POPULARITY
Few cybersecurity companies have been able to bootstrap their way to success – Tenable stands above the rest in this category. The company raised its first round of funding after 10 years of operations. It had $90M of revenue at the time. In the venture world, “Tenable was the best cybersecurity business that nobody had ever heard of.” Today, it is the leading cyber exposure and vulnerability management company with $800M in revenue and over 44,000 customers globally.In our second episode of ‘Inside the Network' we sit down with Ron Gula, co-founder and former CEO of Tenable. We learn about his early beginnings and love for fighter jets and UFOs. We dive into his three successful startup journeys, including his most recent run building Tenable over 14 years. And we talk about lessons learned from his investing career at Gula Tech Adventures with over $100M invested in 50+ startups.After their successful entrepreneurial journey, Ron and his wife Cyndi's work has continued with Gula Tech Foundation, working to make the cybersecurity sector more diverse and inclusive. Finally, we touch on Ron's new-found passion as a YouTube influencer – the Joe Rogan of cybersecurity has now garnered over 150K subscribers!
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Ron Gula, president and co-founder, Gula Tech Adventures. In this episode: Why is it so darn expensive to get any training on the defender side? Why is there a mountain of free education for red teaming? Shouldn't blue team training should be free or less expensive as well? Is this the firewall that's preventing us from having all those cyber experts we so desperately need? Thanks to our podcast sponsor, Query Query Federated Search gets to your security relevant data wherever it is - in data lakes, security tools, cloud services, SIEMs, or wherever. Query searches and normalizes data for use in security investigations, threat hunting, incident response, and everything you do. And we plug into Splunk. Visit query.ai.
Cybersecurity touches all our lives, however there is a belief that only experts in all of the technical disciplines need to apply. The term ‘cybersecurity' does not invoke a personal sense of responsibility to care for the protection of data. Join us as we discuss the concept of reframing cybersecurity to “Data Care”, like the concepts used in the healthcare industry to advance personal responsibility as well as to attract people to the field that may not have considered it previously. Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/ Show Notes: https://securityweekly.com/csp-143
Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 95: Exploring the Tech Odyssey: A Conversation with Ron Gula of Gula Tech AdventuresPub date: 2023-09-12Derek is delighted to welcome Ron Gula of Gula Tech Adventures as the guest for today's show! His name is synonymous with innovation and expertise, and many listeners are bound to recognize the companies he has either birthed or influenced. Ron is originally from upstate New York. He was born in Rochester, grew up in Syracuse, and went to Clarkson University. He has had a multifaceted background and has worn many hats throughout his career. First and foremost, he is a technologist, with his roots tracing back to his formal training as an electrical engineer. He is also a programmer, founder, and CEO. Beyond his professional accomplishments, Ron is a military veteran after serving in the United States Air Force. He is a husband, father, podcasting enthusiast, masterful 3D animator, and scuba diver. He also indulges in cigar appreciation, holds roles as an investor, advisor, and board member across diverse ventures, and is a passionate champion of philanthropy. Today's conversation promises to be enlightening and inspiring! Stay tuned as we delve into the multifaceted tapestry of Ron's life and myriad experiences!Show highlights:How Ron became a hackerOne of Ron's worst experiencesThe importance of understanding the mission of a companyRon talks about Dragon, network security, and how Dragon got acquired by another companyRon shares his motivation for starting his business and explains how he did itRon shares his advice for doing a startupHow Ron and his business partner co-founded Tenable Why Ron called his company Gula Tech AdventuresWhat they do at Gula Tech Adventures Links and resources:(CS)²AI Derek Harp on LinkedInRon Gula on LinkedInGula Tech AdventuresThe podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Derek is delighted to welcome Ron Gula of Gula Tech Adventures and Co-Founder of Tenable as the guest for today's show! His name is synonymous with innovation and expertise, and many listeners are bound to recognize the companies he has either birthed or influenced. Ron is originally from upstate New York. He was born in Rochester, grew up in Syracuse, and went to Clarkson University. He has had a multifaceted background and has worn many hats throughout his career. First and foremost, he is a technologist, with his roots tracing back to his formal training as an electrical engineer. He is also a programmer, founder, and CEO. Beyond his professional accomplishments, Ron is a military veteran after serving in the United States Air Force. He is a husband, father, podcasting enthusiast, masterful 3D animator, and scuba diver. He also indulges in cigar appreciation, holds roles as an investor, advisor, and board member across diverse ventures, and is a passionate champion of philanthropy. Today's conversation promises to be enlightening and inspiring! Stay tuned as we delve into the multifaceted tapestry of Ron's life and myriad experiences!Show highlights:How Ron became a hackerOne of Ron's worst experiencesThe importance of understanding the mission of a companyRon talks about Dragon, network security, and how Dragon got acquired by another companyRon shares his motivation for starting his business and explains how he did itRon shares his advice for doing a startupHow Ron and his business partner co-founded Tenable Why Ron called his company Gula Tech AdventuresWhat they do at Gula Tech Adventures Links and resources:(CS)²AI Derek Harp on LinkedInRon Gula on LinkedInGula Tech Adventures
Today on All Quiet, Tyler is joined by cyber nerd and UFO fanatic, Ron Gula. Ron is the President of Gula Tech Adventures, a cybersecurity company focused on cyber tech, cyber policy and recruiting people into the cyber workforce. In this episode, Ron guides us through a variety of thought-provoking topics to help us gain a better understanding of what cybersecurity is, how it's used and why Ron's such a firm believer in its power to unify.What's Happening on the Second Front:Calibrating amidst the noise and information overload in our data-rich societyBridging the Knowledge Gap: Congress, Cybersecurity, and the Language of TechnologyThe potential impact of AI's advancement on outsourced labor and globalizationDefining and exploring the concept of transparent electionsWays Ron believes cybersecurity can contribute to national unityIn this episode, we introduce Saved Rounds with Second Front CTO Enrique Oti. The topic today? SCSP's Offset X strategy paper and how it can potentially drive change.Connect with Ron:LinkedIn: Ron GulaWebsite: gula.techConnect with Tyler:LinkedIn: Tyler Sweatt Website: secondfront.comCatch 2F's Offset Symposium replay here. This show is produced by Soulfire Productions
Ron Gula is the President at Gula Tech Adventures which focuses on investing in cyber technology, supporting cyber policy and recruiting more people to the cyber workforce. Before starting GTA, Ron was the CEO & Co-Founder at Tenable.
