Tag Archives: Tech

Security Never Sleeps 2018 – Buyers and Sellers Face to Face

10Fold hosted our eighth annual Security Never Sleeps event during the 2018 North American RSA trade show yesterday. The event is conveniently located within walking distance of the Moscone Center at the Red Dog Café in San Francisco. Building on the success of the events previous years, the luncheon had more than 90 attendees made of up CISOs, security architects, venture capitalists, and security vendors participating in the cybersecurity discussion. The conversation facilitated a dialogue between Security vendors and buyers, enabling a marketplace of ideas that helped all attendees perfect their communication strategies.

Panelists at the event included:
NO FOLD ICON 15x15 Carl Wright – CRO at AttackIQ – a continuous validation provider for enterprise security programs.
NO FOLD ICON 15x15 Kathy Orner – Chief Risk Officer at Carlson Wagonlit Travel, a business travel and management firm dealing with events, meeting accommodations and more.
NO FOLD ICON 15x15 Mike Kearn – BISO at Consumer Banking Division of US Bank, responsible for the security of checking and savings accounts, mortgages, and more.
NO FOLD ICON 15x15 Peter Galvin – CMO at Thales, a France-based multinational that supplies electrical systems and services to aerospace and defense industries.
NO FOLD ICON 15x15 Rich Campagna – CMO at Bitglass, a Next-Gen CASB provider for Zero-Day data and threat protection.
NO FOLD ICON 15x15 Dr. John D. Johnson – CEO and Founder Aligned Security, LLC, Which develops and delivers of targeted security training .

The event also saw attendance from many high-profile players in the security space, including Chad Sweet (Founder and CEO of the Chertoff Group), Shira Rubinoff (President of Secure my Social), Chenxi Wang (Managing Partner of Rain Capital) and many more!

The panel covered some of the biggest topics covering marketing and selling security products in the industry today. This included registration for content barriers, making your products accessible to buyers, the importance of building customer relationships, and the efficacy of alternative marketing efforts – such as video marketing and email marketing.

The audience was very active this year and led the discussion into many trends and how they relate to security today. GDPR was certainly a popular moment of debate, as the upcoming deadline (May 25th) is fast approaching, and means more than meets the eye for vendors, buyers, and even marketers!

Sad you missed all the valuable insights from this year’s event? Never want to miss one again? Get notified when we have and recap all the other awesome events we attend and sponsor, and have consistent B2B marketing content sent to your inbox by subscribing below!

By Tyler Trainer

When Everything at RSA is Over the Top, How Can I Stand Out?

If you’ve ever been to RSA, you know it can be a mind-numbing experience. So many booths with so much noise and activity while everyone clamors for attention. As seasoned veterans of this show, security clients often ask us:

“When everything at that show is so over the top, how can we stand out?”

After walking and studying the show floor at seven RSA shows, I’d like to share a few things I’ve seen and that stick out in my mind in a positive way… and a couple of things to be wary of. What follows below are my top 10 things vendors can do to stand out at RSA.

Do something different at your booth… and no, that does not mean “booth babes” (Bo-Ring).
To give you a sense of the possibilities, last year two of the cleverest booth attractions included Nyotron’s Daniel Craig impersonator (doing his best James Bond spiel as he talked about the company’s technology) and TrapX’s body painter, who painted a woman against a TrapX backdrop so that she completely disappeared into the background. Both of those booths attracted hordes of people. In Nyotron’s case, exhibit event reps—on a number of occasions—had to tell them to thin their crowd out because they were blocking the flow of traffic.

Use a prop.
At one RSA, an up-and-coming security vendor built a demolition booth that had a bunch of antiquated firewalls from a number of well-established security companies. They then gave people a hard hat, safety goggles, and a sledge hammer, then invited them to go to town on the appliances. There’s just nothing more satisfying than taking your frustrations out on a bunch of broken electronics. One year another security company had a Formula One racing car on the floor. The vendor let people climb into the front seat and take photos. To build on the prop idea, you could offer a company T-shirt if people take a selfie with your prop and share it on Twitter with specific trending hashtags.

