Discovering the threats below the surface on the Dark Web

You can’t stop what you can’t see coming. Understanding the value of intelligence gathering on the Dark Web and gaining Open Source tools to better protect your company

The Dark Web is inherently scary for those who are unfamiliar with it, which to be frank, is most of us. Even asking most regular internet users to define what the Dark Web is could be quite a stretch. Most will probably rattle off something about open-air drug markets, illicit pornography, and possibly something about it being used by the Islamic State for planning their plots with sleeper cells in the West.

While some of these nasty groups have found their home on the less traveled parts of the internet known as the Dark Web, the real story and how it affects the world of security, is far, far more interesting than drug dealers and pedophiles.

What is the Dark Web?

In the simplest of terms, the Dark Web is a part of the World Wide Web that is accessible through special browsers like Tor. Built with layers of encryption, the Dark Web provides a level of anonymity and freedom from surveillance that is no longer possible on the open web.

The Dark Web and browsers like Tor were originally built for activists living under repressive regimes to be able to organize and communicate without fear of reprisal, using mirroring tools to hide their identities. A deeper look into the history shows that the U.S. Navy had a hand in this project, seeking a way for undercover agents to send information anonymously. Unsurprisingly, hackers looking to engage in illegal activities, like selling stolen identities and credit cards, also found it a great place to set up shop.

Over time, a collection of chat forums and other online spaces have popped up to serve the hacker community. Need a fully ready exploit kit for your next ransomware attack? Looking for partners to attack that bank in Madrid? Want to take credit for a string of database hacks and find interested customers for the information?

All you need to do is dig a little and you’ll find your niche chat group. More importantly, these are places where hackers can discuss how to carry out attacks and share knowledge. This can be as simple as asking who wants to join in a hack against a specific target. In other cases, they can talk about vulnerabilities in certain kinds of widely used code, utilizing the hive mind to problem solve.

However, just as the black hats have taken a tool designed for good (the Dark Web) and used it for crime, the white hats are entering their sanctum sanctorum, turning the tables on some of these no-goodniks.

Observing Hackers in the Wild

Just as intelligence gathering plays a crucial role for stopping crime in the physical world, the security industry has realized that the discussions playing out online can be just as important — if not more so. Cyber security companies stake out chat rooms and message boards, listening and recording important bits of information, so that they can be in the know and ready to predict the next wave of attacks from hackers.

One interesting case of picking up chatter in Dark Web chat rooms that produced surprising results was discussed in a 2012 study by the cyber security company Imperva. In their report detailing the most popular topics of conversation in Dark Web forums, they noted that SQL injection (SQLi) and DDoS attacks were tied for first place with 19% of the total thought pie. For a researcher that is worth their salt, this should indicate that a whole lot of hackers are very interested in these two techniques, and their clients had better be prepared to handle them.

Beyond techniques that talk about how to carry out hacks, there are often discussions surrounding vulnerabilities that companies should take notice of. Whether they concern vulnerabilities in a widely utilized open source library, or the fact that hospitals are more likely to pay ransoms quickly to get their data back, these forums provide important insights into the hacker mind space.

But gaining access to the deeper level, invite-only chat groups takes time, and frankly a lot of luck. Security researchers are under no illusion that they are about to interrupt the intricate battle plan for the next WannaCry ransomware attack by stumbling through a low level forum of n00bie hackers.

However, the game is less directed at finding that one tip off, and more about watching the herd. Hackers are at their best when they work as a community. Therefore, any noticeable changes in the kinds of job postings that are going up for dirty work or in the kinds of questions that are quickly rising to the top of the heap can lead to some very actionable intel.

Sharing is Caring

So, what can your company do to protect itself against the hordes of hackers that seem to loiter around the shadier corners of the internet, plotting together to undermine your product’s security?

Thankfully, the developer community knows how to come together as well, working to protect each other with information sharing. Once a piece of malware or information regarding an upcoming attack is found, it can be transmitted through various channels, including a number of tools that were set up by the open source community.

The Structured Threat Information Expression (STIXTM) format was developed by the OASIS Open organization as a machine readable standardized language to help share cyber threat intelligence. When a researcher or developer spots a piece of malware or other intel in the wilds of the Dark Web, they can pass the information on using STIX’s application transport protocol known as the Trusted Automated Exchange of Intelligence Information (TAXXII).