On this episode we bring in Cyndi and Ron Gula from Gula Tech (https://www.gula.tech/) to talk about their cyber security experiences. Listen and enjoy as they tell their stories about leaving the NSA, creating the first commercial network Intrusion Detection System (IDS), Founding Tenable Network Security, and investing in multiple cybersecurity startups. Special thanks to our sponsor Risk3Sixty for supporting this episode. Be sure to check their weekly thought leadership, webinars, and downloadable resources like budget and assessment templates at: https://risk3sixty.com/?utm_source=cisotradecraft&utm_medium=podcast&utm_campaign=2023-ct&utm_term=1week&utm_content=sponser Transcripts: https://docs.google.com/document/d/1zdJwzJUXHBLlQvOGYWtWVQqmxFzmAe5Z Chapters 00:00 Introduction 02:30 The Importance of Computer Security 04:46 The Career Path to the National Security Agency 07:39 The Importance of Compatibility 10:40 How to Get Your First Customer Off the Ground 14:28 How to Make your First Hire as a Beginning Entrepreneur 16:10 The Transition to Network Security Wizards 18:35 The Origins of Tenable 21:38 How to to Survive Contact with the Enemy 24:45 The Importance of Culture in the Military 29:31 Gula Tech Adventures 33:24 The Future of Venture Investing 36:13 Secrets of Working Together as Spouses 39:33 The Future of Venture Capital 42:21 Google Tech Adventures: How to Learn Startups
In episode 53 of Cybersecurity Where You Are, co-host Tony Sager is joined by Ron Gula, President and Co-Founder of Gula Tech Foundation. Together, they acknowledge Autism and Neurodiversity Awareness Month by discussing the need to create more opportunities in cybersecurity for neurodiverse individuals. They point out that there's no one way for all employers and supervisors to support employees with different abilities. It's up to the employers and supervisors to decide where those efforts fit into their culture and what each victory looks like.Attending RSA Conference 2023? Make sure you visit the main conference hall at 12:00 P.M. PT on Wednesday, April 26. At that time and place, Gula Tech Foundation will announce the four winners of its Spring 2023 grant campaign, "Expanding Opportunities in Cyber for the Neurodivergent." As part of the ceremony, you'll have a chance to speak with the winners about engaging neurodiverse individuals in your organization.ResourcesFollow Ron Gula on LinkedIn.Gula Tech FoundationEpisode 30: Solving Cybersecurity at Scale with NonprofitsEpisode 52: Back in the Buzz of RSA ConferenceTikTok: Influence Ops, Data Practices Threaten U.S. SecurityIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
Ron Gula built a multi-billion dollar business that went public. Now he is helping other founders make their startups succeed as an investor. His venture, Gula Tech Ventures, has invested in companies like Second Front Systems, North American Wave Engine Corporation, Cybrary, and ShardSecure.
In this episode of Cybercrime Radio, host Steve Morgan is joined by Gordon Lawson, CEO at Conceal, and Ron Gula, President and Co-Founder of Gula Tech Adventures, who is on the Board of Advisors for Conceal. Together, they discuss ‘good security,' how vulnerability scanning, penetration testing, and the practice of finding malicious implants are all part of it, and more. To learn more about our sponsor, visit https://conceal.io
Ron: President of Gula Tech Adventures, $100M self-funded VC firm Ex-CEO and Co-founder of Tenable, valued at over $7B at its peak in April Co-founder of Network Security Wizards, which created one of the first commercialized Network Intrusion Detection Systems (IDS) Networking expert! Check out the episode for our conversation on how to approach networking with a goal-based mindset, the importance of authenticity, and leveraging topic experts. https://www.gula.tech/data-care
In this episode, host Hillarie McClure is joined by Ron Gula, President and Co-Founder of Gula Tech Adventures, to discuss all things cybersecurity in movies and pop culture, including why this type of representation is so important, which films and television shows impacted him the most, and more. The “Hacker's Movie Guide” 2022–2023 Edition, published by Cybersecurity Ventures, is available on Amazon and you can order a printed or Kindle edition of the book. For more movies, visit https://hackersmovieguide.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Ron is President at Gula Tech Adventures, which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Since 2017, GTA has invested in dozens of cyber start-ups and funds and supported multiple cyber nonprofits and projects. From 2002 to 2016, Ron was the co-founder and CEO of Tenable Network Security. He helped grow the company to 20,000 customers, raise $300m in venture capital and grow revenues to $100m, setting up the company for an IPO in 2018. Prior to Tenable, Ron was a cyber industry pioneer and developed one of the first commercial network intrusion detection systems called Dragon, ran risk mitigation for the first cloud company, was deploying network honeypots in the mid 90s for the DOD and was a penetration tester for the NSA and got to participate in some of the nation's first cyber exercises. Ron was also a captain in the Air Force. LinkedIn: https://www.linkedin.com/in/rongula/ Gula Tech Adventures: https://www.gula.tech Cybrary, Free Cybersecurity Training and Career Development: https://www.cybrary.it/ SANS Institute: https://www.sans.org
Philanthropy, Cybersecurity, and Bringing the Energy.In this episode of The Outspoken Podcast, host Shana Cosgrove talks to Tasha Cornish, Executive Director at Cybersecurity Association of Maryland, Inc. (CAMI). Tasha discusses how her work has helped improve the nation, from running a human services nonprofit during COVID to defending the country from cyber attacks during the Russian invasion of Ukraine. She also explains why cybersecurity is important for every business and why information truly is power within the IT sector. Tasha gives advice to those entering the world of cybersecurity and reveals what advice she's seeking out for where she's at in her own career. Lastly, Tasha tells us about her adventure journey from snowboarding, scuba diving, running marathons, and possibly even CISSP. QUOTES “There's a very interesting debate when it comes to the human factor of cybersecurity. It's a combination of training your staff but also making sure that your networks are not over privileging your staff, that they have access to all these systems they don't need to access. [...] Which gets a lot of pushback of course from people who are trying to work hard and be productive, but it does help protect our systems” - Tasha Cornish [29:13] “Like anything else, if you don't have the people and processes in place to use these [cybersecurity] products, they're kind of useless.” - Tasha Cornish [30:20] “[Local governments] are a huge target [...] It's a lot, for schools and hospitals really, so we are out here trying to be a good source of information. And those folks are understaffed often, their security teams are strapped ” - Tasha Cornish [33:42] TIMESTAMPS [00:04] Intro [01:31] Meet Tasha Cornish [03:38] Tasha's Work at a Nonprofit During COVID [04:32] How Tasha Started on her Career Path [08:56] Tasha's Experience During COVID [10:15] Starting at CAMI [14:04] CAMI's Mission [16:24] Size, Scale, and Impact of CAMI [24:32] CAMI's Cybersecurity Role in the Russo-Ukrainian War [25:56] CISA [32:00] CAMI's Goals for 2022 [33:14] Cybersecurity Bills in the Maryland House [38:06] Choosing Priorities in the Cybersecurity [39:04] CAMI's Board [43:51] Advice for People Getting Started [45:36] WiCyS [49:40] Tasha's Book Recommendation [50:40] Tasha's Surprising Fact [52:27] Outro RESOURCES https://www.akc.org/dog-breeds/shiba-inu/ (Shiba Inu) https://www.smocbaltimore.org/ (Saint Mary's Outreach Center) https://www.nei.nih.gov/ (National Eye Institute (NEI)) https://www.thebodypro.com/article/prevention-works-close-end-month (Prevention Works!) https://www.gwu.edu/ (The George Washington University) https://www.jhu.edu/ (Johns Hopkins University) http://honfest.net/ (HONFest) https://www.nps.gov/places/star-spangled-banner-flag-house.htm (Star Spangled Banner Flag House) https://amhistory.si.edu/starspangledbanner/making-the-flag.aspx (Mary Pickersgill) https://amhistory.si.edu/starspangledbanner/ (History of The Star Spangled Banner) https://www.linkedin.com/in/keithdaw/ (Keith Daw) https://www.linkedin.com/in/emrosenberg/ (Eric Rosenberg) https://www.linkedin.com/in/shelleyjlombardo/ (Shelley Lombardo) https://commerce.maryland.gov/fund/programs-for-businesses/buy-maryland-cybersecurity-tax-credit (Buy Maryland Cybersecurity (BMC) Tax Credit) https://www.linkedin.com/in/rongula/ (Ron Gula) https://www.linkedin.com/in/cyndigula/ (Cyndi Gula) https://datatribe.com/ (Data Tribe) https://www.nsa.gov/ (National Security Agency (NSA)) https://www.cybercom.mil/ (United States Cyber Command) https://www.ftmeadealliance.org/ (Fort Meade Alliance) https://hubzonecouncil.org/National-HUBZone-Conference (National HUBZone Conference) https://www.cfr.org/global-conflict-tracker/conflict/conflict-ukraine (Russo-Ukrainian War) https://www.cisa.gov/shields-up (CISA's Shields Up Initiative) https://www.cisa.gov/ (Cybersecurity and Infrastructure Security Agency (CISA))...
