary-waves-of-penetration.html' title='The evolutionary waves of the penetration-testing / vulnerability assessment market'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-6377458357795111086</id><published>2018-05-07T11:38:00.000-07:00</published><updated>2018-05-07T11:45:36.891-07:00</updated><title type='text'>All these vulnerabilities, rarely matter.</title><content type='html'>&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;-webkit-text-stroke-width: initial; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;There is a serious misalignment of interests between Application Security vulnerability assessment vendors and their customers. Vendors are incentivized to report everything they possible can, even issues that rarely matter. On the other hand, customers just want the vulnerability reports that are &lt;u&gt;likely&lt;/u&gt; to get them hacked. Every finding beyond that is a waste of time, money, and energy, which is precisely what’s happening every day. Let’s begin exploring this with some context:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Within any Application Security vulnerability statistics report published over the last 10 years, they’ll state that the vast majority of websites contain one or more serious issues — typically dozens. To be clear, we’re NOT talking about website infected with malvertizements or network based vulnerabilities that can trivially found via Shodan and the like. Those are separate problems. I’m talking exclusively about Web application vulnerabilities such as SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery, and several dozen more classes. The data shows only half of those reported vulnerabilities ever get fixed and doing so take many months. Pair this with &lt;a href=&quot;https://news.netcraft.com/archives/2018/04/26/april-2018-web-server-survey.html&quot; target=&quot;_blank&quot;&gt;Netcraft’s data that states there’s over 1.7B sites on the Web&lt;/a&gt;. Simple multiplication tells us that’s A LOT of vulnerabilities in the ecosystem laying exposed.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;The most interesting and unexplored question to me these days is NOT the sheer size of the vulnerability problem, or why so many issue remain unresolved, but instead figuring out &lt;/span&gt;&lt;span style=&quot;font-kerning: none; text-decoration: underline;&quot;&gt;&lt;b&gt;why all those ‘serious’ website vulnerabilities are NOT exploited. &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Don’t get me wrong, a lot of websites certainly do get exploited, perhaps on the order of millions per year, but it’s certainly not in the realm of tens or even hundreds of millions like the data suggests it could be. And the fact is, for some reason, the vast majority of plainly vulnerable websites with these exact issues remain unexploited for years upon years.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Some possible theories as to why are:&lt;/span&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;These ‘vulnerabilities’ are not really vulnerabilities in the directly exploitable sense.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The vulnerabilities are too difficult for the majority of attackers to find and exploit.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The vulnerabilities are only exploitable by insiders.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;There aren’t enough attackers to exploit all or even most of the vulnerabilities.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;There are more attractive targets or exploit vectors for attackers to focus on.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Other plausible theories?&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;As someone who worked in the Application Security vulnerability assessment vendor for 15+ years, here is something to consider that speaks to theory #1 and #2 above.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;During the typical sales process, ‘free’ competitive bakeoffs with multiple vendors is standard practice. &lt;b&gt;9 out of 10 times, the vendor who produces the best results in terms of high-severity vulnerabilities with low false-positives will win the deal. As such, every vendor is heavily incentivized to identify as many vulnerabilities as they can to demonstrate their skill and overall value. &lt;/b&gt;Predictively then, every little issue will be reported, from the most basic information disclosure issues to the extremely esoteric and difficult to exploit. No vendor wants to be the one who missed or didn’t report something that another vendor did and risk losing a deal. More is always better. As further evidence, ask any customer about the size and fluff of their assessment reports.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Understanding this, the top vulnerability assessment vendors invest millions upon millions of dollars each year in R&amp;amp;D to improve their scanning technology and assessment methodology to uncover every possible issue. And it makes sense because this is primarily how vendors win deals and grow their business.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Before going further, let’s briefly discuss the reason why we do vulnerability assessments in the first place. &lt;b&gt;When it comes to Dynamic Application Security Testing (DAST), specifically testing in production, the whole point is to find and fix vulnerabilities BEFORE an attacker will find and exploit them. &lt;/b&gt;It’s just that simple. And technically, it just takes the exploitation of one vulnerability for the attacker to succeed.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Here’s the thing: &lt;b&gt;if attackers really aren’t finding, exploiting, or even caring about these vulnerabilities as we can infer from the supplied data — the value in discovering them in the first place becomes questionable. &lt;/b&gt;The application security industry industry is heavily incentivized to find vulnerabilities that for one reason or another have little chance of actual exploitation. If that’s the case, &lt;b&gt;then all those vulnerabilities that DAST is finding rarely matter much and we’re collectively wasting precious time and resources focusing on them.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Let’s tackle Static Application Security Testing (SAST) next.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;&lt;b&gt;The primary purpose of SAST is to find vulnerabilities during the software development process BEFORE they land in production where they’ll eventually be found by DAST and/or exploited by attackers.&lt;/b&gt; With this in mind, we must then ask what the overlap is between vulnerabilities found by SAST and DAST. If you ask someone who is an expert in both SAST and DAST, specifically those with experience in this area of vulnerability correlation, they’ll tell you the overlap is around 5-15%. Let’s state that more clearly, &lt;b&gt;somewhere between 5-15% of the vulnerabilities reported by SAST are found by DAST.&lt;/b&gt; And let’s remember, from an I-dont-want-to-be-hacked perspective, DAST or attacker-found vulnerabilities are really the only vulnerabilities that matter. Conceptually, SAST helps find them those issues earlier. But, does it really? I challenge anyone, particularly the vendors, to show actual broad field evidence.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Anyway, what then are all those OTHER vulnerabilities that SAST is finding, which DAST / attackers are not?&amp;nbsp; Obviously, it’ll be some combination of theories #1 - #3 above. They’re not really vulnerabilities, they’re too difficult to remotely find/exploit, or attackers don’t care about them. In either case, what’s the real value for the other 85-95% of vulnerabilities reported by SAST? A: Not much. If you want to know why so many reported &#39;vulnerabilities&#39; aren’t fixed, this is your long-winded answer.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;This is also why cyber-insurance firms feel comfortable writing policies all day long, even if they know full well their clients are technically riddled with vulnerabilities, because statistically they know those issues are unlikely to be exploited or lead to claims. That last part is key — claims. &lt;b&gt;Exploitation of a vulnerability does not automatically result in a ‘breach,’ which does not necessarily equate to a ‘material business loss,’ and loss is the only thing the business or their insurance carrier truly cares about. &lt;/b&gt;Many breaches do not result is losses. This is an crucial point that many InfoSec pros are unable to distinguish between — breach and loss. They are NOT the same thing.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;So far we’ve discussed the misalignment of interests between Application Security vulnerability assessment vendors and their customers. The net-result of which is that that we’re wasting huge amounts of time, money, and energy finding and fixing vulnerabilities that rarely matter. If so, the first thing we need to do is come up with a better way to prioritize and justify remediation, or not, of the vulnerabilities we already know exist and should care about. Secondly, we must more efficiently invest our resources in the application security &lt;/span&gt;&lt;span style=&quot;font-kerning: none; text-decoration: underline;&quot;&gt;testing&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt; process.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;We’ll begin with the simplest risk formula: probability (of breach) x loss (expected) = risk.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Let’s make up some completely bogus numbers to fill in the variables. In a given website we know there’s a vanilla SQL Injection vulnerability in a non-authenticated portion of the application, which has a 50% likelihood of being exploited over a year period. If exploitation results in a material breach, the expected loss is $1,000,000 for incident handling and clean up. Applying our formula:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;$1,000,000 (expected loss) x 0.5 (probability of breach) = $500,000 (risk)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;In which case, in can be argued that if the SQL injection vulnerability in question costs less than $500,000 to fix, then that’s the reasonable choice. And, the sooner the better. If remediation costs more than $500,000, and I can’t imagine why, then leave it as is. &lt;b&gt;The lesson is that the less a vulnerability costs to fix the more sense it makes to do so. &lt;/b&gt;Next, let’s change the variables to the other extreme. We’ll cut the expected loss figure in half and reduce the likelihood of breach to 1% over a year.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;$500,000 (expected loss) x 0.01 (probability of breach) = $5,000 (risk)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Now, if vulnerability remediation of the SQL Injection vulnerability costs less than $5,000, it makes sense to fix it. If more, or far more, then one could argue it makes business sense not to. This is the kind of decision that makes the vast majority of information security professionals extremely uncomfortable and instead why they like to ask the business to, “accept the risk.” This way their hands are clean, don’t have to expose their inability to do risk management, and can safely pull an, “I told you so,” should an incident occur. Stating plainly, &lt;b&gt;if your position is recommending that the business should fix each and every vulnerability immediately regardless of the cost, then you’re really not on the side of the business and you will continue being ignored.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;What’s needed to enable better decision-making, specifically how to decide what known vulnerabilities to fix or not to fix, is a purpose-built risk matrix specifically for application security. A matrix that takes each vulnerability class, assigns a likelihood of actual exploitation using whatever available data, and containing an expected loss range. Where things will get far more complicated is that the matrix should take into account the authentication status of the vulnerability, any mitigating controls, the industry, resident data volume and type, insider vs external threat actor, a few other things to improve accuracy.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;While never perfect, as risk modeling never is, I’m certain we could begin with something incredibly simple that would far outperform our the way we currently do things — HIGH, MEDIUM, LOW (BLEH!). When it comes to vulnerability remediation, how exactly is a business supposed to make good informed decisions about remediation using traffic light signals?&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;As we’ve seen, and as all previous data indicates, they don’t. Everyone just guesses and 50% of issues go unfixed.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;-webkit-text-stroke-width: initial; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;-webkit-text-stroke-width: initial; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;InfoSec&#39;s version of the traffic light: This light is green, because in most places where we put this light it makes sense to be green, but we&#39;re not taking into account anything about the current street’s situation, location or traffic patterns. Should you trust that light has your best interest at heart? &amp;nbsp;No. &amp;nbsp;Should you obey it anyway? &amp;nbsp;Yes. Because once you install something like that you end up having to follow it, no matter how stupid it is.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;Assuming for a moment the aforementioned matrix is created, all of a sudden it fuels the solution to the lack of efficiency in the application security testing process. Since we’ll know exactly what types of vulnerabilities we care about in terms of actual business risk and financial loss, investment can be prioritized to only look for those and ignore all the other worthless junk. Those bulky vulnerability assessment reports would likely dramatically decrease in size and increase in value.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;If we really want to push forward our collective understanding of application security and increase the value of our work, we need to completely change the way we think. We need to connect pools of data. Yes, we need to know what vulnerabilities websites currently have — that matter. We need to know what vulnerabilities various application security testing methodologies actually test for. Then we need to overlap this data set with what vulnerabilities attackers predominately find and exploit. And finally, within that data set, which exploited vulnerabilities lead to the largest dollar losses.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-kerning: none;&quot;&gt;If we can successfully do that, we’ll increase the remediation rates of the truly important vulnerabilities, decrease breaches AND losses, and more efficiently invest our vulnerability assessment dollars. Or, we can leave the status quo for the next 10 years and have the same conversations in 2028. We have work to do and a choice to make.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/6377458357795111086/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/6377458357795111086' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/6377458357795111086'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/6377458357795111086'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2018/05/all-these-vulnerabilities-rarely-matter.html' title='All these vulnerabilities, rarely matter.'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-7107186748606235202</id><published>2018-03-27T05:00:00.000-07:00</published><updated>2018-03-27T14:53:28.032-07:00</updated><title type='text'>My next start-up, Bit Discovery</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTSOPldyv6nRy1Yg5wXxms63oiwfKBHDni67ngeFdowGsQJNicP9M9UKIoVyZe-vvMWCydLpI4qB6PyXdwpO52CjhM0kFNJ8t7kZStDd31cHLs1sQeBTSwvb48i4PC4iTLSiSeiQ/s1600/bitdiscovery_logo.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;72&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTSOPldyv6nRy1Yg5wXxms63oiwfKBHDni67ngeFdowGsQJNicP9M9UKIoVyZe-vvMWCydLpI4qB6PyXdwpO52CjhM0kFNJ8t7kZStDd31cHLs1sQeBTSwvb48i4PC4iTLSiSeiQ/s320/bitdiscovery_logo.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;b&gt;The biggest and most
important unsolved problem in Information Security, arguably all of IT, is
asset inventory&lt;/b&gt;. Rather, the lack of an up-to-date asset inventory that
includes all websites, servers, databases, desktops, laptops, data, and so on.
