Podcasts about datatribe

  • 17PODCASTS
  • 23EPISODES
  • 38mAVG DURATION
  • ?INFREQUENT EPISODES
  • Feb 21, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about datatribe

Latest podcast episodes about datatribe

Crucial Tech
Episode 10.7 - Bob Ackerman, Generative AI, and Universal Basic Income

Crucial Tech

Play Episode Listen Later Feb 21, 2025 27:50


Artificial Intelligence is all the rage right now with broad claims about how it is going to change the world as we know it. I have my doubts about the hype and so does Bob Ackerman, the granddaddy of cybersecurity venture capital, founder and managing director of AllegisCyber Capital (for the past 29 years) and cofounder of the cyber incubator, DataTribe in Maryland. I always enjoy chatting with Bob because he sees the nuts and bolts of tech advancements and isn't the kind of investor to get swayed by the glitz of questionable marketing. In this session, we discussed how AI is starting to displace high-paying jobs like computer coding and legal work, raising concerns about who will be left to buy the AI subscriptions and services. While there will be short-term disruption, he thinks AI will ultimately enable new industries and use cases that create new jobs and economic opportunities. Surprisingly enough, he believes the transition may require policies like universal basic income to support displaced workers.We also discussed the demographic challenges facing countries like the US and Europe, with aging populations and declining birth rates straining social welfare systems. dAI and automation may help address labor shortages, but also raise questions about how to fund programs like Social Security and Medicare long-term.More importantly, Bob thinks that the people who invested in AI early will to lose their shirts.Check it out.

The Cybersecurity Readiness Podcast Series
2024 Cyber Trends and Predictions: Global IT Outage and More

The Cybersecurity Readiness Podcast Series

Play Episode Listen Later Jul 31, 2024 44:10


In this episode, John Funge, Managing Director at DataTribe, and I discuss the Global IT Outage caused by a flawed update to CrowdStrike's cloud-based security software. We also review DataTribe's recently published report on cybersecurity trends and predictions for 2024. In closing, John shares some tips and recommendations for those seeking cybersecurity funding. Action Items and Discussion HighlightsOrganizations need to incentivize and spend more time and effort hardening the QA cycles.Continue to focus on building secure software through tools/processes that embrace best practices.Assess the concentration of risks and take proactive mitigation steps.Take malware at scale, reverse engineer it, and look inside the malware to use that as training for AI models that can detect and mitigate entire classes of malware.Create a set of tooling that can monitor what happens in CICD (Continuous Integration & Continuous Delivery) pipelines, create the necessary evidence to help enforce process and risk management compliance, and make the software development process much more transparent.Cybersecurity trends include quantum computing, security for serverless architecture, operational technology (OT) security, autonomous defenses, passwordless authentication, AppSec 2.0, and AI SOC Analyst.Time Stamps00:02 -- Introduction01:44 -- Guest's Professional Highlights06:33 -- Global IT Outage Fiasco -- Lessons08:11 -- Hardening QA Cycles10:41 -- Software Malfunction in an AI-Driven World -- Corrective Action15:50 -- Reviewing Cyber Trends -- Quantum Computing, AI-Enabled Autonomous Defenses, AI SOC Analyst, AppSec Scans, etc.25:30 -- Cybersecurity Governance Process Improvements and Innovations31:18 -- What does DataTribe, a cyber foundry, look for when evaluating potential investment opportunities?34:35 -- Cyber Predictions36:44 -- Closing ThoughtsMemorable John Funge Quotes/Statements"Software is just really brittle and creaky. Over time, there's been a combination of incentives toward speed of delivery and time to market rather than spending more effort hardening QA cycles.""Within the security industry, there's this sort of patch advice: Just keep your systems patched, etc. There isn't much discussion in that conversation about how we can engineer the software so it's more secure with fewer bugs.""It's unclear whether we are increasing the hardness of many software tools and systems at the same time that their responsibility is increasing.""At the end of the day, AI is really a tool for consolidating training data and creating a decision mechanism based on that.""Security is just so rich with data. So, if you follow the data, you really do start to see interesting opportunities to potentially create predictive models that allow you to increase your security performance and efficacy.""There is this opportunity to create a set of tooling that can monitor what goes on in CICD (Continuous Integration and Continuous Deployment) pipelines and create all the necessary evidence that can help enforce process and give confidence to auditors risk management compliance, and essentially take what's going on inside the software development process, and making it much, much more transparent.""AI models and the data science teams that work on them represent a bit of a black box, and it can be challenging to...

The CyberWire
A new purchase is cause for a call out.

The CyberWire

Play Episode Listen Later Jan 26, 2024 32:17


Senator Wyden calls out the NSA for purchasing American's internet records. Senators look to add IT and ICS environments to federal employee cyber competitions. The FTC asks big tech about their investments in AI. Turns out the GSA bought a bunch of Chinese security cameras. Akira ransomware claims a breach of Lush cosmetics. ESET reports on the Blackwood cyberespionage group. Wired looks at Predatory Sparrow. The U.S. stands firm on the United Nations Cybercrime Treaty. Our guest is Tony Surak, CMO & Operating Partner from DataTribe, with insights on the state of venture capital in cyber. And a Trickbot gang member will be doing some time. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Guest Tony Surak from DataTribe joins us to share his take on the state of the VC cyber market. Selected Reading Wyden Releases Documents Confirming the NSA Buys Americans' Internet Browsing Records; Calls on Intelligence Community to Stop Buying U.S. Data Obtained Unlawfully From Data Brokers, Violating Recent FTC Order  Senate Committee debuts bipartisan bill to add OT, ICS environments to federal employee cyber competition  FTC officially asks Big Tech about their AI deals | Cybernews  GSA Sparks Security Fears After Buying Risky Chinese Cameras Akira ransomware gang says it stole passport scans from Lush • The Register Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware - SecurityWeek How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar | WIRED On eve of final negotiations, US says consensus growing around ‘narrow' UN cybercrime treaty Trickbot malware developer sentenced to 5 years behind bars • The Register Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Lessons from the School of Cyber Hard Knocks
Bob Ackerman: Technology is Necessary But Insufficient