Ron Gula, President and Co-Founder of Gula Tech Adventures, has a very specific goal: To defend the country in cyberspace by investing in companies and nonprofits that help close the gap in technology and the workforce. He also knows that in order to successfully achieve this goal, organizations must understand the basics of data protection. Today, Ron joins the show to talk about the mindset shift that can start in the information security disciplines through communication. Join us as we also discuss: The importance of asking the right questions of business owners Building a trusted ecosystem within the information security disciplines Creating a measure of security to determine the safety of your company's data The small business IT shops defining corporate America To hear this episode, and many more like it, you can subscribe to The Virtual CISO Podcast here. If you don't use Apple Podcasts, you can find all our episodes here. Listening on a desktop & can't see the links? Just search for The Virtual CISO Podcast in your favorite podcast player.
Ron Gula interviews Matt Devost about the state of cybersecurity, red teaming, threat intelligence and advising Michael Mann during the making of the Blackhat motion picture staring Chris Hemsworth. Matt is the CEO & Co-Founder of OODA LLC. Matt is a technologist, entrepreneur, and international security expert specializing in counterterrorism, critical infrastructure protection, intelligence, risk management and cyber-security issues. Matt co-founded the cyber security consultancy FusionX from 2010-2017. Matt was President & CEO of the Terrorism Research Center/Total Intel from 1996-2009.
In this OODAcast, we interview Ron Gula, co-founder and CEO of the highly successful Tenable Security(NASDAQ:TENB) and currently President of Gula Tech Adventures. Ron has a long history in the cybersecurity field that includes starting his career as an NSA hacker and then transitioning into an entrepreneur responsible for multiple innovations in the market and several successful companies. Ron remains a hacker at heart, and currently focuses his energy on investing in and mentoring emerging companies, improving public awareness on cybersecurity, and engaging in philanthropic efforts. In our conversation with Ron, we explore his career history, the state of cybersecurity, where we should focus our innovation investments, and how cybersecurity professionals can help solve not just global problems, but get engaged in local solutions at scale. Ron is President at Gula Tech Adventures which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Since 2017, GTA has invested in dozens of cyber start-ups and funds and supported multiple cyber nonprofits and projects. Ron started his cybersecurity career as a network penetration tester for the NSA. At BBN, he developed network honeypots to lure hackers and he ran US Internetworking's team of penetration testers and incident responders. As CTO of Network Security Wizards, Ron pioneered the art of network security monitoring and produced the Dragon Intrusion Detection System which was recognized as a market leader by Gartner in 2001. As CEO and co-founder of Tenable Network Security, Ron led the company's rapid growth and product vision from 2002 through 2016. He helped them scale to more than 20,000 customers worldwide, raise $300m in venture capital and achieve revenues in excess of $100m annually. Ron is President at Gula Tech Adventures which focuses on investing and advisement of two dozen cyber-security companies. Ron was honored and humbled to receive the 2017 Betamore BETA award, be named a 2016 Baltimore Tech 10 leader and a 2013 Maryland entrepreneur of the year by Ernst and Young. Additional Resources: Gula Tech Adventures Ron on Twitter Book recommendations: Shards of Earth A Big Ship at the Edge of the Universe
Ron Gula interviews Nick Shevelyov of Silicon Valley Bank and author of Cyber War and Peace, about investing in cyber, his experience validating technologies, and helping advise early stage companies to develop products that are more likely to succeed in establishing themselves and getting critical investment. The pair then dive into a deeper discussion of Nick's recent book and how it helps—through historical storytelling—to provide non-technical business leaders a useful perspective for thinking about cyber risk in their organizations.
Ron Gula interviews Brian Hubbard and Joy Beland, experts from Edwards Performance Solutions, on the Cybersecurity Maturity Model Certification. This framework--of critical cybersecurity training, certification, and third-party assessment within the US Defense Industrial Base--helps protect Federal Contract Information and other unclassified information. Understanding this can be critical to those seeking to get contracts with the Department of Defense and other US federal departments and agencies.
Nikki - As someone who has such wide ranging experience in cybersecurity from practitioner and business owner to investor - what would you say are the largest concerns in cybersecurity right now? Zero trust? Incident Response? Cloud security?Chris - You hold several advisory and board member roles. For Cybersecurity professionals looking to perform similar roles, do you have any recommendations?Nikki - With your background in a company like Tenable and the security tool industry, do you feel like cybersecurity practitioners have the tools that they need to perform tasks? Do you think there are any gaps between technology, process, and the people?Chris - Having been around the cybersecurity industry for quite a bit, what do you think some of the biggest emerging changes are, and also, something that has remained relatively consistent?Nikki - With all of the amazing nonprofit work you do - why do you think we still have such a skills gap and a need for more people in the security industry? How can we close that gap?Nikki - Do you have anything in particular you're working on right now you'd like to share with our audience?
GTA President and preeminent technologist Ron Gula discusses cybersecurity and developing engineering products so that they are secure by design.
GTA President Ron Gula explains the best principles of developing a pitch deck when seeking investments.
Ron Gula interviews LTG (Ret.) John Mulholland, a retired Green Beret who led US special operations and served as the senior military official at CIA, about the US military response after 9/11, the recent departure of the US and Western allied military forces from Afghanistan, the modernization of warfare, and science fiction.