Strange as it sounds, the vast majority of organizations with more than even a
handful of websites simply do not know what they are, where they are, what they
do, or who is responsible for them. This is also strange because an asset
inventory is the first step of every security standard and recommended by every
expert.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;After many of
years of research, it turns out the reason why is rather simple: There are
currently no enterprise-grade products, or at least anything widely adopted, that
solves this problem. This is important because obviously it’s impossible to
secure what you don’t know you own. And, without an up-to-day asset inventory, the
most basic and reasonable security questions simply can’t be answered:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;What percentage of our websites have been tested for vulnerabilities?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;Which of our websites have GDPR, PCI-DSS, or other compliance concerns?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;Which of our websites are up-to-date on their patches, or not?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;An organization has been acquired, what IT assets do they have?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;As of today, with
&lt;a href=&quot;https://bitdiscovery.com/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Bit Discovery&lt;/b&gt;&lt;/a&gt;, all of this is about to change. &lt;a href=&quot;https://bitdiscovery.com/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;BitDiscovery&lt;/b&gt;&lt;/a&gt; is a website asset inventory solution designed to be lightning fast,
super simple, and incredibly comprehensive. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;While identifying
the websites owned by a particular organization may sound simple at first blush,
let me tell you, it’s not. In fact, asset inventory is probably the most
challenging technical problem I’ve ever worked on in my entire career. As
&lt;a href=&quot;https://twitter.com/RSnake&quot; target=&quot;_blank&quot;&gt;Robert ‘RSnake’ Hansen’s&lt;/a&gt;, member of &lt;b&gt;Bit Discovery’s&lt;/b&gt; &lt;a href=&quot;https://bitdiscovery.com/about&quot; target=&quot;_blank&quot;&gt;founding team&lt;/a&gt; &lt;a href=&quot;https://www.smartphoneexec.com/outsideintel-acquired-by-bit-discovery/&quot; target=&quot;_blank&quot;&gt;describes in glorious detail&lt;/a&gt;, the variety of challenges are absolutely astounding. Just in terms of
cpu, memory, disk, bandwidth, software and scalability in general, we’re
talking about a legitimate big data problem.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;Then there’s the
challenges that websites may exist on different IP-ranges, domains, hosting
providers, fall under a variety of marketing brands, managed by various
subsidiaries and partners, confused by domain typo-squatters and phishing scams,
and may come and go without warning. Historically, finding all of an
organizations websites is typically conducted through on-demand scanning seeded
by a domain name or IP-address range. For anyone who has ever tried this model,
they know it’s tedious, time consuming (hours, days, etc), and false-positive
and false-negative prone. It became clear that solving the asset inventory
problem required a completely different approach.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;b&gt;Bit Discovery&lt;/b&gt;,
thanks to the acquisition and integration of &lt;a href=&quot;https://www.outsideintel.com/&quot; target=&quot;_blank&quot;&gt;OutsideIntel&lt;/a&gt;, is unique because we
take routine snapshots of the entire Internet, organizing massive amounts of
information (WHOIS, passive DNS, netblock info, port scans, web crawling, etc.),
extract metadata, and distil it down to simple and elegant asset inventory
tracking. As a completely web-based application, this is what gives &lt;b&gt;Bit
Discovery&lt;/b&gt; its incredible speed and comprehensiveness. Instead of waiting days
or weeks for an asset discovery scan to complete, searches take just seconds
or less. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;After years of
hard work and months private beta product testing with dozens of Fortune 500
companies, we’re finally ready to officially announce &lt;b&gt;Bit Discovery&lt;/b&gt; and just weeks
away from our first full production release. I’m particularly proud and
personally honored to be joined by an absolutely world-class founding team. As
an entrepreneur you couldn’t ask for a better, more experienced, or inspiring
group of people. All of us have worked together for many years on a variety of
projects, and we’re ready for our next adventure! Our vision is that every
organization in the world needs an asset inventory, which includes what we like
to say, “Every. Little. Bit.”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;Founding Team (5):&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;a href=&quot;https://www.linkedin.com/in/grossmanjeremiah/&quot; target=&quot;_blank&quot;&gt;Jeremiah Grossman&lt;/a&gt;
(CEO)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;a href=&quot;https://www.linkedin.com/in/roberthansen3/&quot; target=&quot;_blank&quot;&gt;Robert ‘RSnake’Hansen&lt;/a&gt; (Chief Technology Office)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;a href=&quot;https://www.linkedin.com/in/llanagrossman/&quot; target=&quot;_blank&quot;&gt;Llana Grossman&lt;/a&gt;
(Product Management)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;a href=&quot;https://www.linkedin.com/in/lexarquette/&quot; target=&quot;_blank&quot;&gt;Lex Arquette&lt;/a&gt;
(Head of Engineering)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&lt;a href=&quot;https://www.linkedin.com/in/heather-konold-b388a020/&quot; target=&quot;_blank&quot;&gt;Heather Konold&lt;/a&gt;
(Chief of Staff)&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;Investment (&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;$2,700,000, led by &lt;a href=&quot;http://www.alignedvc.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;mso-bidi-font-weight: bold;&quot;&gt;Aligned&lt;/span&gt;&amp;nbsp;Partners&lt;/a&gt;)&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;: &lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;As you can see, our
goals at &lt;b&gt;Bit Discovery&lt;/b&gt; are extremely ambitious and we need strong financial backing
fully realize them. As part of the company launch, we’re also thrilled to
announce a $2,700,000 early stage round led by Susan
Mason (Managing Partner, &lt;a href=&quot;http://www.alignedvc.com/&quot; target=&quot;_blank&quot;&gt;Aligned&lt;/a&gt;&lt;a href=&quot;http://www.alignedvc.com/&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;Partners&lt;/a&gt;).
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;During our fund
raising process, we interviewed well over a dozen exceptional venture
capitalist firms, and we were very picky in the process. &lt;span style=&quot;mso-bidi-font-weight: bold;&quot;&gt;Aligned&lt;/span&gt;’s experience, style, and
investment approach matched with us perfectly. Their team specializes in
experienced founding teams who have been-there-and-done-that, who operate
companies in a capital efficient manner, who know their market and customers
well, and where the founders and investors interests are in alignment. That’s
us and we couldn’t be happier with the partnership.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: 260.45pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: 260.45pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;And,
as Steve Jobs would say, “one more thing.” Every company can benefit from the
assistance and personal backing by other highly experienced industry professionals.
The funding round includes individual investments by &lt;a href=&quot;https://twitter.com/alexstamos&quot; target=&quot;_blank&quot;&gt;Alex Stamos&lt;/a&gt; (Chief of
Information Security, Facebook), &lt;a href=&quot;https://twitter.com/thedarktangent&quot; target=&quot;_blank&quot;&gt;Jeff Moss&lt;/a&gt; (Founder, Black Hat and Defcon), &lt;a href=&quot;https://twitter.com/manicode&quot; target=&quot;_blank&quot;&gt;JimManico&lt;/a&gt; (Founder, Manicode Security), and &lt;a href=&quot;https://www.linkedin.com/in/brianmulveyio/&quot; target=&quot;_blank&quot;&gt;Brian Mulvey&lt;/a&gt; (Managing Partner, PeakSpan
Capital).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: 260.45pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: 260.45pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;Collectively,
between &lt;b&gt;Bit Discovery’s&lt;/b&gt; founding team and investor group, I’ve never seen or
heard of a more experienced and accomplished team that brings everything
together for a company launch. We have everything we need for a runaway
success story. We have the right team, the right product, the right financial
partners, and we’re at the right time in the market. All we have to do is put in
the work, serve our customers well, and the rest will take care of itself. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: 260.45pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: 260.45pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;;&quot;&gt;Finally,
the &lt;b&gt;Bit Discovery&lt;/b&gt; team wants to personally thank all the many people who helped
us along the way and behind the scenes. We sincerely appreciate everyone’s
help. We couldn’t have gotten this far without you. Look out world, we’re ready
to do this!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: 260.45pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/7107186748606235202/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/7107186748606235202' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7107186748606235202'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7107186748606235202'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2018/03/my-next-start-up-bit-discovery.html' title='My next start-up, Bit Discovery'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTSOPldyv6nRy1Yg5wXxms63oiwfKBHDni67ngeFdowGsQJNicP9M9UKIoVyZe-vvMWCydLpI4qB6PyXdwpO52CjhM0kFNJ8t7kZStDd31cHLs1sQeBTSwvb48i4PC4iTLSiSeiQ/s72-c/bitdiscovery_logo.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-8193452800712625202</id><published>2018-03-09T09:00:00.000-08:00</published><updated>2018-03-09T09:20:20.276-08:00</updated><title type='text'>SentinelOne and My New Role </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCyhl4-5L2uwb4grk6q8XA8rY4DDhyphenhyphenrVsr3HuRADI6YO3kb9hqFrZ-tj3I3WO0OV4XG6I0LgfWoayxLfBbqLaSF1tYZQYHr9zXy2RTvdNFvqh4yMwbprh2CKQCWTNAKPW8sXocIw/s1600/orig3041707_SentinelOne_Logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;239&quot; data-original-width=&quot;409&quot; height=&quot;116&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCyhl4-5L2uwb4grk6q8XA8rY4DDhyphenhyphenrVsr3HuRADI6YO3kb9hqFrZ-tj3I3WO0OV4XG6I0LgfWoayxLfBbqLaSF1tYZQYHr9zXy2RTvdNFvqh4yMwbprh2CKQCWTNAKPW8sXocIw/s200/orig3041707_SentinelOne_Logo.jpg&quot; width=&quot;200&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://blog.jeremiahgrossman.com/2016/06/im-joining-fight-against-malware-and.html&quot; target=&quot;_blank&quot;&gt;Two years ago, I joined SentinelOne as Chief of Security Strategy&lt;/a&gt; to help in the fight against malware and ransomware. I’d been following the evolution of ransomware for several years prior, and like a few others, saw that all the ingredients were in place for this area of cyber-crime to explode.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;We knew it was likely that a lot of people were going to get hurt, that significant damage could be inflicted, and something needed to be done. The current anti-malware solutions, even the most popular, were ill-equipped to handle the onslaught. Unfortunately, we weren’t wrong, and that was about the time I was first introduced to &lt;a href=&quot;https://www.sentinelone.com/&quot; target=&quot;_blank&quot;&gt;SentinelOne&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;When I met SentinelOne, it was just a tiny Silicon Valley start-up. It was quickly apparent to me that they had the right team, the right technology, and most importantly – the right vision necessary to make a meaningful difference in the world. SentinelOne is something special, a place poised for greatness, and an opportunity where I knew I could make a personal impact. The time was right for me, so I made the leap! Today, only a short while later, SentinelOne is a major player in the endpoint protection with super high aspirations.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Since joining I have had a front row seat to several global ransomware outbreaks including WannaCry, nPetya, and other lesser-known malware events as the SentinelOne team &quot;laid the hardcore smackdown&quot; on all of them. One particularly memorable event was WannaCry launching at the exact moment I was on stage giving a keynote presentation to raise awareness about ransomware. Quite an experience, but also a proud moment as all of our customers remained completely protected. One can&#39;t hope for better than that!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;On SentinelOne&#39;s behalf, I have had the unique opportunity to participate in the global malware dialog, learn a ton more about the information security industry, continue helping protect hundreds of companies, and something I’m personally proud of: launch the first ever product warranty against ransomware ($1,000,000). I contributed to some cutting-edge research alongside some truly brilliant and passionate people. It’s been a tremendous experience, one which I’m truly thankful for.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;I wish I had all the time in the world to pursue all of my many interests, which as an entrepreneur, is one of my greatest challenges. For me, it will soon be time to announce and launch my next adventure -- a new startup! I’ll share more details in a few weeks, but it’s something my co-founders and I have been quietly working on for years.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;The best part is that I don’t have to say goodbye to SentinelOne. I’ll be moving into a company advisory role. This way I still get to remain connected, in-the-know and continue helping SentinelOne achieve its full potential.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;For now, a very special thank you to everyone at SentinelOne, especially Tomer Weingarten (Co-Founder, CEO) for leading the charge and allowing me to be a part of the journey.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/8193452800712625202/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/8193452800712625202' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/8193452800712625202'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/8193452800712625202'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2018/03/sentinelone-and-my-new-role.html' title='SentinelOne and My New Role '/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCyhl4-5L2uwb4grk6q8XA8rY4DDhyphenhyphenrVsr3HuRADI6YO3kb9hqFrZ-tj3I3WO0OV4XG6I0LgfWoayxLfBbqLaSF1tYZQYHr9zXy2RTvdNFvqh4yMwbprh2CKQCWTNAKPW8sXocIw/s72-c/orig3041707_SentinelOne_Logo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-4754850541714395688</id><published>2017-04-18T14:04:00.001-07:00</published><updated>2017-04-18T14:18:39.841-07:00</updated><title type='text'>The Ad-Tech Industry Must Finally Admit That Their Product (Ads) is Dangerous</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: inherit; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;How would you react if I told you that computer security experts are six times more likely to run just an ad blocking software on their PCs, over just anti-malware? Would you be surprised? &lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b id=&quot;docs-internal-guid-871c2f1e-82d8-5be9-a576-cb63a91507a0&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM-AAgX4-tomuFOoDgkIpjZhvdJi305Z534GDeVOI4X7WkPYfZ3g9QQ8cwAEvLiW9jvpCb3TJlsXCWwhB6mclj5rgmZfieJpodKJrGzBjivv1oBqdeKE1PkIcUn3btcX6HejRinA/s1600/Screen+Shot+2017-04-18+at+1.58.21+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;186&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM-AAgX4-tomuFOoDgkIpjZhvdJi305Z534GDeVOI4X7WkPYfZ3g9QQ8cwAEvLiW9jvpCb3TJlsXCWwhB6mclj5rgmZfieJpodKJrGzBjivv1oBqdeKE1PkIcUn3btcX6HejRinA/s320/Screen+Shot+2017-04-18+at+1.58.21+PM.png&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;That was the &lt;/span&gt;&lt;a href=&quot;https://twitter.com/jeremiahg/status/774048835689512960&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: #1155cc; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;result from a Twitter poll&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; I conducted last year, in which more than 1,000 self-identified computer security experts shared that they are more concerned about ads than malware. While social media polls are admittedly unscientific, I’d argue these numbers are actually pretty close to reality, which means that roughly three-out-of-four computer security experts largely view ad-blocking as a more indispensable part of protection than anti-virus software by far. Let that sink in for a moment.&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiKpW3RNLpz09LaEzQFbrqpwmOmPzcn3GqNGM0Zv6fbTBjr_CojRQX1sJcgDmD6ANdJ30LAFtV-UgeoUv8uF8C02sApcblHBTmc-RBAxbqCoBtACggZTNIRkjIMVcgJdAE5mqVoA/s1600/Screen+Shot+2017-04-18+at+1.58.30+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwUF1URL0xvr8GS5uWKQ3N7ipgKREGOM9ATNuob07Oso-YkQwYpBTnFnjh0JgLok2dGFVobxCn_gf1vaxNIK9mJg_FVSXoyklmQNICdj-GnuFYcGzmUh31BnJ5CBr93CxhZ1sIbw/s1600/CgYRDK0W8AA2hxn.jpg-large.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiKpW3RNLpz09LaEzQFbrqpwmOmPzcn3GqNGM0Zv6fbTBjr_CojRQX1sJcgDmD6ANdJ30LAFtV-UgeoUv8uF8C02sApcblHBTmc-RBAxbqCoBtACggZTNIRkjIMVcgJdAE5mqVoA/s1600/Screen+Shot+2017-04-18+at+1.58.30+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;167&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiKpW3RNLpz09LaEzQFbrqpwmOmPzcn3GqNGM0Zv6fbTBjr_CojRQX1sJcgDmD6ANdJ30LAFtV-UgeoUv8uF8C02sApcblHBTmc-RBAxbqCoBtACggZTNIRkjIMVcgJdAE5mqVoA/s320/Screen+Shot+2017-04-18+at+1.58.30+PM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Malvertising, or malicious ads, are hurting people – a lot of people. Anyone who is familiar with the malware problem will tell you that. &lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/technology/2016/mar/16/major-sites-new-york-times-bbc-ransomware-malvertising&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: #1155cc; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;As just one example of many&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, last year ads appeared on the New York Times, BBC, AOL, NFL and other popular websites in a malicious campaign attempting to install “ransomware” on visitors’ computers. To put things into context, the chances are better that the average internet user - &lt;/span&gt;&lt;a href=&quot;https://twitter.com/jeremiahg/status/840275529760559104&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: #1155cc; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;roughly 99 percent of the population - will be hacked via their own browser then they will by a nation-state&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. The reason for this? Online ads.