Plan ahead and try to get a speaking slot.
Getting a speaking slot at RSA is hard… but not impossible. It helps if your security company has a threat research arm that’s able to uncover new/unique threat data. For example, how a new piece of malware works in the wild. Once you’ve secured a slot, announce the win through a press release a couple of weeks before the show and socialize the heck out it in the run-up to the show and during the show. Do a live Tweet session during the actual presentation.

Look alive!
Enforce a two-drink maximum per employee per night. Nothing looks sadder than a booth full of security execs who are milling about nursing hangovers (yes, we can tell!). And it’s usually reflected by the fact that none of the people in the booth is making eye contact with anyone, and, as a result, their booth is practically empty.

Have some snacks/drinks at the booth for reporters.
Tons of reporters attend RSA, and they are on their feet all day walking the halls going to and from meetings. Quick note: reporters are always distinguished by a badge that’s a different color than regular conference attendees—know what that badge color is before the show starts and make sure everyone in the booth is on the lookout. Offer a monetary bonus to any staffer who draws a reporter into the booth to listen to your spiel. One way to lure them in when you see one coming towards you is to offer them some nourishment. Have some cold drinks on hand and some snacks you can offer up. The quickest way to a reporter’s heart is through their stomach.

Make sure everyone in the booth knows your product.
Make sure they’re prepared to answer high-level questions about your product. I can’t tell you the number of times I’ve stopped at a security booth and asked someone standing by a kiosk how their product works only to be told they have to go find someone to explain it to me. At that point, I’m gone.

Don’t forget to promote your appearance at the show in advance of the show.
Part of RSA includes the buildup to RSA. Issue a press release two weeks before the show that says you’re going to be there and what you’re going to be showing off. A week before the show, issue another press release that highlights any other activities you have planned, such as any special guests you have coming by, times you’ll be doing special giveaways at the booth. Also, suggest that people send out specific tweets with relevant hashtags for a chance to win a great prize at the show.

Hire a special guest to stop by.
I’ve seen Scott Adams (Dilbert fame) and Kevin Mitnik (hacker fame) signing books at booths, and they’ve had lines a mile long.

Make sure your booth signage tells your potential customer who you are and what you do.
You might think your name and logo is known around the world, but you’d be surprised – with so many security companies in one place, it’s easy to get confused as to who there does what.

Last, but not least, produce some short videos highlighting key execs and customers.
There’s something about video that draws the viewer’s eyes in. If you believe a picture is worth a thousand words, then imagine how many a video is worth!

A couple extra tips.
If you have some real news you want to announce at the show, like the discovery of a brand new Zero Day or some other significant compromise, think about pre-briefing the media and breaking the news in the leadup to RSA. The competition for news headlines will be fierce at the show. How fierce? Here’s a link to a list of this year’s exhibitors that you’ll be competing against.

And whatever you do, DON’T give away flash drives at your booth. At one RSA, I walked by a VERY prominent security company’s booth and a couple of booth models-for-hire were handing out flash drives with the company’s logo on it to everyone walking by. I took one, walked a few steps, decided I didn’t need another flash drive for my junk drawer, turned around and gave the drive back to one of the models. She took it and dropped it back into her basket to hand out to the next unwitting conference attendee walking by. Anyone who knows ANYTHING about security knows how easy it is to load executable malware onto a flash drive. Can you imagine the PR nightmare someone could cause by taking a bunch of these drives, loading them up with malware and giving them back to the person handing them out only to reissue them to other attendees?

By Rick Popko

Need more great insights? Check out some of our other content here, and subscribe to our email list below:

Reaching the High Bar: What Business Press Want From Their Sources

Placement in business press is the gold standard by which your PR efforts are measured. Publications like Forbes, Fortune, Wall Street Journal and others represent a high bar because of their prestige, influence and broad reach. When our clients get a feature in Bloomberg or New York times, it’s usually framed and hung in the office foyer or otherwise worthy of front and center placement on the home page of the company web site.