Lessons from the School of Cyber Hard Knocks

Play Episode Listen Later Jun 14, 2023 40:05


Today's guest is Bob Ackerman, Founder & Managing Director of AllegisCyber Capital. In today's episode, Bob discusses AllegisCyber Capital and his role there, how he got his start, the three things they look for in founders, the market of VC Capital in cybersecurity and the future for IPOs, his thoughts on the the national cybersecurity strategy, the liability shift in critical infrastructure from asset owners to product manufacturers, his thoughts on the future of the United States' cyber resilience, and as always, his toughest lesson learned. Robert R. Ackerman Jr. founded AllegisCyber Capital—the world's first dedicated cyber venture firm—to be “for cyber entrepreneurs by cyber entrepreneurs.”Bobis also the Co-founder of cybersecurity and data science foundry DataTribe, Co-founder of CyberGRX, and Chairman of the annual Global Cyber Innovation Summit—the “Davos of Cybersecurity”—for leading Global 2000 CISOs, cyber innovators, and policy leaders. With a 20+ history in early-stage cybersecurity investing,Bobis titled as one of “Cyber's Money Men'' by major business publications for his experience and leadership in cybersecurity VC investing, named one of “Technology's Top 100 Investors” by Forbes and featured on Forbes Midas List, and recognized as one of two leading cyber investors in the world by Cyber Defense magazine.

The Crossover with Dr. Rick Komotar
Mike Janke - From Navy SEAL to Entrepreneur.

The Crossover with Dr. Rick Komotar

Play Episode Listen Later Mar 14, 2023 49:44


Mike Janke is co-founder and Board Member of DataTribe. Mike Janke is also a founder and former CEO of Silent Circle, the world's leading Global Secure Communications service and the makers of Blackphone – Time Magazine's top 10 invention of the year. Mike is also a former member of the elite SEAL Team 6 as well as an author of two best-selling books on self-discipline, leadership, and performance.He is the 2016 recipient of the Visionary of the year award from the Center For Democracy and Technology. Mike is also the founder of Blue Pacific Studios – a Los Angeles based Film production firm. Prior to starting Silent Circle, he was the founder and former CEO of SOC-USA one of the country's largest defense logistics and security firms headquartered in Washington DC, with over 10,000 employees in a dozen countries. Mike speaks around the world on Technology, Defense and Privacy.

Secure Ventures with Kyle McNulty
Datatribe: John Funge on Building Successful Security Products

Secure Ventures with Kyle McNulty

Play Episode Listen Later Feb 7, 2023 31:22


John: Managing director at Datatribe, focusing on applying his success to help build great products Three exits from companies he founded! Check out the episode for our discussion on the Datatribe model and why it was compelling to him as an accomplished founder, as well as some of his top lessons for building successful cybersecurity products. https://datatribe.com/

Jungunternehmer Podcast
"Ich habe 400M von Investoren geraised und 95% davon waren nicht hilfreich" – Mike Janke, Datatribe

Jungunternehmer Podcast

Play Episode Listen Later Jan 20, 2023 55:45


Mike Janke hat mit Datatribe eines der besten Data Science und Cyber Security Venture Studios global aufgebaut.. Seine Erfahrungen mit den Special Forces haben ihm beim Aufbau des Unternehmens geholfen – doch wie? Wir sprechen über Team Führung, Wachstumphase, wann deine Head of oder VPs nicht mit der Firma mitwachsen sollten und wie du ihnen das schonen beibringst.Was du lernst:Wie gutes Teambuilding funktioniert und ob du immer nur Experten hirern musstWenn du einen Exit planst – wie solltest du Team und Business dafür vorbereiten?Warum heißt es, Companies werden gekauft und nicht verkauft?Wie findest du für dein Unternehmen den richtigen VC und wie kommunizierst du Veränderungen zwischen den Stages?Wie kommunizierst du Führungskräften, dass sie nicht für die nächste Phase der Firma geeignet sind?ALLES ZU UNICORN BAKERY:https://zez.am/unicornbakery(00:01:08) Was ist Datatribe?(00:09:14) Wie sieht für dich ein gutes Team für dich aus, auch vor dem Hintergrundwissen des Teambuildings bei den Special Forces?(00:14:37) Skills vs Kultur-Fit: Woran merke ich, welcher Mitarbeitende besser zu meiner Firma passt?(00:19:29) Warum sollte man Entscheidungen nicht zu lange herauszögern oder verschieben?(00:24:13) Wie kommuniziere ich mit meinen VPs und Führungskräften die nächstenPhasen der Firma, auch wenn sie eventuell nicht mehr die Richtigen für die Aufgaben sind, ohne dass sie sich angegriffen fühlen?(00:28:41) Welche Rolle spielen die Unternehmenskultur und die Einnahmen bei den wichtigen Personalentscheidungen?(00:34:55) Wie näherst du dich intern einem Exit an und wie kommunizierst du einen eventuellen Verkauf oder Ausstieg mit deinem Team?(00:40:26) Wie identifizierst du den VC, der deinem Unternehmen am meisten "nützt" und dich voran bringt?(00:43:23) Wie wichtig ist Geld wirklich und wie finde ich unter all den vermeintlich guten VCs den richtigen für mein Business?(00:47:29) Welche Rolle spielen Investor und der jeweilige Partner des VCs?(00:50:55) Wann hilft mir Ego, eine gute Firma zu bauen und ab wann ist es zu viel Ego?(00:54:31) Mikes letzten Worte für die Zuhörer:innen?MIKE JANKELinkedIn: https://www.linkedin.com/in/michael-j-a79327/Datatribe: https://datatribe.com/WHATSAPP NEWSLETTER:1-2x wöchentlich bekommst du eine persönliche Sprachnotiz oder Inhalte von mir, die dich zu einem besseren Gründer machen, melde dich jetzt mit einem Klick an: https://bit.ly/ub-whatsapp-newsletter Hosted on Acast. See acast.com/privacy for more information.