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: black; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: black; font-family: inherit; font-size: 12pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwUF1URL0xvr8GS5uWKQ3N7ipgKREGOM9ATNuob07Oso-YkQwYpBTnFnjh0JgLok2dGFVobxCn_gf1vaxNIK9mJg_FVSXoyklmQNICdj-GnuFYcGzmUh31BnJ5CBr93CxhZ1sIbw/s1600/CgYRDK0W8AA2hxn.jpg-large.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;239&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwUF1URL0xvr8GS5uWKQ3N7ipgKREGOM9ATNuob07Oso-YkQwYpBTnFnjh0JgLok2dGFVobxCn_gf1vaxNIK9mJg_FVSXoyklmQNICdj-GnuFYcGzmUh31BnJ5CBr93CxhZ1sIbw/s320/CgYRDK0W8AA2hxn.jpg-large.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;I understand the business model… really, I do. Publishers rely on their viewers seeing ads because that’s how they make their money. In return they provide all of us with free content and services. If ads are blocked, publishers make less money, and the free content and services dries up. On the other hand, these same ads are one of the leading threats to personal security and privacy. So, what we have here is an online version of a &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Mexican_standoff&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-size: 12pt; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Mexican standoff&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: black; font-size: 12pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. Neither side is able to proceed without exposing themselves to danger.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;color: black; font-family: inherit; font-size: 12pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;So here we are without many technical options: &amp;nbsp;the only thing internet users can do to protect themselves is to install an ad blocker (&lt;/span&gt;&lt;a href=&quot;https://www.nytimes.com/2017/01/31/technology/ad-blocking-internet.html&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;color: #1155cc; font-size: 12pt; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;like hundreds of million of users have already done&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: black; font-size: 12pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;); and the only thing a publisher can do is to use an ad blocker detector on their website(s). &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: inherit; font-size: 12pt; white-space: pre-wrap;&quot;&gt;This allows them to decide to block content and/or issue a plea to whitelist their ads. Unfortunately, the technology model for publishers to ‘safely’ include third-party content such as ads into their pages is also lacking. There just isn’t a comprehensive and scalable way to check billions of ads daily to see if they’re safe to distribute – or if the origin of an ad is reputable. &lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Of course, publishers can also supplement or replace advertising revenue streams with a paid-for-content model, hosting &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;conferences, asking for donations, and so on.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: 12pt; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit; font-size: 12pt; white-space: pre-wrap;&quot;&gt;Let&#39;s also be very clear— neither the publisher, advertisers, or the ad-tech industry that binds everything together takes on any liability for malvertising, infecting a user with malware, or the resultant damage. This also means that they have zero incentives to meaningfully address the problem, and never ever seem to want to talk about the security concerns that make ad blocking an essential security practice. They only want to talk about the money their side is losing, or how to make ads more visually tolerable. But even if ads magically become less obnoxious and less costly in terms of bandwidth, we still have the security problem. Until the advertising technology industry admits that their product - the ads themselves - &amp;nbsp;are simply dangerous, there can be no real resolution.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/4754850541714395688/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/4754850541714395688' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/4754850541714395688'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/4754850541714395688'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2017/04/the-ad-tech-industry-must-finally-admit.html' title='The Ad-Tech Industry Must Finally Admit That Their Product (Ads) is Dangerous'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM-AAgX4-tomuFOoDgkIpjZhvdJi305Z534GDeVOI4X7WkPYfZ3g9QQ8cwAEvLiW9jvpCb3TJlsXCWwhB6mclj5rgmZfieJpodKJrGzBjivv1oBqdeKE1PkIcUn3btcX6HejRinA/s72-c/Screen+Shot+2017-04-18+at+1.58.21+PM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-563228408864988893</id><published>2017-02-20T21:52:00.001-08:00</published><updated>2017-10-16T12:11:54.817-07:00</updated><title type='text'>InfoSec warranties and guarantees </title><content type='html'>&lt;div style=&quot;background-color: white; border: 0px; margin-bottom: 12px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;segoe ui&amp;quot; , &amp;quot;segoe ui emoji&amp;quot; , &amp;quot;segoe ui symbol&amp;quot; , &amp;quot;lato&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: inherit; font-size: 14px;&quot;&gt;This is a living list of InfoSec companies who offer warranties and guarantees on their various products and services. If you know of others that should be on the list, please comment.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;segoe ui&amp;quot; , &amp;quot;segoe ui emoji&amp;quot; , &amp;quot;segoe ui symbol&amp;quot; , &amp;quot;lato&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-family: inherit; font-size: 14px;&quot;&gt;&lt;a href=&quot;http://blog.cymmetria.com/new-warranty-program-against-advanced-persistent-threats-apts&quot; target=&quot;_blank&quot;&gt;Cymmetria&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.knowbe4.com/ransomware-guarantee&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 14px;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;KnowBe4&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://www.astechconsulting.com/astech-guarantee&quot; target=&quot;_blank&quot;&gt;AsTech Consulting&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.astechconsulting.com/press-release/astech-expands-paragon-security-program-guarantee-against-data-breach-related-costs-to-5-million?utm_content=57425852&quot; target=&quot;_blank&quot;&gt;press release&lt;/a&gt;),&lt;/span&gt;&amp;nbsp;&lt;a href=&quot;https://www.astechconsulting.com/astech-managed-qualys-services&quot; target=&quot;_blank&quot;&gt;Vigilance&lt;/a&gt; / Qualys (&lt;a href=&quot;https://www.astechconsulting.com/astech-vigilance-guaranteed-managed-qualys-services-terms-conditions&quot; target=&quot;_blank&quot;&gt;terms&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.waratek.com/no-false-positive-guarantee/&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 14px;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Waratek&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://sentinelone.com/wp-content/uploads/2016/07/Brochure-Ransomware-Vertical-Online.pdf&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 14px;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;SentinelOne&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.trusona.com/news/2016/5/16/worlds-first-insured-authentication-provides-1m-coverage-per-financial-transaction&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 14px;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Trusona&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.whitehatsec.com/terms-conditions/sentinel-elite-april-28-2015/&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 14px;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;WhiteHat Security&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://www.symantec.com/content/en/us/about/media/repository/netsure-protection-plan.pdf&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot; target=&quot;_blank&quot;&gt;Symantec&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;&amp;amp; &lt;/span&gt;&lt;a href=&quot;https://us.norton.com/how-we-protect-you/money-back-guarantee&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot; target=&quot;_blank&quot;&gt;Norton (money-back)&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.mcafee.com/consumer/en-us/store/m0/catalog/mav_512/mcafee-antivirus-plus.html?pkgid=512&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;McAfee (money-back)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://www.trustwave.com/Services/Managed-Security/Zero-Malware-Guarantee/&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot; target=&quot;_blank&quot;&gt;Trustwave&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.hipaasecurenow.com/&quot; target=&quot;_blank&quot;&gt;HIPAA Secure New&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://www.forcepoint.com/security-service-level-agreement&quot; target=&quot;_blank&quot;&gt;Forcepoint&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.avira.com/en/service-level-agreement&quot; target=&quot;_blank&quot;&gt;Avira&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.proofpoint.com/sites/default/files/30427798_proofpoint_essentials_sla_-_pfpt_august_08152015.pdf&quot; target=&quot;_blank&quot;&gt;Proofpoint&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.digicert.com/docs/agreements/DigiCert_RPA.pdf&quot; target=&quot;_blank&quot;&gt;DigiCert&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://blog.comodo.com/pc-security/was-the-company-that-sold-you-your-network-security-system-confident-enough-in-its-product-to-include-a-5000-guarantee/&quot; target=&quot;_blank&quot;&gt;Comodo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.armor.com/cyber-warranty/&quot; target=&quot;_blank&quot;&gt;Armor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.verizondigitalmedia.com/platform/edgecast-cdn/cdn-performance/&quot; target=&quot;_blank&quot;&gt;Verizon (100% uptime SLA)&lt;/a&gt;, &lt;a href=&quot;https://twitter.com/tzaw/status/918613602872918016&quot; target=&quot;_blank&quot;&gt;including DDoS&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/563228408864988893/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/563228408864988893' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/563228408864988893'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/563228408864988893'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2017/02/infosec-warranties-and-guarantees.html' title='InfoSec warranties and guarantees '/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-1673251183900409606</id><published>2017-02-01T15:58:00.001-08:00</published><updated>2017-02-01T15:58:27.469-08:00</updated><title type='text'>InfoSec Start-up Advising and Product Recommendations</title><content type='html'>&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;As a long-time InfoSec veteran and entrepreneur, I’m often asked by company founders to join their advisory board and lend a hand. Sometimes the founders need someone with experience they can trust to bounce ideas off of, provide guidance on how to scale their business, point out the many pitfalls to avoid, make key introductions, and so on. I’ve been in this advisor role for many years, as well as mentoring more than fifty young businesses over the last five years alone through a startup incubator. Making this contribution has been highly rewarding, both personally and professionally. It leverages the many successes and mistakes I’ve made in my career to help others. Advising and mentoring is something I plan to continue doing for the foreseeable future. The only downside is that due to time constraints, I have to be extremely selective.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;When I come across a hot new start-up, I fully research the company, try out the product, research their target market, meet the management team, speak with a handful of customers, and if I have something useful to offer, only then do I feel comfortable enough to get involved. Oh, another requirement is that none should be competitive with one another. Because I do my homework and have a deep understanding of the information security industry, I’m often asked by colleagues what companies I’d recommend in a particular space or a product to solve a particular enterprise problem. For those interested, below is where I’ve placed my bets and what I’m recommending.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;i&gt;&lt;b&gt;Full Disclosure&lt;/b&gt;: I’ve a financial interest in most of these companies below, but not all of them. And if I don&#39;t have a stake, it doesn&#39;t mean I won&#39;t recommend them -- I can be just as impressed otherwise. I’ve also indicated where I serve in an official advisory capacity.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Anti-Bot&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://www.funcaptcha.com/about/&quot; target=&quot;_blank&quot;&gt;FunCAPTCHA&lt;/a&gt; (Advisory Board)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;“FunCaptcha is the fastest and most effective way to protect your website from spam and abuse. We stop billions of spammers every year for clever brands that monetize their registrations and content.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Anti-Virus / Endpoint Protection (Enterprise)&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://sentinelone.com/&quot; target=&quot;_blank&quot;&gt;SentinelOne&lt;/a&gt; (Employed)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;SentinelOne unifies endpoint threat prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated, integrated response capabilities, and adapt their defenses against the most advanced cyber attacks.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Bug Bounty / Security Crowd-Sourcing&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://bugcrowd.com/&quot; target=&quot;_blank&quot;&gt;Bugcrowd&lt;/a&gt;&amp;nbsp;(Advisory Board)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;&quot;&lt;/span&gt;&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;The pioneer and innovator in crowdsourced security testing for the enterprise, Bugcrowd harnesses the power of tens of thousands security researchers to surface critical software vulnerabilities and level the playing field in cybersecurity. Bugcrowd also provides a range of responsible disclosure and managed service options that allow companies to commission a customized security testing program that fits their specific requirements. Bugcrowd’s proprietary vulnerability disclosure platform is deployed by Tesla, Pinterest, Western Union, Fitbit and many others.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Website Vulnerability Assessment&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://www.whitehatsec.com/&quot; target=&quot;_blank&quot;&gt;WhiteHat Security&lt;/a&gt; (Founder)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;WhiteHat Security is the leading provider of website risk management solutions.&amp;nbsp;&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;Sentinel, WhiteHat&#39;s flagship product, is the most accurate, complete and cost-effective website vulnerability management solution available. It delivers the flexibility, simplicity and manageability that organizations need to take control of website security and prevent Web attacks. WhiteHat Sentinel is built on a Software-as-a-Service (SaaS) platform designed from the ground up to scale massively, support the largest enterprises and offer the most compelling business efficiencies, lowering your overall cost of ownership.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Security Risk and Vulnerability Intelligence&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://www.kennasecurity.com/&quot; target=&quot;_blank&quot;&gt;Kenna Security&lt;/a&gt;&amp;nbsp;(Advisory Board)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknesses. Kenna automates the correlation of vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches so that InfoSec teams can prioritize remediations and report on their overall risk posture.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Security-in-the-SDLC / Security Requirements&amp;nbsp;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://www.securitycompass.com/sdelements/&quot; target=&quot;_blank&quot;&gt;SD Elements&lt;/a&gt;&amp;nbsp;(Advisory Board)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;SD Elements automates software security requirements based on your project’s technology, business and compliance drivers. SD Elements eliminates security vulnerabilities in the most cost effective way, before scanning begins.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; font-variant-ligatures: normal; orphans: 2; white-space: pre-wrap; widows: 2;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-variant-ligatures: normal; orphans: 2; white-space: pre-wrap; widows: 2;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;AppSec&amp;nbsp;&lt;/span&gt;Vulnerability&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;&amp;nbsp;Remediation&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; orphans: 2; white-space: pre-wrap; widows: 2;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; orphans: 2; white-space: pre-wrap; widows: 2;&quot;&gt;&lt;a href=&quot;https://www.astechconsulting.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;AsTech Consulting&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-variant-ligatures: normal; orphans: 2; white-space: pre-wrap; widows: 2;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;AsTech Consulting is a security consulting company which helps clients understand their risks and what to do about them.  As independent security specialists, we employ very experienced security professionals, more than half of which have over 15 years of relevant experience.&quot;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; orphans: 2; white-space: pre-wrap; widows: 2;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Runtime Application Self-Protection (RASP)&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; orphans: 2; white-space: pre-wrap; widows: 2;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;a href=&quot;https://www.prevoty.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Prevoty&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-variant-ligatures: normal; orphans: 2; white-space: pre-wrap; widows: 2;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;Prevoty provides a new RASP (runtime application self-protection) capability, enabling applications to protect themselves. Unlike traditional security approaches that try to defend against hackers at the network layer, Prevoty works inside the application itself and the analysis engine is smart enough to actively prevent anything malicious from executing. &quot;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Browser Security &amp;amp; Privacy&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;a href=&quot;https://www.brave.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Brave&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;-webkit-text-stroke-width: initial;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;We have a mission to save the web by increasing browsing speed and safety for users, while growing ad revenue share for content creators.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/1673251183900409606/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/1673251183900409606' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/1673251183900409606'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/1673251183900409606'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2017/02/infosec-start-up-advising-and-product.html' title='InfoSec Start-up Advising and Product Recommendations'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-7587367622224853168</id><published>2016-10-20T12:12:00.003-07:00</published><updated>2016-10-20T12:14:07.729-07:00</updated><title type='text'>What keeps me in the security industry</title><content type='html'>&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Helvetica; line-height: normal;&quot;&gt;