However, for most clients — especially smaller start-ups – it seems that business press is all but out of reach for anyone not included on the Fortune 500. And there’s a grain of truth to that. For one, unless your name is Amazon, Google, Apple, Microsoft, Facebook or the like, there’s little chance that business press will cover any straight product announcements. Meanwhile, business publications – congruent with the media industry in general – are dealing with shrinking staffs that have little time to address the hundreds of pitches they see in their inboxes on a daily basis.

For many of the same reasons, funding coverage – once eagerly sought by business press reporters – is also diminishing. For the last several years, VCs have invested liberally in the start-up community, and as a result, many funding announcements are often deprioritized or ignored altogether by reporters. And while VCs have only recently started to pull back, reporters now seldom cover announcements less than $25M.

So what are business press reporters actually looking for?

They’re looking to tell a story.
A company and/or product by themselves are not interesting. But when placed in the context of a broader trend or story, stand-alone products have the potential garner attention from even the most scrutinizing tier one reporters. When crafting the announcement, ask yourself, what does this mean for the industry? Customers? Is this part an ongoing or more significant story that is unfolding? Could this be a catalyst for change? The release of a cloud storage platform, for example, might actually capture their attention when put in the context of a story on how niche life science firms are adjusting to both storing significantly more data and adhering to new compliance regulations aimed at protecting it. Viewing your story from the lens of a reporter will give you the ability to pre-emptively address their objections while also crafting a narrative that they’ll actually want to write.

They’re looking for simple explanations.
Business press are catering to a broad audience, with the majority of their readers in the business community. While readership may include some technology experts, most will only have a laymen’s understanding of technology industry concepts. Therefore, don’t assume the reporter knows as much as you do about your subject (chances are they don’t). Provide simple and clear narratives, with minimal use of industry jargon. Queue up an elevator pitch that can easily illustrate what your company does in one to two sentences. Break down explanations – even if the journalist has the press release or you think they’re familiar with the topic (simplified explanations will often make the best quotes.) And during the interview, do provide the reporter real-world examples or scenarios that allow them to “see” what you’re explaining. This could be a description of how a security threat halts operations of critical infrastructure that your solution can remediate, or depiction of video systems for sporting events that generate petabytes of data to be stored and secured by your platform. Bolstering your assertions with these kinds of descriptions will ultimately help reporters understand how your product or service will affect the lives of their readers.

They’re looking to build a relationship.
Business press reporters are bombarded with hundreds of pitches every day – the vast majority of which end up deleted because the PR professionals failed to do their due diligence ahead of time. Most pitches are untargeted and blasted out to hundreds of journalists all at once, with little knowledge about, or relevance to, the reporter’s audience. Instead, take the time to get to know a reporter by regularly reading and commenting on their stories, following them on Twitter and LinkedIn, and connecting at tradeshows and events (that’s where 10Fold shines). This up-front investment will soon pay off, even if a story isn’t generated from every interaction. By keeping up this steady cadence, reporters will eventually trust you enough to come to you for a comment or with a story idea. And those relationships are the ones that will last.

By Stefanie Hoffman 

Looking for more great insights? Check out some of our other content here, and subscribe to our email list below:

3 Best Practices for B2B Social Media

Are you like so many others who have had trouble succeeding in the social media realm? We all know that social media marketing is a must-have component in any communications strategy, but without a game plan to drive growth and engagement you are unlikely to succeed. Social media strategy is incredibly important to keep your profile front and center in your prospects’ view and in reaffirming your expertise with current customers.

Platforms
Facebook, Twitter and LinkedIn should be your primary platforms in distributing content, getting your message across, and building relationships with followers. These three have been found to be the most used social sites by B2B firms, and this is where you will need to be the most competitive and most active.