The MISP project is another open source threat intelligence platform with its own open standards for sharing information. This free platform also relies on user input and automation to help get the word out quickly.

All these tools detailed above are open for review on GitHub with full documentation.

For those looking for an even more expansive list of resources for tackling threats, feel free to peruse the resources that were compiled by the GitHub user called hslantman.

What does the future hold for staying secure on the Dark Web?

Even with these numerous resources, the Dark Web can still feel like a scary place because — like its cousin the Deep Web — it is uncharted territory. Hoping to shed some light here, the U.S. defense establishment’s DARPA group has backed the Memex project, which aims to build machine learning-based crawlers that are capable of searching through the Dark Web.

While the creator’s objective thus far has been to laudably help law enforcement root out human traffickers, these types of efforts to scan through the murkier sides of the internet should be met with some caution.
As privacy becomes harder to maintain online, the public may turn to the Dark Web for greater anonymity. Like freedom of speech, once anonymity is gone for those we disagree with, it is lost for the rest of us as well.

Even as more tools are developed for automating the search for threats on the Dark Web, much of the hard work will remain in human hands keeping their fingers to the pulse of the forums, listening to chatter, and waiting for new threats to emerge.

Author Bio:

Rami Sass is CEO and Co-Founder of WhiteSource , the leading open source security and compliance management platform. Rami is an experienced entrepreneur and executive with vast experience in defining innovative products, leading technology groups and growing companies from seed level to business maturity.

https://samplecic.ch/discovering-the-threats-below-the-surface-on-the-dark-web-4.html

Smart data exchange will bring value to smart city innovation

When it comes to smart city innovation, it’s arguable that most use cases are not that exciting to the average resident. A connected garbage bin, traffic light or parking meter is not going to cause applause and adoration for city officials at least in the first instance. But as more and more local systems start to communicate, it will start to make more sense and increase consumer satisfaction, at least until residents forget a life before they existed.

I spoke to Peeter Kivestu, director of travel industry solutions and marketing from analytics solutions and consulting services company, Teradata.  Kivestu believes that much of the focus has been on connecting the ‘things’ rather than the data within. The value of data grows with use according to Kivestu: “If you have data and you use it, it increases in value, particularly if you curate it, integrate it or get to use it in a purposeful way.”

He believes that there’s an opportunity for cities to embrace a platform business model where the city enables a level of connectivity around its data. Inherent to this is what he calls a smart data exchange, a new kind of asset that enables cities to evolve into a new way of delivering value for its citizens so this when it gets back to the social economic benefits.

Smart data from cities is, for the most part, siloed and fragmented

According to Kivestu:

“A city is working when all of its systems work together and when all of its people benefit in some way. But when systems are disconnected or parts of the population are disconnected and not able to access value, then the city is dysfunctional. A city is a system of systems. Yes the systems themselves are physically connected. So you’ve got highways, energy systems and buildings and city services they’re all there happily coexisting in the real universe, but digitally they’re not connected at all.”

Kivestu offers the example of wanting to attend a football game at a local stadium, mindful that traffic around the stadium will be at capacity:

“I’m just going to drive my car to a local parking lot and park there and take transit. So that’s a reasonable thing to do and I can do that in the physical world. Digitally I can find out when the transit is leaving, the departure times and so forth. But I really don’t have any idea about the situation in the parking lot so I drive my car to the parking lot. I find out the parking lot is full and therefore I miss the transit and I miss the football game.”

This kind of technology in progress and shared data would increase opportunities for innovation in this space. For example, smart app, Just Park, that sells parking spaces that guide you not only to the stadium but your seat. Smart stadiums can also benefit staff and officials through accurate real-time data such as the number of people present and their locations, tools that are useful in case of an emergency or a missing child. Smart surveillance can also be utilized to provide safety evacuation information such as instructions and directions in the case of an emergency analytics can be coordinated with weather and traffic information outside of the stadium. This means fans can leave happy, with the knowledge of their fastest route home.

Connecting Commercial and Public Infrastructure

However, for this to happen outside of the commercial arena, like smart stadiums, the data needs to be connected across the city and commercial infrastructure. As Kivestu explains:

“There are lots of cases where we have data but it resides in silos as it was built for different purposes. For example, there are safety implications to create variable speed limits on highways. If there’s been a blockage on the highway up ahead of you then the variable speed limit sign shows a lower speed to warn drivers that ahead of traffic congestion.