It’s common for long-time information experts like myself to be asked what keeps us in the security industry. Some say it’s a good stable job that nicely pays the bills. Others find the work interesting and enjoy the constant intellectual challenge. Some the like the people, the community, the culture, and exchange of ideas. Of course for many, it be some combination of all these things. For myself, while each of the above plays a part, I must admit those haven’t been my core reasons to stay on for a long time now.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Helvetica; line-height: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Helvetica; line-height: normal;&quot;&gt;
Like I’ve said many times in the past, the Internet is single greatest invention we’re likely to witness in our lifetime. The Internet is a place that now connects over 2 billion people. The Internet is how we communicate and keep up with friends and family. It’s where we shop. It’s how we learn about ourselves and the world. It’s where bank and pay bills. It’s what entertains us and how we get from place to place. It’s how we better ourselves. Entire economies are now dependent on the Internet. If you think about it, we’re often more open and honest about our most intimate secrets with the Google search box than any our closest confidants. There is not a single person among us, or perhaps anyone we know, that won’t be online today. Something this important, this vital to the world and to humanity, must be protected. The Internet.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Helvetica; line-height: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Helvetica; line-height: normal;&quot;&gt;
The time each of us has in this life is limited and far too short. Every day is a gift. And in that time few people ever get an opportunity to be a part of something greater than themselves. A chance to make an impact and to do something that truly matters. Internet security matters. So for me, to play even a small part in helping to protect the Internet and the billions of people connected feels like a good way to spend ones life time. That’s why I’m still here.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Helvetica; line-height: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Helvetica; line-height: normal;&quot;&gt;
In the immortal words of Dan Geer, “There is never enough time. Thank you for yours.”&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/7587367622224853168/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/7587367622224853168' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7587367622224853168'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7587367622224853168'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2016/10/what-keeps-me-in-security-industry.html' title='What keeps me in the security industry'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-82909076058889441</id><published>2016-06-06T15:13:00.001-07:00</published><updated>2016-06-06T15:36:08.674-07:00</updated><title type='text'>I&#39;m joining the fight against malware and ransomware with SentinelOne</title><content type='html'>&lt;span style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.reuters.com/article/us-sentinelone-grossman-idUSKCN0YS0WW&quot; target=&quot;_blank&quot;&gt;Today&lt;/a&gt; &lt;a href=&quot;http://www.securityweek.com/whitehat-founder-jeremiah-grossman-joins-sentinelone&quot; target=&quot;_blank&quot;&gt;is a big&lt;/a&gt; &lt;a href=&quot;http://www.internetnews.com/blog/skerner/famed-whitehat-security-founder-joins-sentinelone.html&quot; target=&quot;_blank&quot;&gt;day for&lt;/a&gt; &lt;a href=&quot;http://solutionsreview.com/endpoint-security/sentinelone-hires-whitehat-founder-jeremiah-grossman-as-chief-of-security-strategy/&quot; target=&quot;_blank&quot;&gt;me&lt;/a&gt;. I’m contributing to a company called &lt;a href=&quot;https://sentinelone.com/&quot; target=&quot;_blank&quot;&gt;SentinelOne&lt;/a&gt;, but I really don’t think of it as a job. I’ve accepted an opportunity to work side by side with other brilliant and highly motivated people where we’re all helping to solve important and challenging InfoSec problems. In this case, malware and ransomware. You see, more than anything, I want to make a positive impact on InfoSec. As I’ve said many times, we who work InfoSec are responsible for protecting the greatest invention we’ll see if our lifetime — the Web, the Internet, and the billions of people using it every day. That’s our mission, our calling. As such, I’ve always kept a evolving list of our industries biggest challenges, which I include in most of my slide decks.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Intersection of security guarantees and cyber-insurance&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Explosion of Ransomware&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Vulnerability remediation&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Industry skill shortage&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Measuring the impact of SDLC security controls&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The only problem on the list I haven’t gotten the chance to work on is ransomware, an incredibly effective and fast-growing form of malware that’s taking over. I’ve long railed hard about the crap antivirus products on the market and the billions of dollars people and companies spend annually to effectively make themselves less secure. Yes, that’s right, I said LESS secure. The &lt;a href=&quot;http://www.latimes.com/nation/la-na-0407-cyber-hospital-20160407-story.html&quot; target=&quot;_blank&quot;&gt;FBI recently published that ransomware&lt;/a&gt; victims paid out $209 million in Q1 2016 compared to $24 million for ALL of 2015. Some non-trivial percentage of those ransom dollars will be used for R&amp;amp;D, so the smart money says ransomware will quickly get even more sophisticated and out of hand. And to that point, in recent and well publicized news, ransomware is also responsible for disrupting the care of patients in a few hospitals. This can’t be allowed — lives are at risk!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://blog.jeremiahgrossman.com/2016/03/my-last-days-at-whitehat-and-setting.html&quot; target=&quot;_blank&quot;&gt;In my life after WhiteHat&lt;/a&gt;, I looked at ton of companies and interesting opportunities where I could lend a helping hand, of which there was no shortage. My inbox was crushed with many worthy projects, but I knew I had to choose wisely. Then out pops a company with some super cool tech and few have heard of them, SentinelOne. SentinelOne is right smack in the middle of the malware/ransomware war, for which Gartner calls next-generation endpoint protection (NG EPP). I met with the founders, the team, all super cool and passionate people. A real gem of a start-up. I felt strongly that I needed to join this fight. Plus, I’ll be working on some exciting stuff behind that scenes that I can’t wait to share with world. Good things take time, so please, standby!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/82909076058889441/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/82909076058889441' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/82909076058889441'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/82909076058889441'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2016/06/im-joining-fight-against-malware-and.html' title='I&#39;m joining the fight against malware and ransomware with SentinelOne'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-1053110133398552464</id><published>2016-05-23T13:59:00.002-07:00</published><updated>2016-05-23T14:02:08.044-07:00</updated><title type='text'>Life is Better without Username Reuse (email aliases FTW!)</title><content type='html'>&lt;div style=&quot;line-height: normal;&quot;&gt;
Facebook, LinkedIn, Amazon, PayPal, Yahoo, Google. We keep accounts with many of these websites. They and many others use email addresses as the first half of the classic username and password combo. They do this because email addresses are unique and double as a reasonably secure communication channel with the user. And of course we often sign-up for things online to receive information by entering our email address. All this email address sharing, while technically nothing being wrong with it, unfortunately causes several highly annoying problems. These problems can be solved, or at least made far easier to deal with, by leveraging email address aliases. An email alias is where you create one or more email addresses that all send to the same account, vaguely similar to desktop folder shortcuts.&lt;br /&gt;
&lt;br /&gt;
With email address sharing / username reuse, by far the biggest problem we run into is spam. And the more we share and reuse our email addresses across systems, the bigger the spam problem becomes. Sometimes websites sell our email addresses. Other times they share them with third-partie business partners, and from time to time they get leaked in a data breach. Whatever the case, once an email address is out there, it’s out there. No taking it back and no amount of mailing list opting out will help. I know. I’ve tried.&lt;br /&gt;
&lt;br /&gt;
There are other problems too. Anyone who knows your email address can easily determine what systems you’re using (i.e. “This email address is already registered.”). This issue is not only a privacy issue, but a potential security issue as it makes it easier to target your account via brute force, phishing, password recovery hacks, etc. And of course when you have several online accounts, you’re constantly notified via email, which explodes your inbox. Creating rules in your email app using strings in the subject or content body helps, but doing so isn’t easy and never comprehensive. When all these problems are tied to your email email address, there is no escape. You can’t easily kill or change your main email address because all your friends, family, and business contacts use it too.&lt;br /&gt;
&lt;br /&gt;
My solution to these problems, which has been working great, is by using email address aliases based on custom domain name. For example, my personal domain is jeremiahgrossman.com. So as an example, I create a new email alias that’s just for Facebook, like fb@jeremiahgrossman.com. Or on Paypal it would be pp@jeremiahgrossman. You can technically use any email alias for this purpose, even a random one. When email is sent to these aliases they automatically forward to my main email address. I never reuse these email address aliases for any other than their intended use, and never use my main email address to register for anything if I can help it.&lt;br /&gt;
&lt;br /&gt;
It does cost a few bucks to pay for domain name and email hosting, but it ain’t much these days and the value is WAY worth it. When things are set up this way, I can be reasonably sure that any email to these aliases, that is supposedly from them, is legit and not a phishing scam because no one else knows the email address / username I used. And since the particular website is only using the email address alias I gave them, inbox rules are way easier.&lt;br /&gt;
&lt;br /&gt;
Then if the email address is leaked, gets spammed out, or whatever, I can just kill it off, create another, and change the account email address / username. The up front work is a little tedious, but again, worth it. And the best part, when you have your own domain name, email aliases are essentially free — I’ve about 100 now. And there is no reason you can’t use any old crap domain name either.&lt;br /&gt;
&lt;br /&gt;
Good luck!&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/1053110133398552464/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/1053110133398552464' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/1053110133398552464'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/1053110133398552464'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2016/05/life-is-better-without-username-reuse.html' title='Life is Better without Username Reuse (email aliases FTW!)'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-7303489062770230673</id><published>2016-05-18T11:20:00.002-07:00</published><updated>2016-05-18T11:22:14.789-07:00</updated><title type='text'>Millions experience serious computer security problems and have no one to call for help</title><content type='html'>&lt;div class=&quot;Body&quot;&gt;
A couple times a week, people I may or may not know reach out to
me for help because they’re experiencing some kind of computer security
catastrophe. Sometimes the situation is serious, other times not. They might be
dealing with an online bank account takeover, online scam, data breach, malware
infection, identity theft, and the list goes on and on from there. Whatever the
circumstance, a great many people often find themselves thrust into the deep
end of this technology driven world, without the know-how to solve the problem
on their own, and no one to call for help. These experiences are especially
painful for the elderly and small-business owners, whose livelihood are
disrupted, and the stress takes a toll on them. Personally, I hate it when good
people get taken advantage of.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
In the most recent case, I was introduced to the founder of a TV
and movie production company through a mutual friend. They explained that
someone is messing with their website and actively using their company name to
scam their business contacts. They said ‘hacked,’ but that could mean anything
these days. The situation was causing them real brand damage, and with over a
dozen show titles to their credit, the business impact is severe. Even over the
impersonal medium of email, you could sense a deep feeling of helplessness and
desperation. As you might expect, I tend to keep myself happily occupied with
family, work, and martial arts and don’t have a lot of time to spare for things
like this. But, this plea originated from a good friend, the victim didn’t have
anyone else to turn to, and helping out felt like the right thing to do.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
After taking a call and exchanging a few emails, I got the real
story. Someone, a scammer, registered an incredibly similar domain name to the
legitimate one used by the production company. The fake domain name was being
used to create a clone of the real website. The scammer then subtly changed the
names and photos of the staff and updated the contact information so that any
incoming communication would instead go to them. Through email, phone calls, or
search results visitors would be contacted by the scammer, who pretended to be with
the production company, and would proceed to con their victims out of money.
This is a simple, inexpensive, and effective scam that could happen to
basically anyone – and it does.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
The near-term plan was to get the scam website taken down.
Long-term, try to take ownership over the look-a-like domain name. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
To start, the first thing I needed to know is who owns the
offending domain name. A quick WHOIS lookup revealed the registrar is GoDaddy,
but the domain owner itself was masked by Domains By Proxy, a popular service
for those wishing to preserve their online privacy. I often use this service myself!
This means without going through a legal process, obtaining the real domain
owner information isn’t going to happen. Still, in the event the production
company would like to try and get ownership over the domain using ICANN’s and
trademark law, they have the registrar info to further that process. Next, I
needed to identify where the website is being hosted. The ‘dig’ command easily
gets me the IP address of the cloned website and an ARIN lookup tells me who
the IP address belongs to — the name of the hosting provider. For those curious,
collectively performing these tasks took me far less time than writing this
paragraph.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
Let’s pause our story for a moment to consider the technical
knowledge required to get this far, which includes a set of skills many techies
take for granted and forget that the vast majority of people simply don’t have.
Few people can explain what a domain name is, have any idea what a domain
registrar or an IP address is, what’s WHOIS, or even ICANN. They’ve certainly
never heard of ARIN, and only a vague familiarity with hosting providers for
that matter. And thus far, we’ve only collected purely public&lt;span lang=&quot;FR&quot; style=&quot;mso-ansi-language: FR;&quot;&gt; information &lt;/span&gt;and in doing so reached a
point where most can’t get to on their own. Techies should empathize and
exercise patience with those not nearly as literate in how the Internet works
as we are. Anyway, back to our story.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
Now that we’ve learned who the hosting provider is, I helped the
production company founder draft an email to send that concisely explains the
problem and what we’d like the action to be. Take down the website! Their
website nicely listed the abuse@ email address and I pressed send on the
message. I figured it could be a while for them to get back to us, and in the
meantime decided to take a close look at the scammer’s website.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
Using every web hackers best friend, view-source, I skimmed the
underlying code of the website. Maybe the scammer left clues as to their
identity, tools they used to clone the website, or whatever. In less than 60
seconds, I immediately spotted something very interesting. While the HTML of
the page is hosted locally, all the CSS, images, and most importantly, the
Javascript is being SRC’ed in from the real website! As you’ll see if a moment,
this was a major oversight on the scammer’s part. Are you thinking what I’m thinking?
We’ll see. :)&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot; style=&quot;margin-left: .25in; mso-list: l0 level1 lfo2; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;mso-bidi-font-family: Helvetica; mso-fareast-font-family: Helvetica; mso-hansi-font-family: &amp;quot;Arial Unicode MS&amp;quot;;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;1)&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;In
the logs of the real website, we should be able to ascertain who and how many
people visited the scammers website. Because every time someone visits one of
his web pages, their browser automatically pulls in the aforementioned third-party
content from something we control. This means the visitors IP address is
logged, as is what web page they are currently looking at — called the referer.