Frequency and Timing
You should aim to post at least once every week day, and don’t forget weekend’s if you see that’s when your followers (or would be followers) are most active. Posts for Facebook, Twitter and LinkedIn for any one day do not have to be different articles. It’s fine to use one article across all social platforms per day, but do take the time to customize your actual posts – each platform has a slightly different style and of course, length for content. This will allow you to maintain your clout in your follower’s feed when they tend to be most active.

FollowerWonk offers many services, including graphs of follower data.

So how do you find out when to post for the biggest impact on growing your social profile and influence? There are many third-party applications available that are both free and paid that allow for in-depth analysis of your follower activity across different social platforms. Buffer has put together a comprehensive list of many of these applications here.

RELATED: Content Is Still the King!

Content
Social content should not just be all about you. Try to keep self-promotional content to about two days per week, or no more than around 25 per cent of your posts. This can be promoting your company’s product or services, or a particular section of your website. Posts about you at an industry event, depending how you craft them, can fit under industry news.

Thought leadership posts are another way to establish credibility and authority over the issues that your clients or prospects care about. While still self-promotional, showcasing your or your firms expertise in a niche industry or subject demonstrates proficiency in your services and give a sense of authenticity to your target audience.

Industry news articles, especially when you add commentary versus a simple retweet, share or like, should be the majority of the social content that you post. Try to keep up with trending topics and news coverage so your posts are “fresh” and relevant – basically no more than about one week old. This will allow you to stay on top of current events and move with the news cycle to maximize the attention your posts receive.

Stay tuned for more of these B2B think pieces, including information on video marketing, content curation, and much more!

Gain some good insights from this piece? Check out some of our other content here.

Contributions from Fran Lowe.

Balbix: Predicting Data-Breaches Before They Happen

WannaCry and Petya are the names of two particularly damaging types of ransomware. Ransomware is a type of malware that infects computer systems, encrypts the data on those systems and doesn’t relinquish it until a ransom is paid. My fellow 10Fold colleague Kory Buckley recently wrote a blog on the topic.

Many of the organizations that were affected with these latest ransomware versions had adequate network security measures in place, including firewalls and antivirus, but the attack still managed get though most defenses. Much of that has to do with how the security stack around endpoint protection is configured. Balbix, a San Jose, CA-based network security company believes they have developed an innovative solution that will help organizations better protect potential endpoint vulnerabilities. And they’re doing it using advances in artificial intelligences (AI).

On June 6, Balbix emerged from stealth with the industry’s first predictive breach-risk platform that is able to predict and prevent an attack before it happens.Balbix was founded by Gaurav Banga, former CEO of Bromium, with the mission to measure risk and give enterprises the confidence they need with increasing their cyber-resilience.

In addition to launching their security platform, the company announced $8.6 million in investor funding from Mayfield.

How does Balbix work?

Balbix has built the market’s first platform to use predictive analytics and Artificial Intelligence to automatically measure breach risk and calculate resilience. Balbix also uses specialized sensors across the enterprise to continuously discover and monitor all devices, apps and users across hundreds of potential attack vectors. These sensors allow security teams to visualize their breach risk and quickly prioritize operations and projects.

The Balbix’s platform features:

  1. Comprehensive risk heat-map: Balbix has created a system that automatically monitors and analyzes the enterprise network 24/7/365 across hundreds of attack vectors. This helps overburdened security teams prioritize mitigation projects by identifying areas of highest risk and surfacing actionable insights.
  2. Predictive risk analytics: Balbix predicts breach scenarios by analyzing indicators of risk, factors that point to the future likelihood of occurrence of security incidents, e.g., user clickthrough behavior indicating high phishing risk. In contrast, existing products rely on indicators of attack or compromise based on security events that have already happened.
  3. Effectiveness of mitigations and cyber-resilience: Balbix can compute the effectiveness of security mitigations already implemented and help prioritize planned security projects. The system also measures organizations’ cyber-resilience – the ability to limit the impact of security incidents.