Digital Leaders
Companies are bought, not sold - Mike Janke, Datatribe

Digital Leaders

Play Episode Listen Later Jan 20, 2023 55:45


Mike Janke has built Datatribe, one of the best data science and cyber security venture studios globally.... His experience with Special Forces helped him build the company - but how? We talk about team leadership, growth stage, when your Head of or VPs shouldn't grow with the company and how to teach them to go easy on themselves. What you'll learn: How good team building works and whether you always have to herd experts. If you are planning an exit - how should you prepare your team and business for it? Why do they say companies are bought and not sold? How do you find the right VC for your company and how do you communicate changes between stages? How do you communicate to executives that they are not right for the next stage of the company? ALL ABOUT UNICORN BAKERY: https://zez.am/unicornbakery (00:01:08) What is Datatribe? (00:09:14) What does a good team look like to you, even with the background knowledge of team building in Special Forces? (00:14:37) Skills vs culture fit: how can I tell which employee is a better fit for my company? (00:19:29) Why not delay or postpone decisions for too long? (00:24:13) How do I communicate with my VPs and managers the nextphases of the company, even if they may no longer be right for the tasks, without them feeling attacked? (00:28:41) What role do company culture and revenue play in key personnel decisions? (00:34:55) How do you approach an exit internally and how do you communicate a possible sale or exit with your team? (00:40:26) How do you identify the VC that will "benefit" your company the most and move you forward? (00:43:23) How important is money really and how do I find the right one for my business among all the supposedly good VCs? (00:47:29) What is the role of the investor and the VC's respective partner? (00:50:55) When does ego help me build a good company and at what point is it too much ego? (00:54:31) Mike's last words for the audience? Mike Janke LinkedIn: https://www.linkedin.com/in/michael-j-a79327/ Datatribe: https://datatribe.com/ WHATSAPP NEWSLETTER: 1-2x weekly get a personalized voice note or content from me that will make you a better founder, sign up now with one click: https://bit.ly/ub-whatsapp-newsletter

Secure Ventures with Kyle McNulty
BalanceTheory: Greg Baker on Cybersecurity Knowledge Management

Secure Ventures with Kyle McNulty

Play Episode Listen Later Dec 27, 2022 44:06


Greg: CEO and co-founder of BalanceTheory, helping organizations consume security knowledge effectively and efficiently Previously co-founded Decision Lab which was sold to Optiv Won the 2022 DataTribe cybersecurity start-up challenge which led to a $3M seed round Check out the episode for our discussion on cybersecurity knowledge bases, shared information across organizations, and focusing on an MVP. balancetheory.io