And yes, this is intentionally misspelled and a throwback to Internet
antiquity. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot; style=&quot;margin-left: .25in; mso-list: l0 level1 lfo2; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;mso-bidi-font-family: Helvetica; mso-fareast-font-family: Helvetica; mso-hansi-font-family: &amp;quot;Arial Unicode MS&amp;quot;;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;2)&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;If
we have the visitors IP address information, it’s quite likely we also have the
scammer’s too! Provided they didn’t mask that as well. And if they are, that’s
useful bit of information as well. Either way, their IP address is probably the
first one we see the in the logs when the referer of the fake website appeared.
If we decide to go after the bad guy directly, we at least have something to
begin tracking them down with. Subpoenaing the hosting provider or Domains By
Proxy is of course another possible course of action, but we’ll see about that
path later.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot; style=&quot;margin-left: .25in; mso-list: l0 level1 lfo2; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;mso-bidi-font-family: Helvetica; mso-fareast-font-family: Helvetica; mso-hansi-font-family: &amp;quot;Arial Unicode MS&amp;quot;;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;3)&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;This
is the big one. Any web hacker would have quickly theorized that we can
probably modify the javascript on the real website, which again is called by
the fake website, to at least temporarily redirect it’s visitors. And, that’s
exactly what we did! A quick 3-line block of code did just the trick!&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #38761d;&quot;&gt;if (window.location.host != ‘&amp;lt;&lt;a href=&quot;http://real-website.com/&quot;&gt;&lt;span class=&quot;Hyperlink0&quot;&gt;real-website.com&lt;/span&gt;&lt;/a&gt;&amp;gt;&#39;) {&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; window.location = ‘&amp;lt;&lt;a href=&quot;http://real-website.com/&quot;&gt;&lt;span class=&quot;Hyperlink0&quot;&gt;real-website.com&lt;/span&gt;&lt;/a&gt;&amp;gt;’;&lt;br /&gt;}&lt;br /&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
At this moment, we got the production company and visitors of the
scammer’s website some immediate relief. That is until the bad guy notices what
we did and updates their website code, which is trivial to do. Next I ask the
domain registrar (GoDaddy) about the process for taking ownership over &lt;span lang=&quot;FR&quot; style=&quot;mso-ansi-language: FR;&quot;&gt;domain&lt;/span&gt; names that are designed for
abuse. They point us towards an ICANN’s trademark dispute policy and suggested
we consult with a lawyer experienced in such legal measures. I then advise the
founder to seriously consider going down his route.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
A couple days go by, and while we wait for the hosting provider
to respond, we notice the aforementioned redirect stopped working. As expected,
the scammer caught on and fixed their code so that all the web page files now
point locally. Drat! What we did learn is the scammer is sentient, responsive,
and persistent. He didn’t care so much that were we onto his little &lt;span lang=&quot;IT&quot; style=&quot;mso-ansi-language: IT;&quot;&gt;game.&lt;/span&gt;&lt;span lang=&quot;IT&quot;&gt; &lt;/span&gt;Interesting.
Such brazenness indicated that the scammer is probably outside the US
jurisdiction – or optionally just stupid. Then like magic on the same exact
day, and the timing could not have been better, the hosting provider informs us
that they completed their investigation and disable the scammers website.
Success! &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
For now, my work is done and the production company founder profusely
express their thankfulness. This was a good feeling. However, that doesn’t
necessarily mean this is the end of our little story, or that it will be a happy
one. After all, this is the security of the web we’re talking about, and
plainly said, it’s fundamentally broken. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
You see, the scammer can easily set up shop with a new hosting
provider and start the identical scam all over again and there is absolutely
nothing anyone can do to prevent that. There is no good way to help visitors
tell the difference between the real website from the fake one. And even if we
use ICANN’s process to take ownership over the domain name, the scammer could
easily just register another suitable look-a-like domain in no time flat and
we’re back at it all over again. This problem is never ending and there really
is no good way to solve it once and for all. A website owner’s only option is
to wait for something bad to happen, give me or someone else with the right
skills a call for help, and proceed similarly.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
What I can do is actively monitoring the illegitimate domain name
to see when and if it’s IP address changes. If it does, this would indicate
that the scammer is moving hosting providers. It took a couple weeks, and
that’s exactly what appears to be happening right now. Grr. This is kind of
thing happens every day, to who knows how many people, and honestly I’m not
sure what the answer is. One thing I do know, the world needs the help of a lot
more good computer security people. Join in!&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:DocumentProperties&gt;
  &lt;o:Revision&gt;0&lt;/o:Revision&gt;
  &lt;o:TotalTime&gt;0&lt;/o:TotalTime&gt;
  &lt;o:Pages&gt;1&lt;/o:Pages&gt;
  &lt;o:Words&gt;1415&lt;/o:Words&gt;
  &lt;o:Characters&gt;8069&lt;/o:Characters&gt;
  &lt;o:Company&gt;WhiteHat Security&lt;/o:Company&gt;
  &lt;o:Lines&gt;67&lt;/o:Lines&gt;
  &lt;o:Paragraphs&gt;18&lt;/o:Paragraphs&gt;
  &lt;o:CharactersWithSpaces&gt;9466&lt;/o:CharactersWithSpaces&gt;
  &lt;o:Version&gt;14.0&lt;/o:Version&gt;
 &lt;/o:DocumentProperties&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;JA&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;--&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;276&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin:0in;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:10.0pt;
 font-family:&quot;Times New Roman&quot;;
 border:none;}
&lt;/style&gt;
&lt;![endif]--&gt;



&lt;!--StartFragment--&gt;











































































&lt;!--EndFragment--&gt;&lt;br /&gt;
&lt;div class=&quot;Body&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/7303489062770230673/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/7303489062770230673' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7303489062770230673'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7303489062770230673'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2016/05/millions-have-computer-security.html' title='Millions experience serious computer security problems and have no one to call for help'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-8347514571328224051</id><published>2016-05-17T10:39:00.000-07:00</published><updated>2016-05-17T10:41:02.192-07:00</updated><title type='text'>7 Tips to Get the Absolute Best Price from Security Vendors</title><content type='html'>Security budgets are always extremely tight, so it’s smart to get the absolute best price possible from your security vendors. Never ever pay full price, or even take the first quote vendors give you. That price just sets the stage and it’s best to think of it as the ‘dummy price,’ so don’t pay it! I’ve spent nearly two decades sitting at the price negotiation table in the security industry and seen all manner of techniques customers use successfully to win discounts, and more people should use them. Customers, even small ones, can exercise a ton of leverage over their security vendors if they only knew how. And, more often than not, vendors themselves don’t really mind. It signals that a deal is likely to be made and to a vendor, that’s what’s most important.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
While it’s common for large companies to have negotiations handled by a separate department, typically called ‘Procurement,’ many leave the responsibility to whomever is actually making the purchase. In either case, security practitioners can personally say, do, and offer things the procurement department can’t to help obtain the best possible price. Remember, security product margins can range anywhere from 40-60% or even higher. I’ve seen discounts well over 50% of the originally quoted price. Some vendors will even take a loss to win your business, depending on the size of your brand and the reference you’ll provide.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Note: I’m not a big fan of this as you risk not being treated well as a customer long-term. The vendor may decide to drop you later because you’re unprofitable. So, allow vendors to make a profit, just not an obscene one.&lt;/blockquote&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Below you’ll find my ranked list of the most powerful negotiating techniques I’ve come across in the purchasing process, many of which are applicable beyond security purchases…&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;1.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Negotiate Price at Quarter End / Year End&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
More than anything, businesses want financial predictability. They want to be able to plan out, with a high degree of accuracy, precisely how much business is expected to close at least two quarters into the future. Sales forecasting is largely a Sales department function. So when end of the quarter is just a few weeks away, and overall sales volume isn’t where it needs to be, the sales rep (and their bosses) scramble and make concessions to bridge the gap and hit their forecast. The larger the sales forecast gap, and the closer to quarter end, the more desperate they become and more open they’ll be to deep discounts or throwing in additional products / services to sweeten the pot.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Smart customers simply ask sales reps when their quarter or fiscal year ends, just after the vendor asks the customer what their budget range is. So, if you like the product, and you’re likely to buy it, let them know you’ll commit to the purchase in the current quarter, before the end, if they give you a good deal. Vendors will routinely knock 10-30% (or more) off the price, just with the ability to accurately forecast a deal closing. If the vendor is unwilling to work with you and the purchase isn’t urgent, let them know you’re more likely to purchase next quarter, which ads uncertainty to their forecast and they’ll have a decision to make. Rinse. Repeat.&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;2.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Multi-Year Deals&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
As previously mentioned, businesses love predictability. For this reason, subscription-based businesses, like Software-as-a-Service, love predictable renewals rates. Security vendors know that just because you’re a customer this year, it doesn’t automatically mean you’ll be a customer next year — as the market is highly competitive. They know they’ll likely have to negotiate price with existing customers before the contract expires, which comes at a cost of time and sales forecast uncertainly.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To reduce this uncertainly, subscription-based businesses will often give attractive discounts to customers willing to sign up for multi-year deals. Two to three year deals are typical, likely fetching a 5-10% discount, possibly more if you’re willing to pay up front, but we’ll explore this more in a moment. It’s also best to refrain from committing to more than three years for security purchases as it’s difficult to know what the business needs will be that far out, or how the product landscape may have changed in that time.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;3.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Paying In Advance&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
For many security services, such as subscription SaaS products, you pay monthly or quarterly after services are rendered. For the security vendor’s finance department, that means they’re out some amount of money to service you before you pay them for those services. If you like a particular security service and plan to continue having it for a least another year, consider paying for a year or more in advance. For the vendor, having getting cash up front is often attractive and it takes payment uncertainty out of the equation, giving their business additional flexibility. Obviously, the bigger the deal, the better in terms of discounting. This method can win another 5-10% or so in discounts on its own.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;4.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt; Customer Reference, Case Study, Gartner Reference&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
In InfoSec it’s extremely difficult to get customers to speak publicly, or even privately, about their experience with a given security product. When a customer does consent to speak, it’s incredibly powerful, and few things generate more business for security vendors than vocally happy customers. Customers should use this power to their advantage, especially if they really really like a security product and want to see the company do well.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To do this, customers can serve as a reference in a few different ways:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
a.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Private Reference – speaks to other customers&lt;/div&gt;
&lt;div&gt;
b.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Public Reference, Individual – willing to do case studies, press, events, quotes, but as an individual versus the company&lt;/div&gt;
&lt;div&gt;
c.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Public Reference – Company – the company is endorsing the product and brand, including a logo on the vendors website, slides, etc. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
All of this is good and even a non-contractual promise to be a reference can lead to great discounts. As a small warning, many organizations have policies regarding speaking on behalf of the company, so make sure to follow those. If you can find out if the security vendor is in the process of working with Gartner on the magic quadrant of their space, customers who are willing to be a positive reference in this time period are like gold. I’ve personally seen seriously deep discounts here, even free!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;5.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Ask for More Stuff, Not Always Price Discounts&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Let’s say you’re asking for a discount, but for whatever reason the security vendor isn’t agreeable. This could be because they need to keep their average sales price (ASP) above a particular threshold so their business looks good to their board and investors. In these circumstances, you can instead ask for them to throw in things that are more easy for them to give away or commit to.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
a.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Extra subscription time, especially if full deployment will take a while.&lt;/div&gt;
&lt;div&gt;
b.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Additional services or software licenses&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
c.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;A better customer support package.&lt;/div&gt;
d.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Free training.&lt;br /&gt;
&lt;div&gt;
d.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Payment flexility. How and how often payment has to be made.&lt;/div&gt;
&lt;div&gt;
e.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Product roadmap enhancements that’ll better serve you.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In many circumstances, security vendors will find the items on this list easier to give you than discounting the overall deal. You get more, but pay the same.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;6.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Find Out What Others Paid. Competitive Bids.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
When entering pricing discussions, it’s always helpful to know what other customers paid as a point of reference. You may or may not be able to get the same deal as they did, but you want something in at least the general vicinity. There are a couple of ways to obtain this information.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
a.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Ask a colleague you personally know, who has already purchased a product you’re considering. What kind of deal did they get?&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
b.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Ask the vendors for customer references during the evaluation process, which is something all customers should do as a matter of course. Not only ask the reference what they liked and didn’t like about the product, but what they paid.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
