innovation

Random Thoughts About Mary Meeker’s Internet Trends 2017 Presentation

Random thoughts regarding Mary Meeker’s?Internet Trends 2017 report: Slide #5 The main question that popped into my mind was, where are the rest of the people? Today there are 3.4B internet users where the world has a population of 7.5B. It could be interesting to see who are the other non-digital 4 billion humans. Interesting for reasons such as understanding the growth potential of the internet user base (by the level of difficulty of penetrating…

Continue reading

cybersecurity

Cutting Down North Korea’s Internet

Could be interesting to understand whether cutting down North Korea from the internet was a defensive measure due to a huge amount of ongoing attacks or was it just a preventive measure. Definitely cutting down the internet has become another weapon in the war chest of the US. The question is now: do other countries have such power of cutting down areas? The net infrastructure should be evaluated for such attack vector.

Continue reading

innovation

Is Web 3.0 The Right Name for The Next Internet Uphill?

I get to see here and there the term ‘3.0’ used in reference to the next internet/technology revolution and somehow it does not feel right to me. I am not sure about this but for me, the coined term ‘2.0’ was a metaphor belonging to the concept of software versioning. If the first internet era where infrastructure was established is called ‘1.0’ implying the first version of a product then what we had recently was…

Continue reading

cloud cybersecurity

What is Cloud Workload Protection?

Cloud usage is increasing rapidly. Analysts forecast growth of 17 percent for the worldwide public cloud services market in 2020 alone. This proliferation comes on top of already widespread cloud adoption. In a recent report by Flexera, over 83 percent of companies described themselves as intermediate to heavy users of cloud platforms, while 93 percent report having a multi-cloud strategy. With a growing number of companies planning on doing more in diverse cloud environments, cloud workloads are becoming…

Continue reading

cybersecurity iot

Unpredictions for 2020 in Cyber Security

The end of the year tradition of prediction is becoming a guessing game as the pace of innovation is increasing towards pure randomness. So I will stop pretending I know what is going to happen in 2020, and I want to write on areas that seem like the most unpredictable for 2020. Below you can find an honest review of my?2019 predictions. 2020 Unpredictions 5G A much talked about topic in 2019 with billions poured…

Continue reading

cybersecurity innovation regulation

Spanning the Chasm: The Missing Link in Tech Regulation – Part 1 of 2

Mark Zuckerberg was right when he wrote in his op-ed to the Washington Post that the internet needs new rules, though naturally, his view is limited as a CEO of a private company. For three decades, governments across the globe have created an enormous regulatory vacuum due to a profound misunderstanding of the magnitude of technology on society. As a result, they neglected their duty to protect society in the mixed reality of technology and…

Continue reading

cybersecurity

How to Disclose a Security Vulnerability and Stay Alive

In recent ten years, I was involved in the disclosure of multiple vulnerabilities to different organizations and each story is unique and diverse as there is no standard way of doing it. I am not a security researcher and did not find those vulnerabilities on my own, but I was there. A responsible researcher, subjective to your definition of what is responsible, discloses first the vulnerability to the developer of the product via email or…

Continue reading

cybersecurity

The Emerging Attention Attack Surface

A well-known truth among security experts that humans are the weakest link and social engineering is the least resistant path for cyber attackers. The classic definition of social engineering is deception aimed to make people do what you want them to do. In the world of cybersecurity, it can be mistakenly opening an email attachment plagued with malicious code. The definition of social engineering is broad and does not cover deception methods. The classic ones…

Continue reading

AI

Will Artificial Intelligence Lead to a Metaphorical Reconstruction of The Tower of Babel?

The story of the Tower of Babel (or Babylon) has always fascinated me as God got seriously threatened by humans if and only they would all speak the same language. To prevent that God confused all the words spoken by the people on the tower and scattered them across the earth. Regardless of the different personal religious beliefs of whether it happened or not the underlying theory of growing power when humans interconnect is intriguing…

Continue reading

cybersecurity

Some Of These Rules Can Be Bent, Others Can Be Broken

Cryptography is a serious topic ? a technology based on a mathematical foundation posing an ever-growing challenge for attackers. On November 11th, 2016, Motherboard wrote a piece about the FBI?s ability to break into suspects? locked phones. Contrary to the FBI?s constant complaints about going dark with strong encryption, the actual number of phones they were able to break into was relatively high. The high success ratio of penetrating locked phones in some way doesn?t…

Continue reading

cybersecurity

Searching Under The Flashlight of Recent WannaCry Attack

Random thoughts about WannaCry Propagation The propagation of the WannaCry attack was massive and mostly due to the fact it infected computers via SMB1, an old Windows file-sharing network protocol. Some security experts complained that Ransomware has been massive for two years already and this event is only a one big hype wave though I think there is a difference here and it is the magnitude of propagation. There is a big difference when attack…

Continue reading

cybersecurity

The Emergence of Polymorphic Cyber Defense

Background Attackers are Stronger Now The cyber-world is witnessing a fast-paced digital arms race between attackers and security defense systems, and 2014 showed everyone that attackers have the upper hand in this match.? Attackers are on the rise due to their growing financial interest?motivating a new level of sophisticated attacks that existing defenses are unmatched to combat. The fact that almost everything today is connected to the net and the ever-growing complexity of software and…

Continue reading

cybersecurity

Counter Attacks – Random Thoughts

The surging amount of cyber attacks against companies and their dear consequences pushes companies to the edge. Defensive measures can go only so far in terms of effectiveness, assuming they are fully deployed which is also far from being the common case. Companies are too slow to react to this new threat which is caused by a fast-paced acceleration in the level of sophistication of attackers. Today companies are at a weak point. From a…

Continue reading

cybersecurity

A Tectonic Shift in Superpowers or What Sony Hack Uncovered to Everyone Else

Sony hack has flooded my news feed in recent weeks, everyone talking about how it was done, why, whom to blame, the trails which lead to North Korea, and the politics around it. I?ve been following the story from the first report with an unexplained curiosity and was not sure why since I read about hacks all day long. A word of explanation about my “weird” habit of following hacks continuously, being a CTO of…

Continue reading

startups

The Web Crawls Silently into the Desktop

Recently I got deeply interested in rich Internet technologies such as Adobe Air and Microsoft Silverlight and it is hard to not see the trend of returning to good old desktop applications with one big twist – the web included. These rich desktop applications are naturally integrated into the web with its rich services, content while enjoying UI breakthroughs achieved by browsers and site designers. It is great to see unique and smooth UI concepts…

Continue reading

innovation

Can Microsoft afford to ignore Linux?

Microsoft completed the acquisition of Sybari Software, their new anti-virus and anti-spyware line of business – The Windows Observer–Antivirus, Anti-Spyware Strategy Moves Forward for Microsoft. One line from the news caught my eye as something that makes immediate common sense but may not be right strategically after all “Not surprisingly, Microsoft will discontinue new sales of Sybari’s products for the Unix (Solaris and AIX) and Linux operating systems. It will, however, continue to sell and…

Continue reading

cybersecurity

Why CEO should blog – my personal experience

Amanda Watlington relates to USAToday article on Blogging and CEO on a post Blogs and Feeds: CEO Blogs — Where Angels(?) Fear to Tread. I am a CEO of a new venture company and a blogger for the last four months and I wanted to write down what do I get from it: 1) Feedback on my thoughts – As a CEO and a person in general I have different opinions on various subjects related…

Continue reading