Listening Post
Ron Gula: The Future of Quantum Cryptography

Listening Post

Play Episode Listen Later Jul 28, 2020 23:24


Podcast: The Secure Communications Podcast (LS 25 · TOP 10% what is this?)Episode: Ron Gula: The Future of Quantum CryptographyPub date: 2020-07-09Quantum computing isn't a reality yet, but most experts concede it is not far away. When that day comes, threat actors will have the ability to decrypt data they've stolen years before -- unless that data is protected by quantum-resistant cryptography. On this week's episode of The Secure Communications Podcast, we talk with cybersecurity investor and policy expert Ron Gula about the promises of and challenges associated with quantum cryptography. In this episode Ron is President at Gula Tech Adventures, which focuses on cybersecurity technology, strategy and policy. Since 2017, GTA has invested in dozens of cyber start-ups and supported multiple cyber funds. From 2002 to 2016, Ron was the co-founder and CEO of Tenable Network Security. He helped grow the company to 20,000 customers, raise $300m in venture capital and grow revenues to $100m, setting up the company for an IPO in 2018. Prior to Tenable, Ron was a cyber industry pioneer and developed one of the first commercial network intrusion detection systems called Dragon, ran risk mitigation for the first cloud company, was deploying network honeypots in the mid 90s for the DOD and was a penetration tester for the NSA where he got to participate in some of the nation's first cyber exercises. Ron is involved in a variety of cyber nonprofits and think tanks including Defending Digital Campaigns, the Cyber Moonshot, the National Security Institute and the Wilson Center.  Quick links Check out the Gula Tech Adventures website Follow Ron on LinkedIn  Read Kathleen (00:08): Thank you for joining today's episode of The Secure Communications Podcast. I'm your host Kathleen Booth. And today my guest is Ron Gula. Ron was the founder, cofounder, I should say, and CEO of Tenable. Today he is the president and cofounder of Gula Tech Adventures. Ron, you have an unbelievable bio. You know, you've been on the board of so many different cybersecurity companies. You're an active investor. You are, have served as a global fellow at the Wilson center, an advisory board member for George Mason University's National Security Institute. You have such a fascinating perspective on the cybersecurity industry, you know, too much to name. If I went through your whole bio, we could spend the entire podcast on that. But, but I'm really excited to have you here and, and get your perspective on a topic that I think is really interesting, which is quantum cryptography. Ron (01:00): Thank you very much for the the kind introduction and thank you very much for having me on the podcast today. So quantum cryptography, I, I it's, that's a topic that people should be very, very afraid of. But unfortunately we're really not doing a whole lot about it right now. So you know, assuming your users know a good bit about cryptography already, I kind of look at this problem as if somebody's collecting all of your encrypted traffic. Can they use a quantum computer at some point in the future to somehow break that traffic? And you would think that because of that threat, perhaps from quantum computers, you know, that there'd be more investment here and more awareness, but there really hasn't been. Kathleen (01:43): So let's start out by talking about the timeline, because I think this is something that, well, it's certainly something that I find fascinating. And I don't know if, if everybody understands it and maybe this is one of the reasons for a lack of investment in it, you know? We don't have quantum computing yet. What is, what is your opinion as far as when you think that it will actually be usable? Ron (02:07): So it's, it's interesting. I, I've, I've gotten a chance to spend some time with quantum computing companies and I ask them, so, you know, I ask them, so when can we break crypto? You know, when can we solve certain kinds of other problems and whatnot? And typically there's not a good answer there. And, and, and I said, well, do you think anybody else has done it? And they typically say no, because as soon as somebody has figured out how to do it, all these people are going to disappear and go work for the CIA or the NSA or a bank or, or, or, or something like that. So I think it's really difficult to put a number on, is this like a next year thing or next decade thing? And the problem kind of also overlooks the fact that you've got to collect all this traffic. Ron (02:48): Now, if you think about, if you imagine that the NSA and our adversaries have an infinite amount of storage and have infinite points to collect our data, then, then this is a problem. But, you know, the reality is that we live in a world based on physics, and, you know, a lot of these things need to be stored and kept in places. And I don't think the average person's having, they're, they're, they're having more stuff stored on them in social media, then perhaps an adversary is going to, you know, kind of come after them and collect on them Kathleen (03:17): Now, and, and, you know, I'm not a highly technical cybersecurity expert. And so my understanding of quantum the risk associated with quantum computing is that, you know, we don't have to worry right now that somebody could use it to, you know, crack, crack into some of the most protected information we have, but someday it's going to be a possibility. And I think, you know, the average person might think, well, who cares? So someday we'll deal with it then. But I guess my understanding is it's, it's more, you know, we can have that data stolen now and it can be held and eventually compromised in the future when that capability does come online. Is that right? Ron (03:57): It is a good, a good application of that is imagine you have something today that a crypt, cryptography that we all use - the TLS, SSL TLS you know, basically the, the S in your HTTPS. Technically you should be able to go and, you know, go to a coffee shop and go visit your favorite, you know, Facebook website, that's got, that's protected by that kind of, of crypto. And even if it was collected, it's going to be hard to break. But if at some point in the future, you know, somebody does come along and have an easy to use quantum computing, you might be able to do that. Now it starts getting a little far fetched. Is there a coffee shop somewhere, of course, pre COVID or whatever, you know, but it's some place that we're all using, you know, publicly collectible traffic that we could then say, well, the one day Ron Gula came in and happened to check his bank account. Ron (04:49): I have those packets that are in there and all, all set to go, you know? It's, it's just, it's when you think of all the things you have to do to protect yourself online, you know, patch, two factor authentication. This, it's just not the top of list for most people. And if they want to, they can just use their own, you know, a VPN, a product that you guys offer, right? Where I've done my key exchange ahead of time. You know, granted, you might be able to collect those packets and, and do it, but now you're, you're still a much harder target than people who are just relying on the cryptography from the web applications that they're using. Kathleen (05:26): Yeah. And it seems like for the average person, the notion that somebody could steal my data now, and, you know, 10 years from now, they could crack into it, I would think, so what? Like, my credit card numbers will have changed by that point. Who knows if I'll be at the same bank? Like, it almost, it doesn't seem like much of a risk to me, but where I think it gets really scary is when you think about data leakage from a place like the NSA, which, which has been compromised, you know, and there has been information stolen out of there, and maybe somebody can't process it and get into it right now. But, but if 10 from now, they're able to discover the identities of certain people or, you know, different programs that the U S government has, that then becomes a truly frightening prospect it seems. Ron (06:08): It is. And again, it's hard to be a, you know, a cybersecurity pro, cyber security person and say like, this is just not that big of a deal. But for me, I used to be like, Hey, look, this is a big problem, right? Computer's gonna be a lot faster, whether they're quantum or not. And, but at the coffee shop, you know, with using your quantum resistant cryptography, chances are the, the, the 20 dollar lock on your house that you bought from Home Depot, somebody can bust through that and put, you know, sniffers in your house you know, but little bugs that can get the same kind of information that you're trying to protect. So the question is really is, you know, when you bring that over to a large enterprise, it's, it gets, it gets interesting. It's just not the number one thing that people are working on. Kathleen (06:53): So given that the differences in the kind of, the level of risk and the implications of a compromise, do you think that, where, where do you see most of the work coming from on, on quantum resistant cryptography? Is it, do you see a lot of it coming out of the government or being funded by the government, or do you see more of it coming out of the private sector? Ron (07:15): So, so the biggest