c.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Ask the vendor for their competitor’s pricing, and how they compare with it. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In some cases, pricing information is considered confidential, but it doesn’t hurt to ask. Having this pricing research on hand greatly helps get you the best deal possible.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Additionally, you’re probably considering between two or more comparable products to solve a particular security problem. If the products themselves are a toss up, meaning you’d be happy with either option, consider sharing the bids with the competing security vendors. No security vendors want to lose a competitive deal in the last stage simply because the competition slightly edged them on price. You’d be surprised how quickly vendors will knock off 5—10% as a take away from the competition.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;7.&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Go Direct&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Many customers have a preferred reseller, typically called Value Added Resellers (VARs), through which they make their security purchases. Among other things, VARs make vendor management much easier for customers. They’ll help identify security program gaps, document purchase requirements, product selection, answer questions, and more. For the value they add, VARs usually take a roughly 30% margin on each product sale. Then, of course, they can tack on additional dollars for consulting and implementation if there is a need. &amp;nbsp;The remaining 70% of the sale price goes to the security vendor.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Here’s the thing, the business of the VAR is in the first two letters — V.A… &amp;nbsp;VALUE. ADDED. If a VAR is not adding enough value, which is often the case, they’re justifiably not entitled to their 30%. And in these circumstances, the VAR can and should be bypassed to go direct to the security vendor where the customer can get a [30%] discount without costing the vendor anything. And, unless there is a good reason not to, get bids from 3 VARs so they’ll have to fight to get you the best deal – fight to win your business. Often VARs will cut into their own profit margin to land the deal.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
There you have it. Seven ways to help maximize the purchasing power of the security budget. Good luck!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/8347514571328224051/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/8347514571328224051' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/8347514571328224051'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/8347514571328224051'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2016/05/7-tips-for-getting-absolute-best-price.html' title='7 Tips to Get the Absolute Best Price from Security Vendors'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-2362179801799375505</id><published>2016-05-12T17:14:00.000-07:00</published><updated>2016-05-12T18:51:46.786-07:00</updated><title type='text'>From 300 lbs to 200 lbs</title><content type='html'>&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Did you know that one point in my life I was just over 300 pounds? Most don’t, but I was. Then after considerable effort, I got to the 250 pounds range and remained for several years. At the time of this writing, I’m about &lt;/span&gt;&lt;span style=&quot;-webkit-font-kerning: none; font-size: 10px; line-height: normal;&quot;&gt;210 pounds&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;. My goal is to stabilize at around 200 pounds with a body fat of ~10%. If all goes as planned, maybe in 6 months or so I’ll be about where I want to be. At 6’2”, it’s a pretty solid physique. Upon witnessing my physical transformation, many friends and family ask how I’m doing this. “What’s your secret?” Spoiler: I don’t have one.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6Hkcj-3kr91dp-1ATTiFETS1HX3YZVszaZ8NpD9y0MKsnwSbw5k6wRcdFY0H_Rb_wcjWUE3Vx2oJ_V7M_1_nka12mnlfHK2G2bdA5CTlSpFFaKutQjCqZXL3JYLRL7XOmIKmFDQ/s1600/DSC00699.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6Hkcj-3kr91dp-1ATTiFETS1HX3YZVszaZ8NpD9y0MKsnwSbw5k6wRcdFY0H_Rb_wcjWUE3Vx2oJ_V7M_1_nka12mnlfHK2G2bdA5CTlSpFFaKutQjCqZXL3JYLRL7XOmIKmFDQ/s320/DSC00699.jpg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNswe2yGfnsSZ2fxqGittn-01vn8yovR92zpEYIcx6ooR8BC1cpmPZ9slMOeSm0VHL9A6IoNRGiZgwPfyyBm-UyxPRlTsky-f0_qF3SYGNwc-cEPa-_KCVO4SdB3PpGwd9oODjgw/s1600/IMG_6680+3.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNswe2yGfnsSZ2fxqGittn-01vn8yovR92zpEYIcx6ooR8BC1cpmPZ9slMOeSm0VHL9A6IoNRGiZgwPfyyBm-UyxPRlTsky-f0_qF3SYGNwc-cEPa-_KCVO4SdB3PpGwd9oODjgw/s320/IMG_6680+3.JPG&quot; width=&quot;240&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6Hkcj-3kr91dp-1ATTiFETS1HX3YZVszaZ8NpD9y0MKsnwSbw5k6wRcdFY0H_Rb_wcjWUE3Vx2oJ_V7M_1_nka12mnlfHK2G2bdA5CTlSpFFaKutQjCqZXL3JYLRL7XOmIKmFDQ/s1600/DSC00699.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6cSM1l6r6MTjesu2ZE1I60VlNaj8zvWOS8RVnCxb8t4TZhb__JQmfkKz8qPPnyJ74uLaa9rrnvQoou6bYpxb4Db869XQYWEzmnZr81lIkMKAZpSXRpytI8rUSmupd2_kW7bzkUw/s1600/IMG_6686.JPG&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6cSM1l6r6MTjesu2ZE1I60VlNaj8zvWOS8RVnCxb8t4TZhb__JQmfkKz8qPPnyJ74uLaa9rrnvQoou6bYpxb4Db869XQYWEzmnZr81lIkMKAZpSXRpytI8rUSmupd2_kW7bzkUw/s320/IMG_6686.JPG&quot; width=&quot;240&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;Before going any further, let me clearly state that I’m NOT a personal trainer. I’m NOT a nutritionist. And I’m certainly NOT trying to sell anything. This post simply answers the question people ask by listing out my nutrition and exercise regiment. Additionally, while everything I’ve done has undoubtedly improved my overall health, the goal is primarily focused towards improving my performance in combat sports, such as particularly Brazilian Jiu-Jitsu and Mixed Martial Arts. Competing at a high-level requires that I’m very strong, fast, flexible, with good cardio and balance. A lean and muscle-toned physique is most ideal.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYixI9RIlnn7a3kyFZLHDLNG__N_ySWIWHwEAxi0dq8fAePIbeGlJRKFjpqOcuIq50z7HaLuGEfePb4zpCqPv_Lnr-m5D6ZDVnn08jcXWtq_tlbHpZa1zybg9aqL6vmuQYonYA5w/s1600/12778993_10154596775158492_7161580635583267846_o.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYixI9RIlnn7a3kyFZLHDLNG__N_ySWIWHwEAxi0dq8fAePIbeGlJRKFjpqOcuIq50z7HaLuGEfePb4zpCqPv_Lnr-m5D6ZDVnn08jcXWtq_tlbHpZa1zybg9aqL6vmuQYonYA5w/s200/12778993_10154596775158492_7161580635583267846_o.jpg&quot; width=&quot;150&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h3&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;u&gt;&lt;b&gt;Nutrition&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;Food is what fuels my body to perform at my best during each training session. My daily consumption maps as best as I can to the planned physical activity. If I break down and eat something I shouldn’t, it happens, my performance noticeably suffers and I get my butt kicked as a consequence. It sucks. As it turns out, not wanting to get punched in the face, choked, or arm hyper extended is a great motivator!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;Each week I have 4 very hard training days, 2 lighter training days, and 1 rest day. And that’s how I plan out my meals. For most of the last year, I was predominantly eating lean meats, vegetables, and fruit. The Paleo diet is the closest example. Then for the last ~3 months I shifted to a whole-food Vegan diet with some minor exceptions.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Additional nutrition rules I follow:&lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;font-size: 11px; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;No caffeine&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-size: 11px; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;No alcohol&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-size: 11px; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Liquid is primarily water (occasionally iced tea, tea, or carbonated water with lime)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-size: 11px; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;No dairy&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-size: 11px; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Nothing fried&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-size: 11px; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Very little processed food&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-size: 11px; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;No vitamins or supplements (I may include them later at some point)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;h4&gt;
&lt;span style=&quot;font-family: inherit; text-decoration: underline;&quot;&gt;&lt;b&gt;Hard Training Day&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw9oQvPn-k_K9ZGSLlv-Mn4buCf9BEWN-PGS2stmUeZxTombb0Jnr-3LDFU-gpJaDm-mZmJ4CrEvhXZYCGqEsxet_WJM0jSZeS0H8c5f4sOAgmCHyrO5eKkWdHTm2RYdX3mMlHKA/s1600/IMG_6109.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw9oQvPn-k_K9ZGSLlv-Mn4buCf9BEWN-PGS2stmUeZxTombb0Jnr-3LDFU-gpJaDm-mZmJ4CrEvhXZYCGqEsxet_WJM0jSZeS0H8c5f4sOAgmCHyrO5eKkWdHTm2RYdX3mMlHKA/s200/IMG_6109.jpg&quot; width=&quot;200&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;Paleo: To get through my training sessions, 2300 - 2400 calories feels about right. Under 2100 and I would gas out early. Over 2400 and body fat wouldn’t come off. I targeted my protein intake at just under 1g per pound of body weight, which is a good zone according to what many bodybuilders suggest to build muscle. Fat intake at no more than 50g. And of course the rest being the carbs for energy I need for training.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;R&lt;/span&gt;eaching these macros requires several full meals during the day, and timed so my belly isn’t too full during class.&amp;nbsp; And honestly, if you look at the meal plan, its been really hard physically eating so much food. On the upside, while [bad food] cravings are certainly an issue, I was never, ever hungry!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxNTDcxdwxkIINRtAy1xiaZayP6b4KbEW_u6z2aUk9yx3Ga0ww1D_dCux3W3X4LgEF2c3hOZ9fHfOsPSGJU_MKOGMUW7kxBpxH41KTcTKThyphenhyphenjO3roj0SJgIeQQCjl_v7eglzYOOg/s1600/Paleo.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;238&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxNTDcxdwxkIINRtAy1xiaZayP6b4KbEW_u6z2aUk9yx3Ga0ww1D_dCux3W3X4LgEF2c3hOZ9fHfOsPSGJU_MKOGMUW7kxBpxH41KTcTKThyphenhyphenjO3roj0SJgIeQQCjl_v7eglzYOOg/s320/Paleo.png&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;Vegan: On the outset, I didn’t know how my body would react to being Vegan. I didn’t know what the cravings would be like, if I’d have the necessary energy needed, etc. So, I got rid of the whole calorie and macro counting thing. Instead decided to start by simply eating whatever I wanted, whenever I wanted, as long as it was whole-food and vegan, and then fine tune from there. Note that I routinely replace many of the ingredients on the list with suitable replacements as I want to eat a wide variety of food in order to get all the recommended vitamins and minerals.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD6OAd9-eILF6WbXa7mRwJdlZNgj6jzZ8Jyc9bgPDoyNNQ4dmhndqEsjbJWWil194_Q-ehcKGuIfSLJReJsu5uZ9NZJ0BNu7YOruJcCyY4WhcUi1-y-aK7rDe4Ow2EQ9jCpTj06w/s1600/Vegan.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;238&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD6OAd9-eILF6WbXa7mRwJdlZNgj6jzZ8Jyc9bgPDoyNNQ4dmhndqEsjbJWWil194_Q-ehcKGuIfSLJReJsu5uZ9NZJ0BNu7YOruJcCyY4WhcUi1-y-aK7rDe4Ow2EQ9jCpTj06w/s320/Vegan.png&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;While the calorie counts on my Vegan diet are higher than the Paleo version, the weight / fat has been coming off with similar speed. And honestly, I feel notably better being vegan so far and my physical performance has improved. My mind is a bit clearer, joints move easier, and my recovery is faster. Cool eh!?&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;h4&gt;
&lt;span style=&quot;font-family: inherit; text-decoration: underline;&quot;&gt;Light Training&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;Paleo: Take my hard training day meal plan, then drop the calories to 1600 - 1700, mostly from the carbs. Eat just enough food to get through my training and no more.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHq1wwAGNgwnk0TW83qRs4EhMp43y0mAOWoDpCbcLWaBBFaqqqmycq3t4hl5NW8mUmbiHcEUiB10YUAT9t2X156PzK4f0uNG6XAd3HpESS6rLfzAwgwSJezmcGnzGs-OZPAtilUQ/s1600/Paleo+Lite.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHq1wwAGNgwnk0TW83qRs4EhMp43y0mAOWoDpCbcLWaBBFaqqqmycq3t4hl5NW8mUmbiHcEUiB10YUAT9t2X156PzK4f0uNG6XAd3HpESS6rLfzAwgwSJezmcGnzGs-OZPAtilUQ/s320/Paleo+Lite.png&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;Vegan: Same thing, reduce calories mostly from slow burning carbs (oatmeal, sweat potato, etc) down to roughly 1800 as this feels right.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWSyJAXAPQRtVhSwmYSva0Iw61fqpBYF0NyCbPCzNXfRhXIIJWlujTQUtGB0Q9azoNAeUv7jVhWyCZsfeQjqNtp2KV7mkGdyKIw7ik3oF-usCkSRYdr8pstG2k_6g7-yngyZpOMw/s1600/Vegan+Lite.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;202&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWSyJAXAPQRtVhSwmYSva0Iw61fqpBYF0NyCbPCzNXfRhXIIJWlujTQUtGB0Q9azoNAeUv7jVhWyCZsfeQjqNtp2KV7mkGdyKIw7ik3oF-usCkSRYdr8pstG2k_6g7-yngyZpOMw/s320/Vegan+Lite.png&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;In both hard and light training days, I generally stop eating for the day around 5pm — particularly anything containing any sugars, like fruit. The strategy here is that by the time my early morning training starts the next day, my cardio workout will largely burn fat as fuel as all the sugar / carbs in my system have already been metabolized. Then afterwards I can eat again — yay! :)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioZX7iq7aGuqHny5BI_E7U9jR2MnhzKH4uS_rF09BNHm3o68iRP3aylBWVzbK7nvXaNzISCcxIW5zB3VA_8WXQ45Cy-fvzgdnru2uHbl9G6Ilw9afDLxsc22uGtpu0JCYyenPFsA/s1600/12742307_10154592707578492_7899782346294545014_n.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioZX7iq7aGuqHny5BI_E7U9jR2MnhzKH4uS_rF09BNHm3o68iRP3aylBWVzbK7nvXaNzISCcxIW5zB3VA_8WXQ45Cy-fvzgdnru2uHbl9G6Ilw9afDLxsc22uGtpu0JCYyenPFsA/s200/12742307_10154592707578492_7899782346294545014_n.jpg&quot; width=&quot;150&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: inherit; text-decoration: underline;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-kerning: none; text-decoration: underline;&quot;&gt;&lt;span style=&quot;font-family: inherit; text-decoration: underline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-kerning: none; text-decoration: underline;&quot;&gt;&lt;span style=&quot;font-family: inherit; text-decoration: underline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;font-family: inherit; text-decoration: underline;&quot;&gt;Rest Day&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;24 hour fast (no food, but water / tea is ok). While this helps stabilize my insulin levels, it’s also about simple math — and besides, I’m not training at all anyway. Consider that 1 pound of fat equals 3,500 calories. So, by foregoing ~1800 calories per week here, I get to lose an extra 1/2 off the top. Each month, that’s roughly 2 pounds of fat. Awesome!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h3&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;&lt;b&gt;&lt;u&gt;Training / Exercise&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;As mentioned, my exercise is primarily designed for combat sports. Then I mix in some low intensity cardio and weight training to support those activities. Collectively it’s about 4 hard days of training, 2 lighter days, and 1 rest day. Most weeks I’ll miss a session here and there when life gets in the way, but what you see is the plan I set out to accomplish each and every week and whatever happens, happens. I’ll try to get the time back in some other way before reseting on Monday. On the average, I get done about 75% or more of what’s on the list.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH944FSa2y-WQC3UGnhx0sJjCbwIWJJm7hZJPl0mRR1T1962ob8wd6D7nMkBK8IcSpRpyDxWyZA7-zn71drXQtcGHzEhk4T9RwteNActaZageVU_yBgs7M1a7pzES6zBgHgwk2PA/s1600/Screen+Shot+2016-05-11+at+5.56.38+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH944FSa2y-WQC3UGnhx0sJjCbwIWJJm7hZJPl0mRR1T1962ob8wd6D7nMkBK8IcSpRpyDxWyZA7-zn71drXQtcGHzEhk4T9RwteNActaZageVU_yBgs7M1a7pzES6zBgHgwk2PA/s320/Screen+Shot+2016-05-11+at+5.56.38+PM.png&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;The intensity of each class can vary greatly depending on what we’re learning, what I’m physically capable of that day, and so on. Either way, I do the best that I can with a mission of improving … in whatever small amount that might be. And those with a sharp eye, who read this far, might notice that I have a salsa dance class listed. It was recommended by my Muay Thai coach as a way of improving my footwork, timing, and coordination. And, it works! Go figure.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11px; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-kerning: none;&quot;&gt;That’s it. My secret is hard work and dedication, which is basically all anyone needs to accomplish anything in life.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Helvetica; font-size: 11px; line-height: normal; min-height: 13px;&quot;&gt;
&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/2362179801799375505/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/2362179801799375505' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/2362179801799375505'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/2362179801799375505'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2016/05/from-300-lbs-to-200-lbs.html' title='From 300 lbs to 200 lbs'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6Hkcj-3kr91dp-1ATTiFETS1HX3YZVszaZ8NpD9y0MKsnwSbw5k6wRcdFY0H_Rb_wcjWUE3Vx2oJ_V7M_1_nka12mnlfHK2G2bdA5CTlSpFFaKutQjCqZXL3JYLRL7XOmIKmFDQ/s72-c/DSC00699.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-6345134342638251557</id><published>2016-03-07T09:06:00.000-08:00</published><updated>2016-03-07T09:06:44.835-08:00</updated><title type='text'>My last days at WhiteHat and setting sights on the future</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