Ron Gula is the president of Gula Tech Adventures, a company that focuses on cyber technology, cyber policy, and recruiting more people to the cyber workforce. When Ron didn't get into flight school, he used his free time to focus on computers and started working in the early beginnings of cybersecurity in the mid 90's. In NSA, he worked with one of the first cloud companies and created an intrusion detection system that sold in 18 months with his wife. Although Ron thought he would continue to create technologies and sell them, he went on to create his next company, Tenable Network Securities. -- The Exit - Presented By Flippa: A 30-minute podcast featuring expert entrepreneurs who have been there and done it. The Exit talks to operators who have bought and sold a business. You'll learn how they did it, why they did it, and get exposure to the world of exits, a world occupied by a small few, but accessible to many. To listen to the podcast or get daily listing updates, click on flippa.com/the-exit-podcast/
PLEASE NOTE: Around minute 47, I incorrectly say that Eric Milam, author of the definitive report on the BAHAMUT threat group, is employed by HP. He is, in fact, employed by Blackberry. I sincerely apologize to Mr. Milam for the error.In this special episode, we look back at how the show has evolved over the past three years and celebrate our amazing guests and viewers. You've helped grow the Cyber Work Podcast to nearly a million plays! To give back, we're launching a brand new way for EVERYONE to build their cybersecurity skills. It's free. It's hands-on. Oh, and did we mention there's more than $1,000 in prizes EVERY MONTH. – Learn more about the Infosec Skills monthly challenge: https://www.infosecinstitute.com/challenge– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastHuge thank you to all the past guests who shared their expertise over the past 200 episodes. The timings of everyone in this episode are listed below. Happy listening!0:00 - Intro0:42 - Monthly challenges and $1,000 in prizes!1:30 - Cyber Work Podcast origins 2:32 - First episode with Leighton Johnson3:16 - Finding our first guests3:46 - Keatron Evans on incident response6:54 - Susan Morrow on two-factor authentication8:54 - Susan Morrow on GDPR 11:03 - Susan Morrow on "booth babes" and speaking up13:20 - Alissa Knight on getting arrested for hacking at 1716:39 - Alissa Knight on API security19:14 - Ron Gula on cybersecurity challenges23:23 - Amber Schroader on the real work of digital forensics26:19 - Theme of the Cyber Work Podcast27:01 - Jeff Williams on creating the OWASP Top Ten31:23 - David Balcar on the biggest APTs33:46 - Elie Bursztein on breaking into cybersecurity37:37 - Sam King on AppSec frameworks and analysis41:17 - Gary DeMercurio on getting arrested for red teaming47:19 - Eric Milam on the BAHAMUT threat group 53:39 - Feedback from Cyber Work Podcast listeners55:16 - Alyssa Miller on finding your career path 57:24 - Amber Schroader on computer forensics tasks59:07 - Richard Ford on malware analyst careers1:02:02 - Career action you can take today 1:02:19 - Rita Gurevich on reading and learning1:03:20 - Snehal Antani on transitioning careers1:04:26 - Promoting underrepresented voices1:05:09 - Mari Galloway on women in cybersecurity1:05:31 - Alyssa Miller on diversity "dog whistles"1:10:11 - Christine Izuakor on creating role models1:10:52 - We want to hear your story1:11:40 - Monthly challenges and outro About InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
Ron Gula interviews Dr. Daanish Maqbool, the CEO of Wave Engine Corp., about innovation in jet propulsion, drones, developing products in the government space and transitioning to commercial markets, and how technologies are portrayed in Batman, Avengers, and other high-revenue movies.
Re-running this great chat with Ron Gula from the early days! A fierce visionary, Ron Gula has redefined the security landscape and continues to do so. From co-creating Tenable, developing Dragon IDS, and now serving as President of Gula Tech Adventures, his incredible story is far from over. He joins me at the bar to discuss the conception of Tenable, his "Data-Care" approach, challenges during the COVID era, Cybersecurity's #1 myth, advice for entrepreneurs and his new foundation which will provide millions of dollars in competitive grants to cybersecurity non-profits.Tony the Bartender rings in a “Manhattan”.Support the show (https://www.patreon.com/barcodepodcast)
Ron Gula interviews Dave Baggett, the current CEO of Inky who previously worked on hit video games, about cybersecurity, early coding on vintage PCs, and the development of the video game industry.
Ron Gula interviews Peter Singer, a Senior Fellow at New America, a Professor at Arizona State University, and all-around cybersecurity advocate, on cybersecurity; recruitment, retention, and education in the field; his fiction and non-fiction writing, and great books and movies that influenced his growth and perspective.
Nick interviews Mr. Ron Gula of Gula Tech Adventures. They discuss Advice for Cyber Start-Ups, The Gula Tech Foundation, Ron's Portfolio Companies, Data Care, and more! https://youtu.be/V-RJA7b39nk
Ron Gula interviews Rick Gordon, the founder of Mach 37 and the Managing Director at MITRE Engenuity, about his experiences in investing in startups and the potential for venture capital in the DMV area. Ron and Rick discuss the differences between developing a product and building a company, as well as the work that accelerators do to help companies grow.
Ron is President at Gula Tech Adventures which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Since 2017, GTA has invested in dozens of cyber start-ups and funds and supported multiple cyber nonprofits and projects. Ron was the co-founder and CEO of Tenable Network Security. He helped grow the company to 20,000 customers, raise $300m in venture capital and grow revenues to $100m, setting up the company for an IPO in 2018. Please enjoy this episode focused on the future of inudstry!
Ron Gula interviews Eli Sugarman, of Facebook Oversight Board and formerly the William and Flora Hewlett Foundation, about his experiences working with and funding cybersecurity nonprofits and his current work at Facebook on free speech and privacy policy. Eli and Ron also talked about classic science fiction (scifi) books and movies, as well as those about hackers.
TechSpective Podcast Episode 065 Cybersecurity is constantly evolving. The threat landscape continues to expand and new technologies shift and extend the attack surface–both of which require new and innovative tools and practices to address. Ron Gula, co-founder and President of Gula Tech Adventures, joins me for this episode of the TechSpective Podcast to talk about [...] The post Ron Gula – Innovation and Emerging Trends in Cybersecurity appeared first on TechSpective.
This week, our good friend Ron Gula joins us to talk about cybersecurity investments, tips for both enterprises and enturprenurs. In the enterprise security news funding announcements from Coalition, HeraSoft, Cowbell Cyber, Argon, Cynet, Docker, and Cyware. Sonatype Acquires MuseDev, Sumologic Acquires DF Labs, Acronis acquires Synapsys, Lookout grabs CipherCloud and a cybersecurity SPAC. Kasada announces some new features to its bot detection offering, Rapid7 introduces an agent for CloudFront, Aqua supports ARM, and Chris Roberts joins Cynet! Ilia Kolochenko, the chief architect at Immuniweb joins us to talk about attack surface management! Show Notes: https://securityweekly.com/esw220 Gula Tech Foundation Grant Program - Data Care: https://www.gula.tech/foundation Gula Tech Non-Profits: https://www.gula.tech/projects Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, our good friend Ron Gula joins us to talk about cybersecurity investments, tips for both enterprises and enturprenurs. In the enterprise security news funding announcements from Coalition, HeraSoft, Cowbell Cyber, Argon, Cynet, Docker, and Cyware. Sonatype Acquires MuseDev, Sumologic Acquires DF Labs, Acronis acquires Synapsys, Lookout grabs CipherCloud and a cybersecurity SPAC. Kasada announces some new features to its bot detection offering, Rapid7 introduces an agent for CloudFront, Aqua supports ARM, and Chris Roberts joins Cynet! Ilia Kolochenko, the chief architect at Immuniweb joins us to talk about attack surface management! Show Notes: https://securityweekly.com/esw220 Gula Tech Foundation Grant Program - Data Care: https://www.gula.tech/foundation Gula Tech Non-Profits: https://www.gula.tech/projects Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Ron joins us to cover various aspects of investing, including how to give the right pitch, what enterprises should be looking for in new technologies, are you 5% or amazing tech? Ron is also championing a new concept called data care and has launched his own podcast, Gula Tech Cyberfiction, in addition to some outstanding cybersecurity grants. Gula Tech Foundation Grant Program - Data Care: https://www.gula.tech/foundation/ Gula Tech Non-Profits: https://www.gula.tech/projects/ Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw220
Steve Ryan and Tom Bossert discuss Trinity Cyber's advanced and proven ability to prevent cyber attacks with Ron Gula. We discuss how Trinity Cyber is taking a fundamentally new approach to rapidly remove exploits in documents and interdict botnet command and control for large and small organizations. We also discuss cybersecurity policy since Tom was the former Homeland Security Advisor to President Trump and Steve was the National Security Agency's Threat Operations Center Deputy Director.