innovation I've seen in quantum resistant sort of security is, is this concept of, of multipath communications or shredding. So if I'm going to go from point A to point B, and you're assuming that your adversary is collecting on you between those things, if you can take a thousand different routes, every second, you're going to minimize the amount of data that they can collect on you. And of course, they're on your computer. Your computer is compromised. It's not going to help you, but neither will quantum resistant cryptography. And similarly, you know, if you're worried about data at rest, and you've got a one MB file, if you had a, like a hashing algorithm or a way to just physically separate that file into many, many different places - a little bit on Amazon, a little bit on Google, a little bit on your USB drive - you know, whatever, whatever that combination is, an adversary would then not only have to be able to break, your crypto, like get access to all of that, that data, that data. So the strange thing is, I've been pitched a bunch of companies like this, and there's pretty cool things. And I just, haven't seen a lot of people jump on this because they're on this mindset that the future is basically endpoint cryptography, or endpoint computing and cloud computing. You know, there'll be no CASBs in the middle. There's no, it's just about that secure access between where I need to go and where I need to go. And they're not worried about, you know, making sure that it's crypto or quantum resistant at that point. Okay. Kathleen (08:37): What do you think is, needs to happen to change that? Ron (08:42): There's gotta be a little bit more, I think, demonstration of this. And unfortunately, you know, the demonstrations we are getting is that when we break crypto, it's usually a software bug, right? Someone's figured out a way that they can see the CPU, change a crypto algorithm, extract keys, extract that, that type of stuff. But the problem is, is that, you know, just doing basic cryptography is so hard. You really have to understand who has access to your keys. You have to rotate keys, you have to do all those things. And I always like to point out that a lot of people got into cybersecurity came out of the military. They were key custodians, right? They were the people who would re-key the point to point bulk encrypters. They would, they would do things like change the codes for, you know, for duress, the duties got protocols for changing these different things. And the commercial world, private citizens, they have no concept of that. Ron (09:29): Right? I mean, I, I know people who have bad passwords to get into their password manager, you know? It's like, that's not the point, you know? So, so that's my concern is that, you know, we've really got to level up, a lot of basic hygiene things before we go tackle this. Now don't get me wrong. If, if tomorrow you know, Facebook or, or, or, or Amazon, or, you know, whoever has got more advanced, you know, ways for us to authenticate and, you know, encrypt as we, as we connect to them, you know, I'm, I'm, I'm happy with that. But in the meantime, you know, I still recommend people, like, if you're concerned about this, you should be buying products like Attila. You should be buying products that where you control your own infrastructure and then make use of what you control, because you can't just control everything else. Kathleen (10:17): So who's, who's doing really interesting work in the field of quantum cryptography? Who's out there kind of at the cutting edge? Ron (10:26): So there's, it's a little bit like the supercomputers, right? And so they, they every, every month or so you hear, Oh, the Japanese have got the world's largest supercomputer or the Russians do, or the Chinese do. Right? So the quantum folks are doing, doing interesting things. So the quantum computing folks, you've got here in Maryland, you've got that. Everybody's got a project because there's such interesting things. And, you know, I get to watch a lot of science fiction and, and play a lot of science fiction. You know, like World Builders. I'm playing Expanding Universe 2 right now. And it's kind of like Civilization, right? And quantum computing is usually one of the things you unlock that gives your, your race or your species, you know, magical powers. The problem is that the promise of what the quantum community just hasn't, it hasn't delivered yet. I think if anybody has broken it, you know, or they haven't done a lot of a lot of practical things with it just yet, that we've, that we've seen. Kathleen (11:19): So do you think it will be broken at the nation state level or in the private sector? Ron (11:22): Yeah. These are very, these are it's um, so without trying to sound too negative, so venture capital people talk to each other and you know, why would you invest in this company? Why would you not invest in this company? And it really tracks, the quantum computing, it's really tracking like healthcare research, where it takes a long time. There's a lot of PhDs in involved. A lot of universities involved. A lot of research. I mean, this is not true trivial stuff that you're going to do in your, or your, your garage. You're talking, moving atoms your, and then getting them to do things, things, and compute. And it sounded like wasn't that what a chip is? Like, Oh, the science is a lot different. Ron (12:07): I was very lucky. One day I got to visit one of these, these super computing, quantum computing companies. And there was another visiting fellow and, and this person had been to like nine other places. I got to hear about all the different kinds of, I'm dated because it's only two years ago. But at the same time, this could be a 20 year journey before we have a practical computer that you can buy in your, your you know, in your house. And it reminds me of when you, when you go and you see these, these quantum computers, you, you're like, where's the computer? They don't look like computers. It's telling you, there's a couple of these organizations. Ron (12:50): They show basic things like, show me how to code the traveling salesman problems. And I'll, I'll get the look like, no, we're not, you know, we're not really there yet. It's something I think is, is worthwhile to do. And if we're going to talk, talk a bit about quantum encryption and a bit about, there's this third area about quantum communications, where you can basically encode you know, the photons, the wave lengths in a certain way. Possibly you can, you can change a quantum object here. Maybe you can, you can stimulate it moving on the other side of the universe as a form of communications. I would love to see that. Everything I've seen has been snake oil. So, you know, I'm all for that kind of stuff, but it's, it's, it's not ready for commoditization in prime time just yet. Kathleen (13:37): Yeah. Now how accessible, if, if somebody is concerned about this and they do want to take steps now to try and protect their data, how accessible is quantum resistant cryptography now? Ron (13:51): Well, one of the reasons, so it's very accessible. You know, one of the reasons that the venture capital community has not jumped on this, it's because the cryptography becomes an OEM type of type of market. And before, you know, I get jumped on for, not from you, but know my business model. There's nothing fundamentally wrong with that. Ron (14:20): I have to do similar things. I probably have been pitched the last three, four years, probably about maybe 10 or 11 different quantum crypto library companies, where they actually don't sell anything to a direct customer. They sell it as a third party. Like a you know, w which is the believer that it's the right thing, because, you know, photography is hard. What you want is you want a team of really, really smart people who that's, all they've done. They focused on the cryptography has been vetted by the U S government. You know, that, that that sort of approach, the problem is that if they're out there selling well, licensing a library, it's not a huge, a huge thing. Back in the late nineties, early two thousands, I remember that you know, ISS, for the product that they were doing, they switched to elliptic curve cryptography to you know, communicate with their agents. And it was more resistant and that kind of stuff. Didn't really make a lot of difference I think for, for, for people that were like, okay, that's cool. That's, that's, that's better crypto, but, you know, does that really make you a better, a better security? And you would think it would be, especially since people do break into security products, but the market didn't, the market could have cared less. They want easier to use products. They don't really want, you know, that kind of stuff, but that's kind of where we're at right now. Kathleen (15:31): That's so fascinating. I mean, I think it's, it kind of applies to a lot of security, the sense that, you know, while we know there are risks out there, we just choose not to protect against them. It's, you know, it's like buying insurance, it's the same principle. It'll never happen to me. It's not going to happen anytime soon. That sort of thing. So I'm, I'm curious to see, what's going to take place that will prompt more of an interest in this. Ron (15:54): Yeah, what's going to happen, in the United States, it's NIST. N I S T is the group that does that. You've probably heard of