I’ve said it many times; the Web is probably the greatest invention we’ll see in our lifetime. The Web touches the lives of everyone we know, every family member, every child, every friend, and everyone we meet. The Web connects over two billion people and fuels entire economies. It’s a place where we learn, communicate, and share our closest kept secrets. Something as important as the Web must be protected and I’ve always felt it was a privilege to do so. For the last 15 years, as founder of WhiteHat Security, I’ve done exactly that every single day. WhiteHat has not just changed my life, it has been my life — wholly inseparable. Bittersweet as it is, the end of March will be my last day.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Right now, I’d like to take a moment to reflect. While it’s impossible to measure, I sometimes think about how many hacks didn’t happen — how many people and companies were not hacked — as a result of the work we did at WhiteHat. People have often shared how much we’ve helped them and how important our work is. It’s an amazing feeling knowing that what you do matters. Everyone should be so fortunate. In that sense, WhiteHat is not just another company. It’s something more, much more. WhiteHat represents a mission, an ideal, a state of being. I’ve strived to embody these attributes since Day 1. I’ve always worked tirelessly to be the best at what I do and have had a personal passion for innovation.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;WhiteHat was the first company to adopt a Software-as-a-Service model in Application Security. Though our statistics report that thousands rely upon, we were the first to bring measurable data to the industry. We pioneered the founding of two industry groups, OWASP and WASC. We led the creation of the first AppSec lexicon, the Threat Classification, and the language everyone uses when speaking AppSec. We’ve released much of the most cutting-edge and foundational security research to date, which has raised awareness globally. And we were the first vendor to offer a security guarantee. I’m sure sure I’m missing several other firsts, but already no other company has such a record of industry contribution and market success.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;While I have a lot to be proud of, none of this would have been possible without a great many amazing people and lifelong friends. I’d like to personally thank the hundreds of WhiteHat employees, both past and present, for helping protect the Web and making WhiteHat the success that it is. They are what I’m most proud of and grateful for. Working with you all has been a singular honor. I would also like to send a very special thank you to the over 1,000 customers who believed in me, believed in WhiteHat, and entrusted us to protect them. Your trust and support always meant everything to me. Thank you to our partners all over the world who brought us to their customers and championed our cause. And thank you to the security community, the lifeblood of the entire industry, and who carry us all.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Of course many will be curious about what I’m going to do next. While I’m not yet ready to reveal those details, what I can share is that I remain genuinely excited about the future of the security industry. I’m not going anywhere. Every day I see new and interesting problems that I’d like an opportunity to solve and expand my horizons. More than anything, that’s why I’m leaving WhiteHat, but its spirit will always be with me and continue to influence my life. Any of us has the capacity to change the world, we just have to allow ourselves the chance to do so.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;Hack Yourself First.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/6345134342638251557/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/6345134342638251557' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/6345134342638251557'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/6345134342638251557'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2016/03/my-last-days-at-whitehat-and-setting.html' title='My last days at WhiteHat and setting sights on the future'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-4639582856810280089</id><published>2015-12-03T06:56:00.000-08:00</published><updated>2024-12-31T06:56:29.042-08:00</updated><title type='text'>An idea to help secure U.S. cybersecurity…</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;header class=&quot;entry-header&quot; style=&quot;background-color: white; border: 0px; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;h1 class=&quot;entry-title&quot; style=&quot;border: 0px; clear: both; font-size: 1.57143rem; font-weight: normal; line-height: 1.2; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-size: 14px;&quot;&gt;… and looking for the right person to show us how to do so.&lt;/span&gt;&lt;/h1&gt;&lt;/header&gt;&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; border: 0px; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.71429; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;A few years back I was watching&amp;nbsp;&lt;a href=&quot;https://web.archive.org/web/20151207074328/http://www.youtube.com/watch?v=gcEFcDqlQC0&quot; style=&quot;border: 0px; color: #21759b; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;a presentation&amp;nbsp;&lt;/a&gt;given by General Keith B. Alexander, who was at the time Commander, U.S. Cyber Command and previously Director of the National Security Agency (NSA). Gen. Alexander’s remarks focused on the cybersecurity climate from his perspective and the impact on U.S. national and economic security. One comment he made caught my attention, specifically that&amp;nbsp;&lt;u style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;the Department of Defense has 15,000 networks to protect&lt;/u&gt;. As an application security person I can only imagine how many total websites, a favorite target among hackers, that equates to. I’d bet very few of DoD’s websites by percentage get professionally assessed for vulnerabilities. Anyway, from this it became clear the General understands big picture cybersecurity problems in terms of scale.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;At about 1:05:00 into the video the General opened the floor to questions and the most interesting one came from a Veteran. He said there are a lot of Veterans that would like to help with the country’s cybersecurity efforts, and asked if there were any programs available enabling them to do so. The General answered that he didn’t know for sure, but he didn’t think so. I did some research and according to a&lt;a href=&quot;https://web.archive.org/web/20151207074328/http://www.bls.gov/news.release/empsit.nr0.htm&quot; style=&quot;border: 0px; color: #21759b; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;Bureau of Labor Statistics report&amp;nbsp;&lt;/a&gt;from Sep, 2015, — there are roughly 449,000 unemployed veterans. This was fascinating to me: as I see it, this is a ready-and-willing labor force that perhaps at least a small percentage of which could apply their skills to cybersecurity.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;This got me thinking and an idea hit me, but before sharing it, I need to explain a bit how WhiteHat works internally for it to make sense.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;WhiteHat assesses websites for vulnerabilities. If customers fix those issues, they are far less likely to get hacked. Simple. What makes WhiteHat different is we’re able to perform these assessments at scale. And, I’m not talking just basic scanning, but true quality assessments with business logic tests carried out by real experts, a strict requirement. The challenge is that AppSec skills are extremely scarce and sought after. Ask any hiring manager. Recognizing the severe skill shortage more than a decade ago, WhiteHat created it’s Threat Research Center — our Web hacker army. TRC is specifically equipped, complete with a training program and unparalleled playground of permission-to-hack websites, to hire eager entry-level talent and turn them into experienced professionals quickly. Age and background of the applicants doesn’t matter. Today, WhiteHat has proven itself to be the best – and only – place for newcomers to get into the industry.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;https://web.archive.org/web/20151207074328/http://www.defense.gov/Video?videoid=423401&quot; style=&quot;border: 0px; color: #21759b; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;President Obama addressed&lt;/a&gt;&amp;nbsp;the nation’s military on September 11, 2015 and mentioned the increasingly challenging state of cyber warfare:&amp;nbsp;&lt;u style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;“What we’ve seen by both state and non-state actors is the increasing sophistication of hacking, the ability to penetrate systems that we previously thought would be secure. And it is moving fast.” The same website vulnerability issues that we’ve addressed in the private sector are felt in the defense realm.&lt;/u&gt;&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;This is where the idea comes in…&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Let’s say the DoD launched a cybersecurity program to assess all of its websites for vulnerabilities. The result would be fewer breaches that are much harder to carry out. To do this the DoD would obviously need a scalable vulnerability scanning technology, but more importantly, the necessary AppSec manpower. This is where WhiteHat would come in as we have all the pieces. Financial issues aside, WhiteHat would be able to conduct all these assessments, continuously, and could do so using veteran labor — exclusively. We have the tech, the hiring process, the training program, pretty close to everything the program would require. All we need is a DoD program to partner up with.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;If such a plan and program existed, everyone would win.&lt;/p&gt;&lt;ul style=&quot;border: 0px; line-height: 1.71429; list-style-image: initial; list-style-position: outside; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;The DoD would be able to increase their cybersecurity defenses at scale and better protect the nation.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;A large number of U.S. military veterans could be put to work towards a common cause, protecting the country’s cybersecurity, while acquiring InfoSec skills in the highest demand. Something&amp;nbsp;&lt;a href=&quot;https://web.archive.org/web/20151207074328/http://www.whitehouse.gov/the-press-office/2011/08/05/fact-sheet-president-obama-s-commitment-employing-america-s-veterans&quot; style=&quot;border: 0px; color: #21759b; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;the President said&amp;nbsp;&lt;/a&gt;he wanted to do.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;WhiteHat continues to grow its Web hacker army. Indeed, we already employ several veterans in the TRC who represent many of our best and brightest.&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Of course there are details that need to be addressed, like how the DoD’s website vulnerability data would be safeguarded and the security of WhiteHat’s infrastructure would have to be closely audited (but considering who we already count as customers, I’m confident we’d be able to satisfy any reasonable standard). Or maybe installed onto one of their networks, which is fine too. And then those doing the work, veterans whose backgrounds are already vetted and more trusted than the average “Johnny pen-tester.”&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;So, the question is … now what?&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Over the past 3 years I’ve discussed this idea with dozens of people, both inside and outside the government, and while everyone agrees it’s a good idea, getting traction has been difficult to say the least. Some cybersecurity training programs exist for veterans, but they tend to be either small, dormant, or not something that really protects U.S. cybersecurity.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Referring to emerging cyberthreats in a lecture at Stanford in June 2015,&amp;nbsp;&lt;a href=&quot;https://web.archive.org/web/20151207074328/https://youtu.be/apmJVu31Bio?t=12m32s&quot; style=&quot;border: 0px; color: #21759b; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;Secretary of Defense Ashton Carter said&lt;/a&gt;, “We find the alignment in open partnership, by working together. Indeed, history shows that we’ve succeeded in finding solutions to these kinds of tough questions when our commercial, civil, and government sectors work together as partners.” It would seem that even the highest levels of leadership in the DoD agree that this is the only path forward that makes sense for securing the nation’s digital assets.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;At this point, the best path forward is to simply put the idea out there for open discussion, and hopefully the “right person” will see it. Someone in the government who can help us carry it forward and contact us. If you are such a person, or know who is, we welcome the opportunity to talk — leaders within the VA, the DoD, or other parts of government. And hey, if you think the idea is crazy, stupid, or not viable for some reason… I am also interested in hearing why you think so (twitter: @jeremiahg).&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/4639582856810280089/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/4639582856810280089' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/4639582856810280089'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/4639582856810280089'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2015/12/an-idea-to-help-secure-us-cybersecurity.html' title='An idea to help secure U.S. cybersecurity…'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-4907125959017753371</id><published>2015-12-02T06:08:00.000-08:00</published><updated>2024-12-31T06:12:09.209-08:00</updated><title type='text'>The Ad Blocking Wars: Ad Blockers vs. Ad-Tech</title><content type='html'>&lt;p&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px;&quot;&gt;More and more people find online ads to be annoying, invasive, dangerous, insulting, distracting, expensive, and just understandable, and have decided to install an ad blocker. In fact, the number of people using ad blockers is skyrocketing. According to PageFair’s 2015 Ad Blocking Report, there are now&amp;nbsp;198 million&amp;nbsp;active adblock users around the world with a global growth rate of 41% in the last 12 months. Publishers are visibly feeling the pain and fighting back against ad blockers.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; border: 0px; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.71429; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Key to the conflict between ads and ad blockers is the Document Object Model, or DOM. Whenever you view a web page, your browser creates a DOM – a model of the page.&amp;nbsp;This is&amp;nbsp;a programmatic representation of the page that lets&amp;nbsp;JavaScript convert static content into something more dynamic. Whatever is in control of the DOM will control what you see – including whether or not you see ads. Ad blockers are designed to prevent the DOM from including advertisements, while the page is designed to&amp;nbsp;display them. This inherent conflict, this fight for control over the DOM, is where the Ad Blockers vs. Ad-Tech war is waged.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;A recent high profile example of this conflict is Yahoo Mail’s recent reported attempt to prevent ad-blocking users from accessing their email, which upset a lot of people. This is just one conflict in an inevitable war over who is in control of what you see in your browser DOM – Ad Blockers vs. Ad-Tech (ad networks, advertisers, publishers, etc.).&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Robert Hansen and I recently performed a thought experiment to see how this technological escalation plays out, and who eventually wins.&amp;nbsp;I played the part of the Ad Blocker and he played Ad-Tech, each of us responding to the action of the other.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Here is what we came up with…&lt;/p&gt;&lt;ol style=&quot;border: 0px; line-height: 1.71429; list-style-image: initial; list-style-position: outside; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;: Deliver ads to user’s browser.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;User&lt;/strong&gt;: Decides to install an ad blocker.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad Blocker&lt;/strong&gt;: Creates a black list of fully qualified domain names / URLs that are known to serve ads. Blocks the browser from making connections to those locations.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;: Create new fully qualified domain names / URLs that are not on black lists so their ads are not blocked. (i.e. Fast Flux)&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad Blocker&lt;/strong&gt;: Crowd-source black list to keep it up-to-date and continue effectively blocking. Allow certain ‘safe’ ads through (i.e. Acceptable Ads Initiative)&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;: Load third-party JavaScript on to the web page, which detect when, and if, ads have been blocked. If ads are blocked, deny the user the content or service they wanted.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;** Current stage of the Ad Blocking Wars ***&lt;/p&gt;&lt;ol start=&quot;7&quot; style=&quot;border: 0px; line-height: 1.71429; list-style-image: initial; list-style-position: outside; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad Blocker&lt;/strong&gt;: Maintain a black list of fully qualified domain names / URL of where ad blocking detection code is hosted and block the browser from making connections to those locations.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;: Relocate ad or ad blocking detection code to first-party website location. Ad blockers cannot block this code without also blocking the web page the user wanted use. (i.e. sponsored ads, like found on Google SERPs and Facebook)&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad Blocker&lt;/strong&gt;: Detect the presence of ads, but not block them. Instead, make the ads invisible (i.e. visibility:&amp;nbsp;hidden;). Do not send tracking cookies back to hosting server to help preserve privacy.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;: Detect when ads are hidden in the DOM. If ads are hidden, deny the user the content or service they wanted.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad Blocker&lt;/strong&gt;: Allow ads to be visible, but move them WAY out of the way where they cannot be seen. Do not send tracking cookies back to hosting server to help preserve privacy.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;: Deliver JavaScript code that detects any unauthorized modification to browser DOM where the ad is to be displayed. If the ad’s DOM is modified, deny the user the content or service they wanted.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad Blocker&lt;/strong&gt;: Detect the presence of first-party ad blocking detection code. Block the browser from loading that code.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;: Move ad blocking detection code to a location that cannot be safely blocked without negatively impact the user experience. (i.e. Amazon AWS).&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad Blocker&lt;/strong&gt;: Crawl the DOM looking for ad blocking detection code, on all domains, first and third-party. Remove the JavaScript code or do not let it execute in the browser.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;: Implement minification and polymorphism techniques designed to hinder isolation and removal of ad blocking detection code.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad Blocker&lt;/strong&gt;: Crawl the DOM looking for ad blocking detection code, reverse code obfuscation techniques on all domains, first and third-party. Remove the offending JavaScript code or do not let it execute in the browser.