However, the two systems of data that collect the blockage on the highway and determine the speed shown on the highway live in two different environments. So if somebody comes along and asks a question ‘Do variable speed limits work?’ The next thing they find it will not be easy to answer not knowing that they operate in two different systems. Then, in the process of bringing the data together, you find that the data is measured in different units or the speed limits are on roadway mile markers and the highway speed data is referenced in some other way making them difficult to compare from a data perspective.”

 Good data is open data with cities setting their own needs based local agenda

Integral to the notion of a shared data repository is accessible open data, a concept embraced in many cities including LA, Barcelona and New York. Many cities are opening their data to both businesses, universities, and citizens to enable them to gain in-depth insight into the lived reality of the city.  Every guy who wants to build an app like that if they have to go build their own data systems it is going to take longer.”

Ultimately, Kivestu believes that each city needs to determine what data is most fundamental to the life of their city.

“It may be sustainability, greenhouse gases, the best way to distribute electric vehicle charging stations or what should be built and where. The growth of electric vehicles means that it makes sense for car and electricity grid data to be connected.

You want to give developers the information so that they have so that they are encouraged to do the right thing. Smart cities need to make life better in the city especially with an aging population base. These problems are not going to go away.”

https://samplecic.ch/smart-data-exchange-will-bring-value-to-smart-city-innovation.html

6 technologies you need to know to secure your IoT network

According to Gartner forecast, there are 8.4 billion internet-connected IoT devices in use currently and most new business systems and business processes will incorporate IoT. Ericsson Mobility report predicts that the number of IoT connected devices will reach 28 billion marks globally by 2021 and it would surpass the number of mobile devices.

Cisco estimates endorses that point as they predict that there would be 3.4 connected devices per person by 2020. All these statistics shows why IoT is the hottest emerging technology and it has a bright future ahead. Even businesses have started taking IoT seriously and are looking to maximize their efficiency by using internet of things. We might see a significant increase in investments in the field of internet of things.

See also: Vint Cerf sees big IoT security issues in our future

Every coin has two sides. Similarly, emerging technologies also have their drawbacks. One of the biggest downside of internet of things (IoT) is security and privacy because online privacy was never so exposed. Recent IoT breaches are a testament to that and many security professionals thinks that this trend will continue and we will see an increase in IoT attacks. In this article, you will learn about six technologies that will help you secure your IoT network.

#1: IoT Network Security

Unlike traditional networks, it is much more challenging to secure an IoT network. The reason is that there is wide range of communication protocols, standards and devices involved, which makes things more complex. Hackers will try to attack the network because it gives them the control of all the IoT devices in the network. Use antivirus, firewalls and other intrusion detection and prevention system to secure the IoT network and prevent any intrusion.

#2: Authentication

Another way to secure your IoT device from attacks is through authentication. Users have the options to go for simple authentication or complex and much more secure authentication in the form of two-way authentication, digital certificates and biometrics. Unlike traditional authentication methods, which require presence of human being, IoT authentication does not require human intervention for authentication purposes most of the time because it is mostly embedded sensors and machine-to-machine interaction in IoT. Therefore, you will have to go in with a different mindset when authenticating IoT devices.

#3: Encryption

Encrypting data in rest and data in motion will help you to maintain the integrity of your data and reduce the risk of data sniffing by hackers. Due to varying hardware profiles of different devices, no standard protocol and encryption that can be implemented across all IoT devices. This pose a big challenge when it comes to encrypting your IoT data as you will have to use a different encryption technique for every device. To matters even worse, encrypting IoT data requires efficient encryption key lifecycle management. Inefficient key management can make you more vulnerable to IoT security attacks and increases the risk of data breach. On the bright side, if you could encrypt your IoT data, then you can save it from attackers.

#4: Public key infrastructure

With varying hardware capabilities, some IoT devices might limit or prevent the use of public key infrastructure but that does not mean that it is not effective in securing your IoT network. It take advantage of complex digital certificates and cryptographic keys and offer extensive key lifecycle management capabilities including generation, distribution, management and revocation of public and private cryptographic keys. You can load these complex digital certificates into IoT devices that are enabled by third party public key infrastructure software, which enhances the security of communication between IoT devices. Manufacturers could also install these complex digital certificates after manufacturing.