In a recent eSecurity Planet article, Balbix founder and CEO, Gaurav Banga said, “AI and automation offer two key advantage in security: they’re very good at dealing with large vectors of data across hundreds of dimensions, and they provide the ability to understand and report the level of confidence in any conclusions reached in order to avoid false positives. Because of these two advantages, AI, when correctly implemented, can provide super-powers to cyber defenders, who now have the ability to come to the best conclusions given large amounts of fuzzy security data from their operating environment.”

In my eyes, Balbix is a network security company to watch. But don’t just take my word for it, read a few of the following stories to see what the media are saying about the company.

  1. eSecurity Planet
  2. eWeek
  3. Dark Reading
  4. SiliconTap
  5. Beta News
  6. FinSMEs
  7. Silicon Angle
  8. VMBlog
  9. SDxCentral
  10. IT Pro Portal
  11. FOX News
  12. IT Business Edge
  13. Channel Partners
  14. Virtual Strategy Magazine

Enjoy your read? Check out our other content here.

Howdy ya’ll! Greetings From Austin, Texas…

What are we doing in the Lone Star State, you ask? Well, we’re excited to officially announce the opening of our newest 10Fold office! That’s right, we’ve expanded our footprint (or cowboy boot print, we should say) beyond California to Austin, where you can find us located in the heart of downtown at the corner of 6th Street and Congress Avenue, just steps from the Texas State Capitol (map here).

There are many things that attracted us to Austin, primarily the booming local tech scene, coupled with an extremely talented pool of PR professionals. Oh, and of course the amazing BBQ, craft beers, incredible live music, endless sunshine, beautiful Texas wildflowers, etc. are all added bonuses!

We invite you to keep an eye on our blog, as our Austin team will be sharing updates regularly on the agency’s growth, local market trends, the latest hotspots, etc.

We could not be more enthused about the prospect of Austin. If you’re a University of Texas student looking for a summer or fall internship, a PR practicioner exploring your next career opportunity, or an emerging technology company in need of PR and marketing services, we’d love to have a conversation!

Feel free to reach out to us by visting our contact us page.

Network Breaches Are No Match for Veriflow

Based in San Jose, California, Veriflow provides a preventative solution for network administrators who worry about security vulnerabilities from change induced errors. The practical application of this service allows for network administrators who may not be knowledgeable in certain technologies to easily monitor changes in the network. Where Veriflow differs from its peers is the basis of its design; a mathematical formula called formal verification, which continuously evaluates changes and ensures they won’t bring harm to the network.

President and CEO James Brear is a proven industry executive with an impressive history of success. Annual revenues under James rose consistently with his leadership at Procera Networks, totaling nearly 1110% in total growth from the start of his tenure and gathering several awards. This led to the successful acquisition of the firm by Francisco Partners for $240M in 2015. Co-Founder Brighten Godfrey leads the technical research and development for the firm. He holds a Ph.D in computer science and is an expert in mathematical formal verification, which checks the validity of code as it is written.

Veriflow has been awarded several accolades for its unique services, including Innovation Challenge Winner and a silver medal from the Network Products Guide. The firm has also been able to attract investments from the Department of Defense, Menlo Venture Capital, and NEA Technologies.

For more information about Veriflow and their services browse through coverage 10Fold has helped them acquire here and here, and watch how Veriflow’s products work here:

Meet the Data Integration Leader SnapLogic

Headquartered in San Mateo, California, SnapLogic is a unified application and data integration platform service. Pre-built data integration greatly simplifies solving complex problems based on data of several different formats. Built for the modernized data center, SnapLogic supports cloud and big data architecture allowing customers to solve their problems faster and with greater efficiency. Guarav Dhillon, who began as an early investor in SnapLogic, has led the firm since 2009 as CEO after realizing its potential. Before SnapLogic, Dhillon co-founded and led software enterprise Informatica, overseeing its rapid expansion during his role as CEO and creating billions of dollars’ worth of value for stockholders and customers.

SnapLogic has a range of high profile customers due to their innovative business approach, including Verizon, Adobe, CapitalOne, GameStop, and AstraZeneca. A host of impressive accolades have also been placed on the firm since their inception, among them being 2016 Stratus Awards for Cloud Computing Honors Companies Worldwide, 2016 Gold and Silver Winner of Stevie American Business Awards, DBTA 2016 100- The Companies that Matter Most in Big Data to name just a few.