Ron joins us to cover various aspects of investing, including how to give the right pitch, what enterprises should be looking for in new technologies, are you 5% or amazing tech? Ron is also championing a new concept called data care and has launched his own podcast, Gula Tech Cyberfiction, in addition to some outstanding cybersecurity grants. Gula Tech Foundation Grant Program - Data Care: https://www.gula.tech/foundation/ Gula Tech Non-Profits: https://www.gula.tech/projects/ Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw220
On this week’s Cyber Report, sponsored by Northrop Grumman, in segment one Justin Sherman of the Atlantic Council’s Cyber Statecraft Initiative and Cmdr. Chris Hoffman, USN (Ret), the former deputy director at the Naval Academy's Center for Cyber Security Studies, now with the cyber firm Red Jack, discuss recent cyber attacks and Russian attempts to stifle and manipulate western social media platforms. In segment two Ron Gula of GulaTech Enterprises and the GulaTech Foundation. Predicting cyber attacks before they happen is impossible. Until it’s not. Visit www.northropgrumman.com/cyber to learn more.
Ron Gula and show guest Deb Tillett, interview video game design legend Sid Meier. We asked Sid about his history starting Microprose, business decisions made along the way and why there aren't any really good cybersecurity themed computer games.
In episode four, Ron Gula spends an exciting hour speaking with former Marine pilot, shuttle astronaut and head of NASA - retried Major General (USMC) Charles Bolden. We spoke about a variety of issues including: How we can encourage more minorities to enter the tech fieldWhy STEM needs to include "art" and "design" becoming STEM+ADHow we can handle disinformation from NASA's deal with moon landing deniersCybersecurity of NASA, reliability of computers & softwareThe commercialization and weaponization of space Charlie Bolden is part of the Bolden Group and leads it with his son Che Bolden and daughter Kelly Bolden. The Bolden Group was founded in 2017 and has a mission to provide singular and trustworthy expertise to cultivate and transform leadership in the areas of Space/Aerospace Exploration; National Security; Science, Technology, Engineering, and Math + Arts and Design (STEM+AD) Education, and Health Initiatives.
Twice, it’s maybe an indicator. Once, it’s nuthin’ at all...to the machines. The Reserve Bank of New Zealand works to clean up its data sources. Wormy student laptops. Daily Food Diary is a glutton for your data. Ransom DDoS. Caleb Barlow examines how we handle disinformation in our runbooks and response plans. Our guest Ron Gula from Gula Tech Adventures shares his thoughts on proper public cyber response to the SolarWinds attack. And should we worry about that White House Peloton? For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/10/14
What do you know about launching, scaling, and exiting a cybersecurity startup? Our guest today needs no introduction. Ron Gula is the Former CEO and Co-Founder of Tenable, a global cybersecurity company headquartered in Columbia, MD. Ron and his wife Cyndi launched Tenable in 2002 and saw it through to a successful IPO in 2018. Over that time, Ron and Cyndi emerged as leading voices in cybersecurity through their work as investors, though-leaders, and philanthropists. In addition, Ron and Cyndi have invested in dozens of cybersecurity startups, many of which have scaled and come to define the startup ecosystem in the Mid-Atlantic. Ron talks about starting out in the Air force and his journey from serving his country in cyber defense for the NSA to launching an industry-leading cybersecurity company. We discuss his post-IPO move into angel and venture investing with his wife and co-founder for life Cyndi, and he shares his advice for founders looking to launch and scale a new venture. You can check out Ron and Cyndi's new adventures in tech at Gula.tech, and you can find Ron on LinkedIn.
Ron Gula interviews Chris Crowley about the results of the 2020 Security Operations Survey. In this hour long interview, we discuss how there are two types of SOCs and how this affects budget, staffing, technology effectiveness and overall cybersecurity.
Michael and Nick are back to kick off a brand-new series featuring Cybersecurity Influencers! First up is Ron Gula, President at Gula Tech Adventures which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Check out their conversation to learn more about Cybersecurity startups, non-profits, and solving the cybersecurity skills gap. Things Mentioned:https://www.axios.com/pelosi-laptop-stolen-capitol-riot-268f364b-8695-4249-b0f3-0f28eb99ab6e.htmlhttps://portswigger.net/daily-swig/nsa-advises-defense-national-security-supply-chain-on-replacing-deprecated-encryption-protocolshttps://www.gula.techDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
Podcast: The Secure Communications Podcast (LS 25 · TOP 10% what is this?)Episode: Ron Gula: The Future of Quantum CryptographyPub date: 2020-07-09Quantum computing isn't a reality yet, but most experts concede it is not far away. When that day comes, threat actors will have the ability to decrypt data they've stolen years before -- unless that data is protected by quantum-resistant cryptography. On this week's episode of The Secure Communications Podcast, we talk with cybersecurity investor and policy expert Ron Gula about the promises of and challenges associated with quantum cryptography. In this episode Ron is President at Gula Tech Adventures, which focuses on cybersecurity technology, strategy and policy. Since 2017, GTA has invested in dozens of cyber start-ups and supported multiple cyber funds. From 2002 to 2016, Ron was the co-founder and CEO of Tenable Network Security. He helped grow the company to 20,000 customers, raise $300m in venture capital and grow revenues to $100m, setting up the company for an IPO in 2018. Prior to Tenable, Ron was a cyber industry pioneer and developed one of the first commercial network intrusion detection systems called Dragon, ran risk mitigation for the first cloud company, was deploying network honeypots in the mid 90s for the DOD and was a penetration tester for the NSA where he got to participate in some of the nation's first cyber exercises. Ron is involved in a variety of cyber nonprofits and think tanks including Defending Digital Campaigns, the Cyber Moonshot, the National Security Institute and the Wilson Center. Quick links Check out the Gula Tech Adventures website Follow Ron on LinkedIn Read Kathleen (00:08): Thank you for joining today's episode of The Secure Communications Podcast. I'm your host Kathleen Booth. And today my guest is Ron Gula. Ron was the founder, cofounder, I should say, and CEO of Tenable. Today he is the president and cofounder of Gula Tech Adventures. Ron, you have an unbelievable bio. You know, you've been on the board of so many different cybersecurity companies. You're an active investor. You are, have served as a global fellow at the Wilson center, an advisory board member for George Mason University's National Security Institute. You have such a fascinating perspective on the cybersecurity industry, you know, too much to name. If I went through your whole bio, we could spend the entire podcast on that. But, but I'm really excited to have you here and, and get your perspective on a topic that I think is really interesting, which is quantum cryptography. Ron (01:00): Thank you very much for the the kind introduction and thank you very much for having me on the podcast today. So quantum cryptography, I, I it's, that's a topic that people should be very, very afraid of. But unfortunately we're really not doing a whole lot about it right now. So you know, assuming your users know a good bit about cryptography already, I kind of look at this problem as if somebody's collecting all of your encrypted traffic. Can they use a quantum computer at some point in the future to somehow break that traffic? And you would think that because of that threat, perhaps from quantum computers, you know, that there'd be more investment here and more awareness, but there really hasn't been. Kathleen (01:43): So let's start out by talking about the timeline, because I think this is something that, well, it's certainly something that I find fascinating. And I don't know if, if everybody understands it and maybe this is one of the reasons for a lack of investment in it, you know? We don't have quantum computing yet. What is, what is your opinion as far as when you think that it will actually be usable? Ron (02:07): So it's, it's interesting. I, I've, I've gotten a chance to spend some time with