#5: API security

Securing API is also critical to ensure that the data transmitted through end-point to back end system is only done by authorized persons. It will not only help you in making sure that authorized devices, developers and apps are using the API but also aids in detecting threats and attacks on APIs. According to Muneeb Qadar Siddiqui App developer at Branex, “App developers will have to be vigilant during app development process because any security flaws in APIs can wreck havoc on your IoT application.” App developers will have to make sure that their IoT app not only connects and performs concurrently but also secure their apps too. Keep an eye on specific threats against any API you are using take security measures to protect it.

#6: Security analytics

From collecting to aggregating data, from monitoring to normalizing data from IoT devices, you need a monitoring that provide you options for reporting as well. Security analytics act as a brilliant way to alert organizations about any malicious activities that might be taking place in the background and breaching the set policies. It takes full advantage of big data techniques, artificial intelligence and machine learning and let you predict anomaly detection, which goes a long way in reducing the number of false positives. There is still a lot of work to be done to ensure that these security analytics could prove to be helpful in detecting IoT specific attacks and intrusions that goes under the radar of traditional network firewalls.

But no single magic bullet

It is important for businesses to balance the benefits that IoT devices can deliver with a recognition that the same IoT devices have become a soft target for hackers and cyber criminals who are looking to intrude into your IoT networks and get access to your confidential and sensitive information.  Remember that there is no single magic bullet to fix all IoT security issues. In order to protect your IoT networks from external attacks, you will have to use a combination of these technologies. Authentication and encryption is crucial and so does the measures to secure your network. Establishing an efficient public key infrastructure will help you manage the whole process from key generation to key revocation effectively. You will have to follow a proactive approach and make security a priority.

https://samplecic.ch/6-technologies-you-need-to-know-to-secure-your-iot-network-4.html

Three things every IoT manufacturer should do to improve security

There’s no question that the Internet of Things is the new security battleground. Internet-connected webcams, HVAC systems, cars, TVs, watches, printers and more are giving people more use out of their devices. But these devices also open doors to hackers who want to steal corporate data, lasso thousands of devices into botnets that can launch DDoS attacks, or even set off Dallas’ 156 emergency outdoor sirens.

See also: Will these Chinese satellites provide hack-proof data security?

When it comes to security, corporations are struggling to keep up with the speed at which problems evolve. For example, a researcher with Google Project Zero recently discovered a flaw in Broadcom Wi-Fi chips that could allow someone to remotely execute code on affected iPhones, Nexuses and Samsung devices just by being in their general vicinity. Another researcher found 40 zero-day vulnerabilities in Samsung’s Tizen operating system for smart watches, phones, and TVs —  he said the code may have been the worst he’s ever seen.

Meanwhile, a new version of the Mirai botnet was recently discovered to be capable of launching application layer attack, not just DDoSing websites, and turning large swaths of the internet dark.

To combat these issues, companies are constantly inventing new solutions. For example, a new Microsoft project, dubbed Sopris, is aimed at solving some security issues with IoT by redesigning Wi-Fi microcontrollers. And while efforts like this help, more must be done within corporations to address the IoT security problem in a scalable way.

How? Here are three things companies making IoT devices should do to improve the security of their products:

#1: Be accountable

Many companies developing IoT products aren’t technology companies, so they don’t necessarily design products with security in mind, or know the best practices to ensure security. Vendors getting into the IoT market must realize that their devices will have vulnerabilities and that connecting them to the internet increases the likelihood the devices will be attacked or used in attacks. If companies sell products without acknowledging this reality, they have already failed, and are putting not just their customers at risk, but the internet as a whole.

#2: Automatically update

Products that don’t have a way to automatically update are sitting ducks.

For instance, the moment they left store shelves, devices vulnerable to the Mirai botnet were effectively at the end of their life — there was no way to update the devices or to fix the vulnerabilities, so the only option owners of affected devices had was to buy a new device. Device recalls are expensive, so providing a way to update the device is essential in avoiding instant obsolescence, which turns customers off.

Even Windows XP, which had a 10-year life cycle, shipped security patches to customers to install manually. Microsoft planned for customer support and maintenance, like employing more security engineers, over the long run and factored that into the upfront costs or subscription.