it. DES encryption and triple DES, and then there was AES encryption and, and NIST does bake offs the same way that the air force does bakeoffs, like we have the F22 Raptor aircraft. But, but what do we really want? And this has got a lot of input from the NSA. They got a lot of very, very smart mathematicians and they're baking off these algorithms. And you know, I haven't gotten a recent update, but almost every pitch I get is like, Oh, we're part of the bake off for NIST. We were, we won this, this, this part of it. That's great. That's awesome. Kathleen (16:45): Yeah. Demand just needs to follow, I guess. Ron (16:49): It is. It's, it's one of those things where you, you know, like, let's say I got a tip from somebody who had a breakthrough in, in cryptography. You almost don't want to touch that because historically, that's where, you know, something's wrong and you, you miss a leak, you miss some sort of entropy sort of, sort of where you can actually decrypt it. And now crypto is the NSA because they have enough people to do the peer review and, and literally red team it and attack it. And I think that's very apt in these kinds of things. If you're a small company, a 10 person company, and you're coming up with the next generation, you know, quantum resistant, crypto, great prov it. You know? Go to NIST. Go to all that stuff. And, and then even after that, what's your business model? Like, why is your crypto going to be that much better than, than, than everybody else? Kathleen (17:44): Yeah. Well, it sounds like the U S government will lead the way, at least in creating demand if, you know, for it to protect itself. And then, and then it sounds as though that that could roll out a form of standards or regulations that would eventually bleed into the private sector. Is that accurate? Ron (18:00): Yeah. It's, it's, it's, it's very accurate. Ron (18:12): There's like satellites, if you've did right. It's, it's there. But when you're, when you're in space and when you're, you're there, know that's, that's weight on that device. So, so there's believe it or not, you know, there's a really a need for just encrypting in general. And it can even be bad encryption, but there's a lot of stuff that's, un-encrypted, that's, that's, that's still going on today. Actually, we have more encryption everywhere that you know, we have a lot of other things that were, that are in the clear now, that are not so much in the clear. Kathleen (18:42): Yeah, yeah. It's fascinating. I was talking to somebody the other day about IOT and it sounds like that's one area that, that is incredibly vulnerable for that same reason. Ron (18:52): So not only with IOT, do we have an issue where the device itself might have not been coded securely, but the protocols that'd be an inline when, if you look at something like SMB version three, which is very enterprise ready and has all sorts of which of levels of, of cryptography, you know, kind of built into it, you know, you just don't see that, you know, and, and talk to the cloud and we're going to give you a web interface, or a mobile app to talk to that cloud, you're hardly ever, so we need to reverse engineer it. With like one of your portfolio companies, you know, Refirm Labs from DataTribe there, you know, they find tons of stuff in IOT devices, all, all the day. Encrypt, you know, can, can you encrypt that better? Can you keep it, what's being collected half the time? So, so that's kinda where I'm seeing that market at right now. Kathleen (19:53): Yeah. Now, switching gears, you are an investor, you, as you mentioned, you get pitched by a lot of companies. You see a lot of technology. Is there a particular cybersecurity technology that you're really excited about right now? Ron (20:12): My friend's at DataTribe have some of my favorite companies. So way, the way I like to talk about it, is that, you know, I've done two companies. I've done Network Security Wizards, which was a network intrusion detection company. We did Tenable Network Security, which is cyber, you know? Ron (20:36): And swim lane. And after I left Tenable as an investor, I really got to explore. There's Huntress Labs. Huntress Labs is really focused on the SMB and finding malware, or finding back doors, finding, you know, phishing, phishing targets, you know? I find that very exciting. It's not about just their detection is it better than, you know, a Crowdstrike or a Sentinel One. It does it. Cause when, when you're dealing with a dentist office, it's a such a different mindset than, you know, dealing with like a bank, you know? Where we're, where they've got, you know, so I'm enjoying stuff like that. I'm, I'm really enjoying a lot of the different ways we can solve some of these problems. Some of the things that, that we've invested in is like cyber education. So if you look at the work that we're doing with Cybrary and you extend that to people like Catalyte, you know, that's, that's really interesting. The ability to use AI and, and, and create, you know, developers and IT teams, or in Cybrary's case, you know, the development or the ability to really, you know, pull people either from you know, inner city, retiring veterans, just anybody who's got a, access to the, to the internet, you know, into the cyber you know, career is, is just, is just really, really fun stuff. Ron (22:05): So it's, I think my biggest frustration sometimes is I'll, we'll invest in a certain category and somebody will solve it a certain way. And then another company will come along and solve it almost completely differently. Then we're sort of like, okay, well, do we want to invest in both of these companies, because they're going after the same dollars. Kathleen (22:27): Yeah. Ron (22:34): On the cloud, like Cloud Flare, or are you going to be in like a contrast, you know, and those two completely different businesses, well, security, it gets, it gets in there. That's the world I get to live in. And I really enjoy helping people think through that. And you know, hopefully we're making a difference and invest in the second and third tier here. Kathleen (23:02): Well, I love that you're involved in so many different education organizations and, and trying to kind of bring up the next, the next generation of cybersecurity professionals. I also love that you've been in business with your wife for so many years. Fun fact, I owned a company for 11 years with my husband. And so I feel like we could have an entirely separate podcast episode just on, just on working with your spouse, but I think that's, that's fantastic. And I love that story about what you guys are doing. Ron (23:30): So it's, it's funny you know, a lot of people know our story. You know, Cindy didn't get sort of the cofounder or on the web sort of, sort of u, you know, I had it explained to me, if you look at the, just for example, the divorce rate, you know, that kind of stuff, there's just, there's a, there's a 50% chance one of you is going to get divorced and leave the company and it, and that's a real risk. I get it. I get it. Having said that though, now that we've been a lot more public about it, I'm finding like you, you, you did business with your husband. I'll find a, to a brother's team, you know, that, that, that are working together. Now, brothers don't get divorced, but you can have fallings out with your families and stuff like that. I find that if you can make it work, it can be a very, very strong thing. But whenever we do sort of like off the cuff marriage counseling or anything like that, it's not like, Hey, why don't you, you guys go start a business. That'll solve all your, you know, all your things. But, but yeah, no, glad that, glad you brought that up. Kathleen (24:35): Yeah. I think going into business with anyone is kind of like getting married. Like, you have to be a phenomenal communicator and you've got to talk about everything to make it work. I always say that my greatest accomplishment in life is that I'm still married after 11 years of business partnership. So you're right. It's, it's, it's great. You have a level of trust you can't get with somebody you know, somebody else, who's not your family, so fantastic. Well, I really appreciate you joining me for this episode. It was, it was fascinating. If somebody wants to learn more about you and some of the work you're doing, where should they look online? Ron (25:12): So we maintain a webpage at gula.tech. We have a list of all the portfolio companies, including the DataTribe companies like you guys. And you know, we blog a good bit about podcasts. I'll be putting this on our blog eventually. And then you know, if they want, I do, I do post pretty pro, a good bit on LinkedIn, a little bit, you know, business. You gotta keep it on LinkedIn, but I appreciate anybody that wants to look us up. So let us know. Kathleen (25:48): Fantastic. Well, I'll put those links in the show notes. And if you're listening and you enjoyed this episode, please consider leaving the podcast a review on Apple Podcasts or wherever you choose to listen. And we want to hear from you. If you have an idea for a future episode, tweet us at @Attilasecurity. Thanks for listening. And thank you, Ron. Ron (26:06): Thank you.The podcast and artwork embedded on this page are from Attila Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ITSPmagazine | Technology. Cybersecurity. Society
The BlackCloak Story — Chapter 2 | With Christopher Pierson