quantum computing companies and I ask them, so, you know, I ask them, so when can we break crypto? You know, when can we solve certain kinds of other problems and whatnot? And typically there's not a good answer there. And, and, and I said, well, do you think anybody else has done it? And they typically say no, because as soon as somebody has figured out how to do it, all these people are going to disappear and go work for the CIA or the NSA or a bank or, or, or, or something like that. So I think it's really difficult to put a number on, is this like a next year thing or next decade thing? And the problem kind of also overlooks the fact that you've got to collect all this traffic. Ron (02:48): Now, if you think about, if you imagine that the NSA and our adversaries have an infinite amount of storage and have infinite points to collect our data, then, then this is a problem. But, you know, the reality is that we live in a world based on physics, and, you know, a lot of these things need to be stored and kept in places. And I don't think the average person's having, they're, they're, they're having more stuff stored on them in social media, then perhaps an adversary is going to, you know, kind of come after them and collect on them Kathleen (03:17): Now, and, and, you know, I'm not a highly technical cybersecurity expert. And so my understanding of quantum the risk associated with quantum computing is that, you know, we don't have to worry right now that somebody could use it to, you know, crack, crack into some of the most protected information we have, but someday it's going to be a possibility. And I think, you know, the average person might think, well, who cares? So someday we'll deal with it then. But I guess my understanding is it's, it's more, you know, we can have that data stolen now and it can be held and eventually compromised in the future when that capability does come online. Is that right? Ron (03:57): It is a good, a good application of that is imagine you have something today that a crypt, cryptography that we all use - the TLS, SSL TLS you know, basically the, the S in your HTTPS. Technically you should be able to go and, you know, go to a coffee shop and go visit your favorite, you know, Facebook website, that's got, that's protected by that kind of, of crypto. And even if it was collected, it's going to be hard to break. But if at some point in the future, you know, somebody does come along and have an easy to use quantum computing, you might be able to do that. Now it starts getting a little far fetched. Is there a coffee shop somewhere, of course, pre COVID or whatever, you know, but it's some place that we're all using, you know, publicly collectible traffic that we could then say, well, the one day Ron Gula came in and happened to check his bank account. Ron (04:49): I have those packets that are in there and all, all set to go, you know? It's, it's just, it's when you think of all the things you have to do to protect yourself online, you know, patch, two factor authentication. This, it's just not the top of list for most people. And if they want to, they can just use their own, you know, a VPN, a product that you guys offer, right? Where I've done my key exchange ahead of time. You know, granted, you might be able to collect those packets and, and do it, but now you're, you're still a much harder target than people who are just relying on the cryptography from the web applications that they're using. Kathleen (05:26): Yeah. And it seems like for the average person, the notion that somebody could steal my data now, and, you know, 10 years from now, they could crack into it, I would think, so what? Like, my credit card numbers will have changed by that point. Who knows if I'll be at the same bank? Like, it almost, it doesn't seem like much of a risk to me, but where I think it gets really scary is when you think about data leakage from a place like the NSA, which, which has been compromised, you know, and there has been information stolen out of there, and maybe somebody can't process it and get into it right now. But, but if 10 from now, they're able to discover the identities of certain people or, you know, different programs that the U S government has, that then becomes a truly frightening prospect it seems. Ron (06:08): It is. And again, it's hard to be a, you know, a cybersecurity pro, cyber security person and say like, this is just not that big of a deal. But for me, I used to be like, Hey, look, this is a big problem, right? Computer's gonna be a lot faster, whether they're quantum or not. And, but at the coffee shop, you know, with using your quantum resistant cryptography, chances are the, the, the 20 dollar lock on your house that you bought from Home Depot, somebody can bust through that and put, you know, sniffers in your house you know, but little bugs that can get the same kind of information that you're trying to protect. So the question is really is, you know, when you bring that over to a large enterprise, it's, it gets, it gets interesting. It's just not the number one thing that people are working on. Kathleen (06:53): So given that the differences in the kind of, the level of risk and the implications of a compromise, do you think that, where, where do you see most of the work coming from on, on quantum resistant cryptography? Is it, do you see a lot of it coming out of the government or being funded by the government, or do you see more of it coming out of the private sector? Ron (07:15): So, so the biggest innovation I've seen in quantum resistant sort of security is, is this concept of, of multipath communications or shredding. So if I'm going to go from point A to point B, and you're assuming that your adversary is collecting on you between those things, if you can take a thousand different routes, every second, you're going to minimize the amount of data that they can collect on you. And of course, they're on your computer. Your computer is compromised. It's not going to help you, but neither will quantum resistant cryptography. And similarly, you know, if you're worried about data at rest, and you've got a one MB file, if you had a, like a hashing algorithm or a way to just physically separate that file into many, many different places - a little bit on Amazon, a little bit on Google, a little bit on your USB drive - you know, whatever, whatever that combination is, an adversary would then not only have to be able to break, your crypto, like get access to all of that, that data, that data. So the strange thing is, I've been pitched a bunch of companies like this, and there's pretty cool things. And I just, haven't seen a lot of people jump on this because they're on this mindset that the future is basically endpoint cryptography, or endpoint computing and cloud computing. You know, there'll be no CASBs in the middle. There's no, it's just about that secure access between where I need to go and where I need to go. And they're not worried about, you know, making sure that it's crypto or quantum resistant at that point. Okay. Kathleen (08:37): What do you think is, needs to happen to change that? Ron (08:42): There's gotta be a little bit more, I think, demonstration of this. And unfortunately, you know, the demonstrations we are getting is that when we break crypto, it's usually a software bug, right? Someone's figured out a way that they can see the CPU, change a crypto algorithm, extract keys, extract that, that type of stuff. But the problem is, is that, you know, just doing basic cryptography is so hard. You really have to understand who has access to your keys. You have to rotate keys, you have to do all those things. And I always like to point out that a lot of people got into cybersecurity came out of the military. They were key custodians, right? They were the people who would re-key the point to point bulk encrypters. They would, they would do things like change the codes for, you know, for duress, the duties got protocols for changing these different things. And the commercial world, private citizens, they have no concept of that. Ron (09:29): Right? I mean, I, I know people who have bad passwords to get into their password manager, you know? It's like, that's not the point, you know? So, so that's my concern is that, you know, we've really got to level up, a lot of basic hygiene things before we go tackle this. Now don't get me wrong. If, if tomorrow you know, Facebook or, or, or, or Amazon, or, you know, whoever has got more advanced, you know, ways for us to authenticate and, you know, encrypt as we, as we connect to them, you know, I'm, I'm, I'm happy with that. But in the meantime, you