In the same vein, Nest charges $10 a month for upkeep services, which enables it to make one of the most secure IoT devices on the market.

#3: Embrace disclosure

IoT device manufacturers must also make it easy for ethical hackers to report vulnerabilities to them. Companies should have a vulnerability disclosure process with an easy-to-find email address or web form to which to send bug reports. If they want to encourage more security scrutiny to help them find and fix bugs, companies can also set up a bug bounty program that compensates hackers for reporting vulnerabilities.

No product is immune to bugs, and given how widespread IoT devices have become, and how vulnerable they are to hacking, it’s essential for companies that make IoT devices to take all the precautions necessary to ensure that people’s privacy is as protected as possible.

https://samplecic.ch/three-things-every-iot-manufacturer-should-do-to-improve-security-4.html

Leadership Guide for Every Business Growth Stage

It can be challenging to realize that you are in the midst of a moment of personal growth when it comes to business. As the day-to-day of your professional life moves more quickly, you are likely to evolve in your career.  Sometimes you change in your leadership role without even realizing a transformation has occurred. But, you’ll want a leadership guide for every business growth stage.

Through every stage of growth, your business transitions to new knowledge, systems, and management.

As this transition occurs, you and your role within the company changes too. I have found that revenue and headcount together are useful markers for uncovering where you are as a business. These precursors are there to warn you about the leadership role required. Typically, more revenue leads to the need for more employees. And, more employees leads to greater business complexity.

As tangible growth occurs, you will need to adjust your leadership style.

Fewer touchpoints with the expanding employee base alone can drive this need for change. Looking back on how I have evolved as an executive, I’ve come to delineate my transitions to four distinct stages. Each stage has informed and evolved my personal leadership growth as well as the skills and approaches required of those around me.

  • Stage 1: This first phase is associated with roughly $0 and $10 million in revenue and typically less than 50 employees. Usually, everyone in the organization knows a lot of the organization’s day-to-day and interactions are very cross-functional; sometimes, a single individual is wearing multiple hats of responsibility.
  • Stage 2: The second phase is demarcated somewhere between $10-25 million, and you are likely approaching the 100-employee mark. In this phase, cross-functional responsibilities and “athletes” begin to be replaced with individuals with specific domains of expertise.
  • Stage 3: The third phase is far removed from the first phase. ARR is now moving from $25M to over $100M, and your headcount has at least doubled to the north of the 200 million mark.
  • Stage 4: In the fourth phase, revenue is moving to the north of $500 million, and headcount is likely expanding rapidly on both an organic and inorganic (M&A) basis. Phase IV begins to mark the transition into a platform business as opposed to a limited product company.

(For the sake of this discussion we will only focus on these first four phases.)

As an entrepreneur looking to become a business leader, you will need to know and anticipate how and when your role within the company will need to evolve. Watch and be aware of what is necessary as your organization matures through these phases.

The Entrepreneurial Spirit

The first phase is often a bit messy because it is the period when the entrepreneurial spirit is strong, and rapid pivots are often critical. A better moniker for this is the “figure it out” phase. To be clear, in this crucial phase long-term planning is not always optimal. This period is often focused merely on survival. The points may also be incremental points of substantiation to the company’s value proposition.

These incremental gains are critical to surviving your way to another investment cycle.

Watch as you move through each investment cycle contained in another quarter, another month, another week, and even another day. The company and all who work in it need to have a survival mentality. All of you must be trying to get the business off the ground with the goal of keeping it in the air. At this phase, your thoughts are not centered on leadership; it is a phase of pure entrepreneurship – pretty or sustainable are less important than good enough and validated.

This phase is often defined by the will of a single individual or a limited number of individuals putting the organization first no matter what.

Sometimes the founder is carrying all the weight on their backs and doing whatever is necessary to get to the $10 million thresholds of sustainable profitability and product validation. As your organization approaches $10 million in ARR, you start to understand better whether or not your concept has a market and is sustainable.

What is the primary value we provide to our customers? Think of the Pony Express.