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;: Integrate ad blocking detection code inside of core website JavaScript functionality. If the JavaScript code fails to run, the web page is designed to be unusable.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;GAME OVER.&amp;nbsp;&lt;strong style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ad-Tech&lt;/strong&gt;&amp;nbsp;Wins.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;The steps above will not necessarily play out exactly in this order as the war escalates. What matters more is how the war always ends. No matter how Robert and I sliced it, Ad-Tech eventually wins. Their control and access over the DOM appears dominant.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;If you look at it closely, the Ad-Tech industry behaves quite similarly to the malware industry. The techniques and delivery are consistent. Ad-Tech wants to deliver and execute code users don’t want and they’ll bypass the user’s security controls to do exactly that! So it really should come as no surprise that malware purveyors heavily utilize online advertising channels to infect millions of users. And if this is the way is history plays out, where eventually users and their ad blockers lose, antivirus tools are the only options left – and antivirus is basically a coin flip.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;The only recourse left is not technical… the courts.&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/4907125959017753371/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/4907125959017753371' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/4907125959017753371'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/4907125959017753371'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2015/12/the-ad-blocking-wars-ad-blockers-vs-ad.html' title='The Ad Blocking Wars: Ad Blockers vs. Ad-Tech'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-5012828317613844304</id><published>2015-05-21T06:13:00.000-07:00</published><updated>2024-12-31T06:14:01.396-08:00</updated><title type='text'>WhiteHat Website Security Statistics Report: From Detection to Correction</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; border: 0px; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.71429; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;While web security used to be a reactionary afterthought, it has evolved to become a necessity for organizations that wish to conduct online business safely. Companies have switched from playing defense to playing offense in a game that is still difficult to win. In an effort to change the game, WhiteHat Security has been publishing its Website Security Statistics Report since 2006 in the hope of helping organizations improve web security before they become victim to an attack.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;After several editions, this is by far the most data rich, educational, insightful and useful application security report I have ever read. I may be biased, but I believe this report is unique: something special and different that is an essential read for application security professionals. In creating this report, I have learned more about what works and what doesn’t work than I have learned doing anything else in my many years of working in application security. I am extremely confident that our readers will appreciate what we have created for them.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;In this year’s report, we examine the activities of real-world application security programs along with the most prevalent vulnerabilities based on data collected from more than 30,000 websites under WhiteHat Sentinel management. From there, we can then determine how many vulnerabilities get fixed, the average time it takes to fix them, and how every application security program can measurably improve. Our research provides insights into how organizations can better determine which security metric to improve upon.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;We’ve learned that vulnerabilities are plentiful, that they stay open for weeks or months, and that typically only half get fixed. We have become adept at finding vulnerabilities. The next phase is to improve the remediation process. In order to keep up with the increase in vulnerabilities, we need to make the remediation process faster and easier. The amount of time companies are vulnerable to web attacks is much too long – an average of 193 days from the first notification. Increasing the rate at which these vulnerabilities are remediated is the only way to protect users.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;The best way to lower the average number of vulnerabilities, speed up time-to-fix, and increase remediation rates is to feed vulnerability results back to development through established bug tracking or mitigation channels. This places application security at the forefront of development and minimizes the need for remediation further down the road. The goal is more&amp;nbsp;&lt;em style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;secure&lt;/em&gt;&amp;nbsp;software, not more&amp;nbsp;&lt;em style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;security&lt;/em&gt;&amp;nbsp;software.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;For security to improve, organizations need to set aside the idea of ‘best practices’ and not stop at compliance controls. Multiple parts of the organization must determine which teams should be held accountable for their specific job function. Organizations that don’t hold specific teams accountable have an average remediation rate of 24% versus 33% for companies that do. When you empower those who are also accountable, the organization has a higher likelihood of being effective.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;In this year’s edition, the WhiteHat Website Security Statistics Report drives home the point that we now have a very clear understanding of what vulnerabilities are out there. Based on that information, we must create a solid, measurable remediation program to remove those vulnerabilities and increase the safety and security of the web.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;To view the full report, click&amp;nbsp;&lt;a href=&quot;https://web.archive.org/web/20150910212814/https://info.whitehatsec.com/Website-Stats-Report-2015.html&quot; style=&quot;border: 0px; color: #21759b; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;here&lt;/a&gt;. I would also invite you to join the conversation on Twitter at #WHStats @whitehatsec.&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/5012828317613844304/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/5012828317613844304' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/5012828317613844304'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/5012828317613844304'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2015/05/whitehat-website-security-statistics.html' title='WhiteHat Website Security Statistics Report: From Detection to Correction'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-1799000881375976950</id><published>2014-12-22T06:14:00.000-08:00</published><updated>2024-12-31T06:15:39.521-08:00</updated><title type='text'>Hack Yourself First: National and Economic Security</title><content type='html'>&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;header class=&quot;entry-header&quot; style=&quot;background-color: white; border: 0px; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;div class=&quot;comments-link&quot; style=&quot;border: 0px; color: #757575; font-size: 0.928571rem; line-height: 1.84615; margin: 1.71429rem 0px 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #444444; font-size: 14px;&quot;&gt;It’s safe to say most countries are investing in their cyber-offense capabilities or will be very soon. Even the smallest countries can wreak havoc on the most powerful with very little money. And while you consider the ramifications of this, here’s a quote to help it sink in.&lt;/span&gt;&lt;/div&gt;&lt;/header&gt;&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; border: 0px; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.71429; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;“National security is no longer about tanks. National security is increasingly about economic well-being, internet security, and issues that allow us to live on a daily basis. We’re not worried today about the soviets blowing us up with nukes, but we are worried that our kids will be able to enjoy a quality of life vaguely related to our own.” -Ian Bremmer&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;How can a corporation — even the largest, let alone small businesses and individuals — possibly defend against armies of well-funded nation-state sponsored hackers? These hackers are professionally trained, with no reason to fear our laws, physically distant from their victims, and operate 24 hours a day, 7 days a week, 365 days a year. Remember, the Internet does not recognize or respect geographic borders. The Internet is particularly adept at routing around country-by-country laws and regulations that impeded traffic.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Many people in positions of power have expressed concern about the Internet being brought down. I’m more worried about what happens if the majority of people lose confidence in the system – the security of the Internet – and either stop or limit their use of the Internet. I’m worried about the long-term economic damage this causes, the loss of our ability to innovate, the failure to take advantage of the opportunities that the Internet provides.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;New laws against criminal hacking are not going to help. Conventional warfare tactics are not much good either. Governments are largely unable to protect the private sector from international cyber-attack, nor should they be expected to. The perpetrators can be located anywhere, are extremely difficult to identify, prove attribution, and track down, even harder extradite, and even if identified, located, and extradited, difficult to successfully prosecute. And then, if they are found to be spies, the likelihood of them getting traded for our own spies is high – so they go back to what they were doing. Not to mention foreign governments are highly unlikely to turn over their own cyber-warriors. Every CEO in America must understand — in cyber-security you’re on your own.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;The reality is that a problem as diverse and wide reaching as cyber-crime cannot be solved by any one thing; but I’ll tell you this — protecting the Internet requires a completely new way of thinking. While our cyber-defense ability is severely lacking, one thing we all clearly know how to do extremely well is cyber-offense.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Offense can inform defense.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;I call this approach Hack Yourself First, a concept that is critical to our self-defense. Internet security can be thought of as a race between the bad guys who find and exploit security weaknesses (we call them vulnerabilities) and the good guys who find and fix them. I felt so strongly about this that I built a company, WhiteHat Security, around this idea. At WhiteHat, we get paid by companies doing business online to hack into them and explain how we did so.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;In no time flat we’re able locate digital doorways to take over some or all of their the systems, steal whatever sensitive data they have, access their customers accounts, or steal data they have on the system — all the things that could have made headlines like those you’ve probably seen recently. And let me make something else perfectly clear. These are systems owned by the largest and most well known organizations in the world. You know them. You do business with them. Collectively, they constitute billions of end-user accounts. In short, we’re probably already protecting you. Every vulnerability we find and our customers fix is one less hack that happens.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;“Hack Yourself First” is also the reason why we teach other people how to hack, hundred and thousands of them. We teach all sorts of ways to hack into banks, retail websites, social networks, government systems, and more. We teach people how this can be done from anywhere across the Internet.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Many wonder why teaching people how to hack is a good thing. I know hacking is often stereotyped as illegal or nefarious activity — but this is not always the case. Teaching people how to hack — building up our cyber-offense skills — is absolutely essential. Only if we have hacking skills can we focus these skills inward at ourselves BEFORE the bad guys do. The idea of “Hack Yourself First” is critical to national security and to ensuring our long-term economic well-being.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;Remember, security is optional, but so is survival.&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/1799000881375976950/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/1799000881375976950' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/1799000881375976950'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/1799000881375976950'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2014/12/hack-yourself-first-national-and.html' title='Hack Yourself First: National and Economic Security'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13756280.post-7615568078815516000</id><published>2014-11-15T06:16:00.000-08:00</published><updated>2024-12-31T06:16:32.012-08:00</updated><title type='text'>5 Characteristics of a ‘Sophisticated’ Attack</title><content type='html'>&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; border: 0px; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.71429; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;When news breaks about a cyber-attack, often the affected company will [ab]use the word ‘sophisticated’ to describe the attack. Immediately upon hearing the word ‘sophisticated,’ many in the InfoSec community roll their eyes because the characterization is viewed as nothing more than hyperbole. The skepticism stems from a long history of incidents in which breach details show that the attacker gained entry using painfully common, even routine, and ultimately defensible methods (e.g. SQL Injection, brute-force, phishing, password reuse, old and well-known vulnerability, etc).&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;In cases of spin, the PR team of the breached company uses the word ‘sophisticated’ in an to attempt convey that the company did nothing wrong, that there was nothing they could have done to prevent the breach because the attack was not foreseeable or preventable by traditional means, and that they “take security seriously,” — so please don’t sue, stop shopping, or close your accounts.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;One factor that allows this deflection to continue is the lack of a documented consensus across InfoSec of what constitutes a ‘sophisticated’ attack. Clearly, some attacks are actually sophisticated – Stuxnet comes to mind in that regard. Not too long ago I took up the cause and asked my Twitter followers, many tens of thousands largely in the InfoSec community, what they considered to be a ‘sophisticated’ attack. The tweets received were fairly consistent. I distilled the thoughts down to set of attack characteristics and have listed them below.&lt;/p&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;5 Characteristics of a ‘Sophisticated’ Attack:&lt;/p&gt;&lt;ol style=&quot;border: 0px; line-height: 1.71429; list-style-image: initial; list-style-position: outside; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;The adversary knew specifically what application they were going to attack and collected intelligence about their target.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;The adversary used the gathered intelligence to attack specific points in their target, and not just a random system on the network.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;The adversary bypassed multiple layers of strong defense mechanisms, which may include intrusion prevention systems, encryption, multi-factor authentication, anti-virus software, air-gapped networks, and on and on.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;The adversary chained multiple exploits to achieve their full compromise. A zero-day may have been used during the attack, but this alone does not denote sophistication. There must be some clever or unique technique that was used.&lt;/li&gt;&lt;li style=&quot;border: 0px; margin: 0px 0px 0px 2.57143rem; padding: 0px; vertical-align: baseline;&quot;&gt;If malware was used in the attack, then it had to be malware that would not have been detectable using up-to-date anti-virus, payload recognition, or other endpoint security software.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;border: 0px; line-height: 1.71429; margin: 0px 0px 1.71429rem; padding: 0px; vertical-align: baseline;&quot;&gt;While improvements can and will be made here, if an attack exhibits most or all of these characteristics, it can be safely considered ‘sophisticated.’ If it does not display these characteristics and your PR team still [ab]uses the word ‘sophisticated,’ then we reserve the right to roll our eyes and call you out.&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;

Hack Yourself First: &lt;a href=&quot;https://www.jeremiahgrossman.com/&quot;&gt;Jeremiah Grossman&lt;/a&gt;

&lt;br /&gt;&lt;hr /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.jeremiahgrossman.com/feeds/7615568078815516000/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13756280/7615568078815516000' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7615568078815516000'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13756280/posts/default/7615568078815516000'/><link rel='alternate' type='text/html' href='http://blog.jeremiahgrossman.com/2014/11/5-characteristics-of-sophisticated.html' title='5 Characteristics of a ‘Sophisticated’ Attack'/><author><name>Jeremiah Grossman</name><uri>http://www.blogger.com/profile/05017778127841311186</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggNGSRmjbWpWb3DBRQhEdwT_fjrrJoMP0as7uCC3ptmMWho2trBZPPEMrhi7QekNz181P9d1QLdb49fPVzJa6K2mXw8cvP_Ga2RkcTMbq_FvesqYlru_ZEhraamxFVasE9Y8G33KPEq-7EXIVjRZIN00T59uAAffq0VBHdyaPU7CGgQas/s220/eAN-tCTs_400x400.jpg'/></author><thr:total>0</thr:total></entry></feed>