Consumers to Enterprise – The Investment Rationale Cycle

Today the hottest thing in new startup investments is "enterprise" startups and for someone old like me it gives a déjavue kid of feeling. It seems investments behave in a cyclical manner where the first field of growth is always in the area of consumer products. In consumer products innovation is only limited by imagination. …

Continue reading

Death of Innovation in Enterprise Software

Jeff Bussgang posted on the current buzz in a recent Microsoft conference for VC – Seeing Both Sides: Microsoft VC Conference. The buzz that is mentioned in the post creates for me the general atmosphere of an end of innovation in the enterprise applications space and I do not necessarily agree with this perception. The …

Continue reading

New enterprise software – End of times?

On BusinessWeek there is an opinion on the state of innovation in enterprise software – Boring Software 2.0. A quick comment on a specific part of the article "I was at a dinner two nights ago with some executives from Mercury Interactive and one of the reporters asked if a software startup could make it …

Continue reading

The ACCEPTABLE Way to Handle Data Breaches

LifeLabs, a Canadian company, suffered a significant data breach. According to this statement, the damage was “customer information that could include name, address, email, login, passwords, date of birth, health card number and lab test results” in the magnitude of “approximately 15 million customers on the computer systems that were potentially accessed in this breach”. …

Continue reading

My Ten Cyber Security Predictions for 2019

  Well, 2018 is almost over and cyber threats are still here to keep us alert and ready for our continued roller coaster ride in 2019 as well. So here are some of my predictions for the world of cybersecurity 2019: IoT IoT is slowly turning into reality and security becomes a growing concern in …

Continue reading

How to Disclose a Security Vulnerability and Stay Alive

In recent ten years, I was involved in the disclosure of multiple vulnerabilities to different organizations and each story is unique and diverse as there is no standard way of doing it. I am not a security researcher and did not find those vulnerabilities on my own, but I was there. A responsible researcher, subjective …

Continue reading

The Emerging Attention Attack Surface

A well-known truth among security experts that humans are the weakest link and social engineering is the least resistant path for cyber attackers. The classic definition of social engineering is deception aimed to make people do what you want them to do. In the world of cybersecurity, it can be mistakenly opening an email attachment …

Continue reading