Why do clients and customers buy from us repeatedly? What distractions or legacy thinking overhangs exist and is our value proposition in the best “package” or could that “package” change or evolve? I like to utilize the tale of two cities to illustrate this latter point best. I use the cities of St. Joseph, MO, and Kansas City, MO. I grew up in Missouri, and for me, the story of the evolution of St. Joseph and Kansas City typifies the potential pitfalls when you fall in love with your “package” vs. your “value.”

St. Joseph, MO was home to the Pony Express; this city was the hub for moving information and resources from the East to West. What the people of St. Joseph and the Pony Express were good at was moving information and goods. The moving of this information and goods was their value proposition.

The business of the Pony Express’ first business iteration was delivering this value (information and goods).

They came up with using a series of cowboys, on horses, creating a relay for the movement of this information and goods (not pretty, but practical enough).

However, a time came when the town of St. Joseph needed to move from its own Phase I and transition into Phase II. As the necessary “package” (the Pony Express business) was about to change. The entrepreneurial business plan was about to be replaced with a repeatable business model — because — it was scalable.

As the steam engine gained popularity and railroads became the next tool (package) for facilitating the value proposition.

The new tool (steam engine) was implemented for the moving of the goods and information. The city of St. Joseph passed on the opportunity to leverage this new technology. The city of St. Joseph erroneously believed their system worked the best (i.e., leveraging horses), and they had fallen in love with their system. The city was sure that what they had been doing in the past was the best, so they didn’t even consider a new idea, a new tool, or a new strategy.

Enter the railroad industry — a new tool.

When the railroad came looking (with their new tool) they looked elsewhere, ultimately discovering a no-name cow town further south to serve as their railway hub between the East and the West — and that town is now Kansas City.

The transition from Phase I to Phase II in business may very well facilitate some key pivots. You have to be laser-focused on your value proposition and to provide and to invest in a few core, repeatable strengths within your business.

Find Your Strengths and Double Down

In the second phase of your business, the focus will shift from survival to how you can hone the bullseye of your business’s core. You’ll focus on key strengths and the repeatability of your business’s solutions.

As an executive, you’ve evolved from being a startup entrepreneur to leading and initiating the creation of a system. Why something happens becomes more important than the fact that something happens.

You will need to begin to think and act for the long-term. Scalable thinking begins to replace survival thinking.

While you may have had an array of product offerings as you tried to find a market in the entrepreneurial phase by throwing a lot of spaghetti against the wall. By now, you will have discovered one or two individuals who are the main drivers of your business and value proposition.

As a leader in the growth stage, you will have taken the time to define the core areas of focus, and you begin to transition from a “get it done” mentality. You find your group of generalists and move to repeatable, systematic behaviors, approaches, and domain experts.

The entire business must become more systematic so that you can tweak and hone your processes for scalability.

In this business stage, you aren’t just using individual efforts to simply overcome or drive the outcomes for survival. The worry of day-to-day existence and the urge to simply intervene and “make it happen” must now be replaced with systemic learnings.

The stage of letting go of a few things can be a tough transition for many founders/entrepreneurs. For example, you’ll have to resist the urge to jump in and take over the sales meeting and allowing a new sales rep to fumble their way through.

Here is where your leadership has to move forward. You can’t stay in the “fumbles” approach.

You have to move to informing your team with a systemic approach to training, coaching, and onboarding key individuals. This can be accomplished even better with technology. I often refer to this stage with my colleagues as allowing ourselves to blow off digits (creating incremental learning lessons) vs. severing limbs (losing the sale, in this example).

It is a dangerous journey finding this balance and can be very difficult for managers. This stage is critical to making it through Phase II successfully.

While you’re identifying the vital aspects of the business and improving the system — something else — potentially dangerous happens if you don’t pay attention. You’ve added a large number of new employees, and the day-to-day decision-making moves further away from the leadership team.

The “central nervous system” of the organization has migrated. The effectiveness of the systems and processes that are created throughout Phase II — will now become exposed in Phase III.

Crossing the Founder’s Chasm: Entrepreneurship vs. Leadership

Phase II has been about leading the team to establish systems. You have removed the emotional tendencies to allow learning moments. Your system improvement observations have taken place. If you were effective in Phase II, you would have felt yourself begin to slide back, empowering the domain experts and allowing the business disciplines to take over.

Phase III is about the transition from the front of the line leadership to what I like to call dog-sled leadership.