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 2, 2020 26:14


A Their Story Podcast with Sean Martin and Marco Ciappelli Guest: Christopher Pierson The organization telling us their story today is BlackCloak. This is a story that sits squarely where business and society connects with technology and cybersecurity. Last time we saw Chris Pierson in person was at RSA Conference in San Francisco, since then many things have happened. Amongst those a round of funding from DataTribe which further validates the service that the BlackCloak team is bringing to the market. According to the release, the investment will be used to “strengthen its concierge cybersecurity platform and expand its presence within key sectors where cybercrime losses and intellectual theft continue to be on the rise.” Succeeding in the information security market takes a lot more than building a better mousetrap. The market must be ready for the solution—finding value and willing to pay for the it—and the team must be capable of surviving a financial runway that supports a return for their investors. Looks like BlackCloak is on the right track for all of the above. In this podcast, Dr. Pierson walks us through some of the high level threat trends and specific threat activity he and his team are seeing and monitoring as they protect executives and high net worth individuals when and where their business cyber protections stop— in their home and in their everyday life. From home printers being hijacked to cyber extortion, everything is fair game for cyber criminals. Of course this new normal that is taking place, as businesses find their employees—and their top level executives—working from home full time, using home-based network and computing equipment, and sharing this new “office” space with their family (who are also home full time now), it’s more important than ever to ensure the safety of these high profile employees. No need to take our word for it. Press play and listen to Dr. Pierson telling us about this new chapter in the BlackCloak story. Be sure to visit BlackCloak at https://itspm.ag/itspbcweb to learn more about their offering.

What's Working in Washington
What's Working in Washington - Ep 398 - Finding successful fundraising - EXTRA

What's Working in Washington

Play Episode Listen Later Mar 8, 2020 28:03


Raising money is extremely tough and sometimes ends in failure, but it's also one of the most important parts of starting certain businesses. To learn more about what experts have done to raise their money, we spoke with serial entrepreneur and investor Jamey Harvey, DataTribe investor and entrepreneur John Funge, and Modscore founder Mike Modica.

The CyberWire
Pemex ransomware update. Spearphishing with spoofed government phishbait. Trojan two-fer. AntiFrigus ransomware avoids C-drive files. BLE bug. DataTribe’s annual Challenge.

The CyberWire

Play Episode Listen Later Nov 15, 2019 26:37


Pemex has recovered from the ransomware attack it sustained...or has it? TA2101 is spoofing German, Italian, and US government agencies in its phishing emails. A dropper in the wild is delivering a Trojan two-fer. AntiFrigus ransomware is avoiding C-drives for some reason. Ohio State researchers find a Bluetooth vulnerability. And the results of the annual DataTribe Challenge are in--we heard the three finalists pitch yesterday, and the judges have a winner. Robert M. Lee from Dragos on purple-teaming ICS networks. Guest is David Spark from the CISO/Security Vendor Relationship Podcast on marketing to CISOs. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_15.html  Support our show

Securiosity
Oh great, another round of the crypto wars

Securiosity

Play Episode Listen Later Oct 4, 2019 66:07


Brace yourselves, there is another round of the crypto wars coming over the horizon. We will dive into what exactly is happening this time around. In our interview, we talk to Bob Ackerman, Managing Director of Allegis Capital and founder of DataTribe, on what are the emerging areas in cyber venture capital, why NSA talent is building the next wave of cybersecurity companies, and what exactly is to come with the next DataTribe challenge

What's Working in Washington
What's Working in Washington - Ep 346 - The roadmap to small business success - Tony Surak

What's Working in Washington

Play Episode Listen Later Jun 13, 2019 7:35


Tony Surak, chief marketing officer and partner at DataTribe, discusses the swings and pitfalls of successfully growing a small business, and why revenue isn't the most important thing to shoot for early on.