know, I still recommend people, like, if you're concerned about this, you should be buying products like Attila. You should be buying products that where you control your own infrastructure and then make use of what you control, because you can't just control everything else. Kathleen (10:17): So who's, who's doing really interesting work in the field of quantum cryptography? Who's out there kind of at the cutting edge? Ron (10:26): So there's, it's a little bit like the supercomputers, right? And so they, they every, every month or so you hear, Oh, the Japanese have got the world's largest supercomputer or the Russians do, or the Chinese do. Right? So the quantum folks are doing, doing interesting things. So the quantum computing folks, you've got here in Maryland, you've got that. Everybody's got a project because there's such interesting things. And, you know, I get to watch a lot of science fiction and, and play a lot of science fiction. You know, like World Builders. I'm playing Expanding Universe 2 right now. And it's kind of like Civilization, right? And quantum computing is usually one of the things you unlock that gives your, your race or your species, you know, magical powers. The problem is that the promise of what the quantum community just hasn't, it hasn't delivered yet. I think if anybody has broken it, you know, or they haven't done a lot of a lot of practical things with it just yet, that we've, that we've seen. Kathleen (11:19): So do you think it will be broken at the nation state level or in the private sector? Ron (11:22): Yeah. These are very, these are it's um, so without trying to sound too negative, so venture capital people talk to each other and you know, why would you invest in this company? Why would you not invest in this company? And it really tracks, the quantum computing, it's really tracking like healthcare research, where it takes a long time. There's a lot of PhDs in involved. A lot of universities involved. A lot of research. I mean, this is not true trivial stuff that you're going to do in your, or your, your garage. You're talking, moving atoms your, and then getting them to do things, things, and compute. And it sounded like wasn't that what a chip is? Like, Oh, the science is a lot different. Ron (12:07): I was very lucky. One day I got to visit one of these, these super computing, quantum computing companies. And there was another visiting fellow and, and this person had been to like nine other places. I got to hear about all the different kinds of, I'm dated because it's only two years ago. But at the same time, this could be a 20 year journey before we have a practical computer that you can buy in your, your you know, in your house. And it reminds me of when you, when you go and you see these, these quantum computers, you, you're like, where's the computer? They don't look like computers. It's telling you, there's a couple of these organizations. Ron (12:50): They show basic things like, show me how to code the traveling salesman problems. And I'll, I'll get the look like, no, we're not, you know, we're not really there yet. It's something I think is, is worthwhile to do. And if we're going to talk, talk a bit about quantum encryption and a bit about, there's this third area about quantum communications, where you can basically encode you know, the photons, the wave lengths in a certain way. Possibly you can, you can change a quantum object here. Maybe you can, you can stimulate it moving on the other side of the universe as a form of communications. I would love to see that. Everything I've seen has been snake oil. So, you know, I'm all for that kind of stuff, but it's, it's, it's not ready for commoditization in prime time just yet. Kathleen (13:37): Yeah. Now how accessible, if, if somebody is concerned about this and they do want to take steps now to try and protect their data, how accessible is quantum resistant cryptography now? Ron (13:51): Well, one of the reasons, so it's very accessible. You know, one of the reasons that the venture capital community has not jumped on this, it's because the cryptography becomes an OEM type of type of market. And before, you know, I get jumped on for, not from you, but know my business model. There's nothing fundamentally wrong with that. Ron (14:20): I have to do similar things. I probably have been pitched the last three, four years, probably about maybe 10 or 11 different quantum crypto library companies, where they actually don't sell anything to a direct customer. They sell it as a third party. Like a you know, w which is the believer that it's the right thing, because, you know, photography is hard. What you want is you want a team of really, really smart people who that's, all they've done. They focused on the cryptography has been vetted by the U S government. You know, that, that that sort of approach, the problem is that if they're out there selling well, licensing a library, it's not a huge, a huge thing. Back in the late nineties, early two thousands, I remember that you know, ISS, for the product that they were doing, they switched to elliptic curve cryptography to you know, communicate with their agents. And it was more resistant and that kind of stuff. Didn't really make a lot of difference I think for, for, for people that were like, okay, that's cool. That's, that's, that's better crypto, but, you know, does that really make you a better, a better security? And you would think it would be, especially since people do break into security products, but the market didn't, the market could have cared less. They want easier to use products. They don't really want, you know, that kind of stuff, but that's kind of where we're at right now. Kathleen (15:31): That's so fascinating. I mean, I think it's, it kind of applies to a lot of security, the sense that, you know, while we know there are risks out there, we just choose not to protect against them. It's, you know, it's like buying insurance, it's the same principle. It'll never happen to me. It's not going to happen anytime soon. That sort of thing. So I'm, I'm curious to see, what's going to take place that will prompt more of an interest in this. Ron (15:54): Yeah, what's going to happen, in the United States, it's NIST. N I S T is the group that does that. You've probably heard of it. DES encryption and triple DES, and then there was AES encryption and, and NIST does bake offs the same way that the air force does bakeoffs, like we have the F22 Raptor aircraft. But, but what do we really want? And this has got a lot of input from the NSA. They got a lot of very, very smart mathematicians and they're baking off these algorithms. And you know, I haven't gotten a recent update, but almost every pitch I get is like, Oh, we're part of the bake off for NIST. We were, we won this, this, this part of it. That's great. That's awesome. Kathleen (16:45): Yeah. Demand just needs to follow, I guess. Ron (16:49): It is. It's, it's one of those things where you, you know, like, let's say I got a tip from somebody who had a breakthrough in, in cryptography. You almost don't want to touch that because historically, that's where, you know, something's wrong and you, you miss a leak, you miss some sort of entropy sort of, sort of where you can actually decrypt it. And now crypto is the NSA because they have enough people to do the peer review and, and literally red team it and attack it. And I think that's very apt in these kinds of things. If you're a small company, a 10 person company, and you're coming up with the next generation, you know, quantum resistant, crypto, great prov it. You know? Go to NIST. Go to all that stuff. And, and then even after that, what's your business model? Like, why is your crypto going to be that much better than, than, than everybody else? Kathleen (17:44): Yeah. Well, it sounds like the U S government will lead the way, at least in creating demand if, you know, for it to protect itself. And then, and then it sounds as though that that could roll out a form of standards or regulations that would eventually bleed into the private sector. Is that accurate? Ron (18:00): Yeah. It's, it's, it's, it's very accurate. Ron (18:12): There's like satellites, if you've did right. It's, it's there. But when you're, when you're in space and when you're, you're there, know that's, that's weight on that device. So, so there's believe it or not, you know, there's a really a need for just encrypting in general. And it can even be bad encryption, but there's a lot of stuff that's, un-encrypted, that's, that's, that's still going on today. Actually, we have more encryption everywhere that you know, we have a