In Phase III, the team and disciplines (processes, systems, cultural tendencies) must now guide the business. Your role is to support the identified needs of the team. Phase III is a natural transition to simply guiding the team vs. pulling the team. Leadership vs. Entrepreneurship is now in full effect.

In Phase III,  you know what the company can do well. You have faced what the market actually wants. The question now becomes at what velocity can you execute.

As the leader of the business, you need to develop new abilities.

You are no longer an entrepreneur focused on what the market is telling you. You need to step away from your emotions and pride of ownership and move into systems that empower others to be excellent in their roles.

You need systems and processes for almost everything your organization now effectuates.

  • evaluating market/user feedback
  • training
  • onboarding the team
  • aligning the team’s objectives
  • assessing performance
  • consistent sales, servicing models and escalations
  • Standardization of the back-office. By now, mistakes can’t repeatedly be happening, as you shouldn’t be making the same mistakes twice.

Through the prior two phases, you have been the lead dog on the team. But as you cross the founder’s chasm to real leadership, you are now sitting in the musher’s chair.

As a musher, your job isn’t pulling in a single direction – you need to be focused on aligning the entire team, feeding and nurturing the team and letting the crew pull the sled. You are now merely setting the direction of the company, and the team is doing the pulling.

You must now focus on making sure they are happy, healthy, and pulling in the same direction. At this point, you and the leadership team have moved out of specialty roles where you know all aspects of the processes and operations to hire and round out teams of highly-specialized experts.

Show Me Your Friends, and I’ll Show You Your Future

The final stage of leadership is a bit more challenging to break down. The one key factor I’ve discovered that leads to success at this stage is the processes and systems that were key to leadership in the evolution of the business through the prior three stages.

At this point, you need to be critical of who you surround yourself with. Honestly, this is the key to ultimate success as you’ve grown into a substantial organization.

Placing your trust in your leadership team is crucial to ensuring that your business continues to be successful.

  • You will need to trust them to understand the importance of having difficult conversations.
  • Speaking up when something is going wrong
  • Passing on to your team the ability to take a critical eye to the business and the rest of the organization.
  • Ensuring the people who are going to take over your previous roles have the skills and confidence to run the company.

If you are traveling at an excessively high speed, even a small wobble can cause the wheels to come off.

To avoid having any part of the business come apart, you need to surround yourself with people you trust to be willing, to tell the truth, and surface the difficult but necessary topics. It requires a high degree of confidence to believe that people will stand up and speak out when something is not optimal.

When you are responsible for running a business at scale, you need to be able to rely on a great leadership team who can avoid potentially harmful mistakes when something needs to be fixed.

As your business grows, the level of your day-to-day involvement will inevitably change. Hopefully, my own experiences serve as a rough guide to help you navigate your role during each step of your company’s journey.

https://samplecic.ch/leadership-guide-for-every-business-growth-stage.html

6 Steps to Grow Your Small Business with Cold Email

Can business run only on cold emails? Who reads emails these days? I know these questions must be popping up in your head. But let me tell you, cold emails can still help you in generating new leads for your business if done in the right way. Use the six steps to grow your small business with cold emails.

Many businesses still are using cold emails to drive sales. If you are in the notion that emails can only help you close small deals, then you’re mistaken. I have seen examples of companies using cold email to close large enterprise deals too.

These exact steps will help take you as a small business owner and generate great leads for your business. 1. Build a persona.

I have been into marketing for close to two years now, and my most important takeaway in this short span has been the importance of creating the right personas. If you can create the right persona, your half the job is done. But how can you create the right persona? Here are some tips.

The simplest way of creating a person is filtering people depending on certain factors. For example, if I run a marketing agency that serves startups, then I would target the Founders of the startup whose size is less than 50 employees. Get the details and let that help you to send targeted emails.

2. Investing in a tool.

Many people prefer sending cold emails manually, but that’s fine when you want to send 300 emails in a month. But what if you want to send emails at scale, let’s say around 100 per day. You’ll require a tool to help you send emails campaigns of this scale.

Not only will you be able to save on a lot of time, but it also helps you track a lot of metrics such as open rates, click rates & more. One tool that I came across the last few months that’s working well for me is Lemlist. It’s a great tool, especially when you are just starting out.

3. Sending the right emails.

The subject line & the email body is everything. It can make & break things for you. Let’s talk about the subject line first. Your subject line is crucial if you want your emails to be opened & read by your prospects. Try to be very precise with your subjects.