Business Security Weekly (Audio)
The Mistake People Make - Business Security Weekly #111

Business Security Weekly (Audio)

Play Episode Listen Later Dec 18, 2018 69:16


This week, Matt and Paul interview Bob Ackerman, a legend in venture capital investing, and is referred to as one of "Cyber's Money Men". Bob is also the Founder and Managing Director of venture capital firm AllegisCyber! In the Leadership Articles, Matt and Paul discuss how to be productive during the holiday season, how to work from home without losing your mind, how to talk to your boss when you’re underperforming, selling your product as you build it, and more!   Full Show Notes: https://wiki.securityweekly.com/BSWEpisode111 Visit https://www.securityweekly.com/bsw for all the latest episodes! Visit https://www.activecountermeasures/bsw to sign up for a demo or buy our AI Hunter!   Visit our website: https://www.securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

founders business leadership men news mistakes managing directors holiday season people make business stories sellingproduct bob ackerman datatribe ai hunter allegiscyber business security weekly leadershiparticles cybersmoney
Business Security Weekly (Video)
Bob Ackerman, AllegisCyber - Business Security Weekly #111

Business Security Weekly (Video)

Play Episode Listen Later Dec 18, 2018 47:12


Bob Ackerman is a legend in venture capital investing and is referred to as one of "Cyber's Money Men". Bob is the Founder and Managing Director of venture capital firm AllegisCyber, Co-Founder of DataTribe, Maryland's Cyber Start-up Studio, and the Founder and Executive Chairman of FounderÕs Equity Partners. Bob, welcome to Business Security Weekly. Full Show Notes: https://wiki.securityweekly.com/BSWEpisode111

founders men co founders managing directors studio executive chairman bob ackerman datatribe allegiscyber business security weekly cybersmoney
Paul's Security Weekly TV
Bob Ackerman, AllegisCyber - Business Security Weekly #111

Paul's Security Weekly TV

Play Episode Listen Later Dec 18, 2018 47:12


Bob Ackerman is a legend in venture capital investing and is referred to as one of "Cyber's Money Men". Bob is the Founder and Managing Director of venture capital firm AllegisCyber, Co-Founder of DataTribe, Maryland's Cyber Start-up Studio, and the Founder and Executive Chairman of FounderÕs Equity Partners. Bob, welcome to Business Security Weekly. Full Show Notes: https://wiki.securityweekly.com/BSWEpisode111

founders men co founders managing directors studio executive chairman bob ackerman datatribe allegiscyber business security weekly cybersmoney
Paul's Security Weekly
The Mistake People Make - Business Security Weekly #111

Paul's Security Weekly

Play Episode Listen Later Dec 18, 2018 69:16


This week, Matt and Paul interview Bob Ackerman, a legend in venture capital investing, and is referred to as one of "Cyber's Money Men". Bob is also the Founder and Managing Director of venture capital firm AllegisCyber! In the Leadership Articles, Matt and Paul discuss how to be productive during the holiday season, how to work from home without losing your mind, how to talk to your boss when you’re underperforming, selling your product as you build it, and more!   Full Show Notes: https://wiki.securityweekly.com/BSWEpisode111 Visit https://www.securityweekly.com/bsw for all the latest episodes! Visit https://www.activecountermeasures/bsw to sign up for a demo or buy our AI Hunter!   Visit our website: https://www.securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

founders business leadership men news mistakes managing directors holiday season people make business stories sellingproduct bob ackerman datatribe ai hunter allegiscyber business security weekly leadershiparticles cybersmoney
The CyberWire
Multibreach via chat app. OceanLotus notes. Mirai vs. Banks. Energetic Bear vs. Switches. Russia warns Britain against provocation. DataTribe finalists.

The CyberWire

Play Episode Listen Later Apr 6, 2018 21:44


In today's podcast we hear that a breach in several companies' consumer-facing systems is attributed to a third-party chat vendor. Crooks are tampering with chipped debit cards. Ocean Lotus is back, with a MacOS backdoor. A Mirai variant was used against banks earlier this year. Energetic Bear may be exploiting misconfigured switches. Microsoft looks into Office 360 outages. Russia warns Britain against playing with fire. And three cyber startups are DataTribe finalists. Johannes Ullrich from SANS and the ISC Stormcast podcast, on API security. Guest is Jimmy Heschl, head of digital security at Red Bull, discussing the challenges of securing a global brand. 

What's Working in Washington
What's Working in Washington - Ep 215 - Secret strengths of product and service businesses - John Funge

What's Working in Washington

Play Episode Listen Later Apr 1, 2018 10:51


John Funge, chief product officer at startup incubator and venture capital firm DataTribe, discusses the main, inherent differences in product- and service-oriented businesses, and how the D.C. region can be a great opportunity for both to thrive.

Chiens de garde
MacronLeaks, les ultrasons comme vecteur d'attaque et le limogeage de James Comey

Chiens de garde

Play Episode Listen Later May 11, 2017 32:36


The CyberWire
Fancy Bear's phishing expeditions. Cryptowars and privacy regs in the EU. Is that really you, Dr. Niebuhr? 

The CyberWire

Play Episode Listen Later Mar 31, 2017 19:53


In today's podcast, we hear about how Fancy Bear left tracks in Bitly, and Fancy Bear did an awful lot of phishing going back to March 2015. Experts take a look at Russian espionage and influence operations, and they draw some disturbing conclusions. The EU seems ready to go anti-encryption—how that will work with the EU's regulatory emphasis on privacy is anyone's guess. The University of Maryland's Jonathan Katz explains the recent Z-Coin crypto-currency bug. Bob Ackerman from Allegis Captical and DataTribe offers insights on the investment environment for cyber. And no, that's not a famous theologian tweeting: it's the head G-Man.