Find recent coverage of SnapLogic here and here, and learn more about the product and services SnapLogic provides in this video:

 

10Fold- Security Never Sleeps- 104

Following Snowden’s Legacy, Contractor Accused of Stealing NSA Files

“Political motivations still unknown”

Stock prices of NSA contractor Booz Allen Hamilton took a nosedive Friday as reports of one of its contractors leaked that a former employee had been charged with two felony accounts of theft of government property and unauthorized removal of classified documents by the Department of Justice. The accused, Harold Martin Thomas III, faces up to 11 years in jail for his alleged crimes. Booz Allen also bears the weight of the formerly employing the highly controversial Edward Snowden, whose leaks to the public in 2013 revealed a mass United States surveillance program.

Expose Retaliation for BuzzFeed

“Retaliation for defamation articles against hacker group OurMine”

Interactive media site BuzzFeed was compromised Thursday by hacker group OurMine, bringing down articles and deleting information related to their members. The massive cyberattack came after BuzzFeed published stories that OurMine, which focuses primarily on the digital accounts of tech CEO’s, venture capitalists and celebrities, may be a lone Saudi Arabian teenager.

Mac Malware Monitor Your Webcam, Microphone

“New malware can penetrate even airtight Mac devices”

Malicious software that targets user’s microphone and webcam access is nothing knew, the NSA and cybercriminals alike have had programs for years that are capable of such feats. However, Mac devices have largely been a different, due primarily to the hardwired light indicating that webcams or microphones are active allowing users to notice their activation. This perceived safety may no longer be the case, according to researcher Patrick Wardle, His team’s analysis at Synack has examined several examples of malware being able to monitor microphone and webcam feeds without activating this light.

eCommerce Sites Lose Customer Data to Web Malware

“MageCart responsible for several incidents”

Cybercriminal campaign ‘MageCart’ has been the culprit of several hacking events involved with the loss of customer data and other sensitive information. MageCart has been active since at least March of this year, targeting other sites such as Powerfront and OpenCart.

10Fold- Security Never Sleeps- 104

Following Snowden’s Legacy, Booz Allen Contractor Charged with File Theft

“Could face up to 11 years in prison”

Former Booz Allen Hamilton employee Harold Thomas Martin III is accused by the Department of Justice of theft of government property and unauthorized removal of classified documents. Stock of the NSA contractor firm took a dip as the news broke. This further scars the company’s reputation that is already bearing the weight of the Edward Snowden revelations of 2013, bringing to light the mass United States government surveillance program that proved very controversial to the public. Whether the intentions of Martin are political is yet to be seen.

Expose Retaliation Hits BuzzFeed

“Hacking group targets interactive media site”

Hacking group OurMine seems to have targeted BuzzFeed, odd considering the group often sets its sights on digital accounts of CEO’s, venture capitalists, and celebrities. The attack on BuzzFeed focused on manipulating the text or completely deleting certain articles related to the groups reputation, in which the website exposed that OurMine may be a solo hacker teenager from Saudi Arabia.

New Malware Can Monitor Webcam, Microphone

“New piggyback virus can access software”

Malware used for covert surveillance is far from new. The NSA has several programs that can monitor voice or video without the notice of a laptops user. However this is not the case with Apple products, as they have a hardwired indicator that notifies the user when the webcam is on. Now this may no longer be the case. Researcher Patrick Wardle explains that a new piggyback virus is able to access webcam and speaker functions without any notification to the user.

eCommerce Malware Stealing Card Data

“Powerfront, OpenCart among affected”

Researchers are monitoring a cybercriminal campaign that have been plaguing several eCommerce sites since at least March of this year. Dubbed ‘Magecart’ by RiskIQ, the malicious software attacks the payment sources of the internet commerce sites, stealing customer personal information and card data.