lot of other things that were, that are in the clear now, that are not so much in the clear. Kathleen (18:42): Yeah, yeah. It's fascinating. I was talking to somebody the other day about IOT and it sounds like that's one area that, that is incredibly vulnerable for that same reason. Ron (18:52): So not only with IOT, do we have an issue where the device itself might have not been coded securely, but the protocols that'd be an inline when, if you look at something like SMB version three, which is very enterprise ready and has all sorts of which of levels of, of cryptography, you know, kind of built into it, you know, you just don't see that, you know, and, and talk to the cloud and we're going to give you a web interface, or a mobile app to talk to that cloud, you're hardly ever, so we need to reverse engineer it. With like one of your portfolio companies, you know, Refirm Labs from DataTribe there, you know, they find tons of stuff in IOT devices, all, all the day. Encrypt, you know, can, can you encrypt that better? Can you keep it, what's being collected half the time? So, so that's kinda where I'm seeing that market at right now. Kathleen (19:53): Yeah. Now, switching gears, you are an investor, you, as you mentioned, you get pitched by a lot of companies. You see a lot of technology. Is there a particular cybersecurity technology that you're really excited about right now? Ron (20:12): My friend's at DataTribe have some of my favorite companies. So way, the way I like to talk about it, is that, you know, I've done two companies. I've done Network Security Wizards, which was a network intrusion detection company. We did Tenable Network Security, which is cyber, you know? Ron (20:36): And swim lane. And after I left Tenable as an investor, I really got to explore. There's Huntress Labs. Huntress Labs is really focused on the SMB and finding malware, or finding back doors, finding, you know, phishing, phishing targets, you know? I find that very exciting. It's not about just their detection is it better than, you know, a Crowdstrike or a Sentinel One. It does it. Cause when, when you're dealing with a dentist office, it's a such a different mindset than, you know, dealing with like a bank, you know? Where we're, where they've got, you know, so I'm enjoying stuff like that. I'm, I'm really enjoying a lot of the different ways we can solve some of these problems. Some of the things that, that we've invested in is like cyber education. So if you look at the work that we're doing with Cybrary and you extend that to people like Catalyte, you know, that's, that's really interesting. The ability to use AI and, and, and create, you know, developers and IT teams, or in Cybrary's case, you know, the development or the ability to really, you know, pull people either from you know, inner city, retiring veterans, just anybody who's got a, access to the, to the internet, you know, into the cyber you know, career is, is just, is just really, really fun stuff. Ron (22:05): So it's, I think my biggest frustration sometimes is I'll, we'll invest in a certain category and somebody will solve it a certain way. And then another company will come along and solve it almost completely differently. Then we're sort of like, okay, well, do we want to invest in both of these companies, because they're going after the same dollars. Kathleen (22:27): Yeah. Ron (22:34): On the cloud, like Cloud Flare, or are you going to be in like a contrast, you know, and those two completely different businesses, well, security, it gets, it gets in there. That's the world I get to live in. And I really enjoy helping people think through that. And you know, hopefully we're making a difference and invest in the second and third tier here. Kathleen (23:02): Well, I love that you're involved in so many different education organizations and, and trying to kind of bring up the next, the next generation of cybersecurity professionals. I also love that you've been in business with your wife for so many years. Fun fact, I owned a company for 11 years with my husband. And so I feel like we could have an entirely separate podcast episode just on, just on working with your spouse, but I think that's, that's fantastic. And I love that story about what you guys are doing. Ron (23:30): So it's, it's funny you know, a lot of people know our story. You know, Cindy didn't get sort of the cofounder or on the web sort of, sort of u, you know, I had it explained to me, if you look at the, just for example, the divorce rate, you know, that kind of stuff, there's just, there's a, there's a 50% chance one of you is going to get divorced and leave the company and it, and that's a real risk. I get it. I get it. Having said that though, now that we've been a lot more public about it, I'm finding like you, you, you did business with your husband. I'll find a, to a brother's team, you know, that, that, that are working together. Now, brothers don't get divorced, but you can have fallings out with your families and stuff like that. I find that if you can make it work, it can be a very, very strong thing. But whenever we do sort of like off the cuff marriage counseling or anything like that, it's not like, Hey, why don't you, you guys go start a business. That'll solve all your, you know, all your things. But, but yeah, no, glad that, glad you brought that up. Kathleen (24:35): Yeah. I think going into business with anyone is kind of like getting married. Like, you have to be a phenomenal communicator and you've got to talk about everything to make it work. I always say that my greatest accomplishment in life is that I'm still married after 11 years of business partnership. So you're right. It's, it's, it's great. You have a level of trust you can't get with somebody you know, somebody else, who's not your family, so fantastic. Well, I really appreciate you joining me for this episode. It was, it was fascinating. If somebody wants to learn more about you and some of the work you're doing, where should they look online? Ron (25:12): So we maintain a webpage at gula.tech. We have a list of all the portfolio companies, including the DataTribe companies like you guys. And you know, we blog a good bit about podcasts. I'll be putting this on our blog eventually. And then you know, if they want, I do, I do post pretty pro, a good bit on LinkedIn, a little bit, you know, business. You gotta keep it on LinkedIn, but I appreciate anybody that wants to look us up. So let us know. Kathleen (25:48): Fantastic. Well, I'll put those links in the show notes. And if you're listening and you enjoyed this episode, please consider leaving the podcast a review on Apple Podcasts or wherever you choose to listen. And we want to hear from you. If you have an idea for a future episode, tweet us at @Attilasecurity. Thanks for listening. And thank you, Ron. Ron (26:06): Thank you.The podcast and artwork embedded on this page are from Attila Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Ron Gula, president of Gula Tech Ventures, joins Steve Barsh to talk about the 5 most common mistakes cyber entrepreneurs make and how to avoid them. Ron was co-founder and CEO of Tenable where he grew revenue to $100m, customers to 20k, and raised $300m in venture capital. He has invested in dozens of cyber start-ups and supported multiple cyber funds. In this podcast, they discuss the top mistakes Ron and many other prominent cyber investors see cyber startups making and what these startups need to focus on to not only get investment but to build a market-dominating company. Here's what they cover in this episode: What are some investments you've made or exits you've had? About how many cyber startups reach out to you each week or month? What does you Gula Five Slide Pitch Deck look like? Does the best tech always win? How do you want to hear a cyber startup talk about competition (or lack thereof)? How important do you feel it is that a startup addressed a “top 10” CISO/CSO problem? Let's talk about honesty and credibility of a startup or founder. What are some examples that have caused you to back away from a deal? How important is exceptional sales & marketing talent in a cyber startup? What do you look for? Are most of the companies that are pitching to you B2B? Final 2 things cyber entrepreneurs must not do wrong Learn more about Dreamit Securetech, a growth-focused program for cybersecurity, physical security, compliance, and anti-fraud startups: www.dreamit.com/securetech
The head of Gula Tech Adventures explains why investors should see a huge difference between product-based and service-based cybersecurity companies -- and explains how to spot a winner.