Blog Posts

Feb 21
2017

By Tom Kellermann CEO Cyberspace in 2017 is a free-fire zone with a multiplicity of actors.  The absence of norms creates a perfect storm for a cyber-insurgency which has been raging in American cyberspace for the past year.    As most of us recognize, we are on our own.   The government isn’t going to civilize cyberspace.  …

Feb 09
2017

Strategic Cyber Ventures has invited a number of people we admire to contribute to our blog. Also this week: Dave Coxe, CEO of ID DataWeb. Imagine a world where individuals can conduct sensitive business transactions online with reduced fear of identity theft or fraud and without the need to manage scores of usernames and passwords. …

Feb 07
2017

Strategic Cyber Ventures has invited a number of people we admire to contribute to our blog. This week: Ronan Murphy, CEO & Founder of Smarttech and Founder of Zero Day Conference.   Maintaining a strong cybersecurity posture has become increasingly difficult for large organizations and this is evidenced in the numerous high profile breaches taking…

Jan 20
2017

By: Aaron Applbaum Director of Investments Having a layer of reliable third-party identity authentication is becoming increasingly necessary.  An individual’s traditional (human-physical) identity is becoming irreversibly connected to their digital identity in all the disparate corners of cyberspace.  A solution that can unify, aggregate and build a reliable identity in cyberspace will curb one of…

Jan 17
2017

Strategic Cyber Ventures has invited a number of people we admire to contribute to our blog. This week: JD Sherry, Vice President & GM, Cloud Security & Strategy at Optiv. Security OF the cloud versus security IN the cloud…  This by no means is intended to be a riddle. In fact, the irony is that…

Jan 05
2017

By: Hank Thomas Partner & COO of Strategic Cyber Ventures Banner on the last Russian military train leaving East Germany in the 90’s reads “We will be back” You do not need a security clearance to pinpoint the entity behind the cyber-enabled influence operations conducted during the 2016 U.S. elections. If we were using the…

Jan 04
2017

Tom Kellermann, CEO of Strategic Cyber Ventures guest co-authored this post. A famous Homeland episode involved a terrorist gaining access to the Vice-President’s pacemaker.  Accessing medical devices to wreak havoc was one of the motivations behind certain provisions of the Digital Millennium Copyright Act (aka the DMCA).  The DMCA makes it “illegal to circumvent technological…

Dec 13
2016

Aaron Applbaum Director of Investments While Chief Information Security Officers have an increasingly well-respected role within an enterprise, they are stuck in a perpetual game of tag, and can never become “it.”  A CISO’s best day is a quiet one, but given the preponderance of hacker penetration on every major network, those days are few. …

Nov 30
2016

Tom Kellermann, CEO  Winter is coming in 2017. Geopolitical tension will serve as the harbinger for destructive cyberattacks in 2017.  In 2017; we will see a dramatic increase in the Pawnstorm campaign due to tensions with NATO over the security of the Baltics.   Additionally, the Cyber caliphate and AQAP will demonstrate an advancement in their…

Nov 15
2016

Strategic Cyber Ventures has invited a number of people we admire to contribute to our blog. This week: Ravi Devireddy, a founder and the CTO of E8 Security, is the first to contribute and we couldn’t be happier! He is one of the best in the industry and you need to get to know him….