Some of the best subject lines include:

Quick Question
Question for <Company>

Keeping the subject line, a little simple helps a lot. Coming to the content, make sure you have these four elements in the body:

– Personalization (Name, Company Name ).
– Reason for reaching out (keep it short & simple).
– Social Proof.
– CTA (like a meeting link).

Avoid writing long emails as they tend to get fewer responses. Opt for short and sweet.

4. Follow up is the key.

Many people give up in the first followup itself. But following up multiple time is the key, there are times where people get replies even after the fourth or fifth follow up.

Also, make sure to personalize the follow-ups before sending them. Make sure to include a reason for following up each time. Unless you do this, there’s no use of following up, and you’ll end up getting mostly unsubscribes.

5. Quality vs Quantity.

Something that has always worked for me is focusing on quality rather than quantity. I know many would disagree with me, but quality always wins over quantity. So make sure to put your best efforts in each email so that you can end up getting more replies & open rates.

It’s not about the hard work but smart work.

6. Track your success.

Doing everything at the same time doesn’t help. Try to tabulate the success of each campaign before starting another one. By evaluating first, it will help you in executing the next campaign better. If you don’t want to invest in a tool, then you can use Google Sheets to track campaign metrics.

Some metrics you must note are – open rates, responses, link clicks & deals closed.

Conclusion

Hope you had few takeaways from the post. If you’re looking for other ways of the lead generation, then I’ll recommend you to try cold emails. They are still very effective if done correctly.

What are your tips for cold emails? Mention them in the comments below. I’d love to learn them.

https://samplecic.ch/6-steps-to-grow-your-small-business-with-cold-email.html

An Insider’s 11 Take-Aways from Companies Winning Industrial (IIoT) Cybersecurity

As you read through blogs and articles about cybersecurity and the Industrial Internet of Things (IIoT), it’s easy to get so focused on the complexities (and there are many), that you lose sight of the big picture. There is huge opportunity in this space—untapped by the existing IT cybersecurity players.

To state it in the simplest terms, when protecting free consumer accounts like, Gmail or Facebook accounts, the motivation for investing in security is driven by certain objectives—protecting customer trust, avoiding an unpleasant hit to the company’s reputation, etc. These are, of course, real and important concerns. But when an industrial company is trying to protect a $10 million turbine, the economics of investing in security become very different—and much more straightforward. There’s a reason why much of current security investments are directed towards the industrial space: it’s an enormously promising market—and one where new innovations can have an enormous impact.

GE Ventures, the venture capital subsidiary of General Electric, is one of the organizations that recognizes the large opportunities (and even greater responsibility) to lower costs and eliminate unplanned downtime for their customers. They have been working closely with industrial companies for decades. The company has also built longstanding trust relationships with customers and helps them take advantage of the industrial Internet and protect them from its inherent risks. They are rising to that challenge—their own Predix architecture, a platform that help to optimize industrial business processes, has an extensive security-in-depth strategy.

An Insider’s 11 Take-Aways from Companies Winning Industrial (IIoT) Cybersecurity

In addition to the security-in-depth strategy on their platform, GE Ventures is always on the lookout for startups that are advancing the industrial cybersecurity art. According to them, there are some very talented ones out there. Of course, IIoT is not an easy market to break into for startups. Industrial networks are different than enterprise IT that makes them a terrible place for moonlighting—having a great product roadmap in traditional IT is not a birthright to succeed in industrial cybersecurity. But there are some commonalities among the most successful and promising startups in this space. Here are a few from GE Ventures’ perspective:

1.) They know their stuff.

There are lots of things That GE look at when evaluating a startup: A team with the right specialties. Differentiated technology. But the most important factor separating companies treading water from those already swimming laps is that they are staffed top-to-bottom by people who “get” industrial applications.
The most successful startups have a kind of institutional knowledge of industrial control systems (ICS)—often gleaned from working in industrial in their previous careers. They’ve learned important lessons (sometimes the hard way): They know the market. They understand its constraints. They understand through experience the attack surface and exposure. And they always, always keep their eye on the ball: the business continuity of the customer.

2.) They take the IIoT Hippocratic Oath: First, do no harm.

No matter what they’re working on, successful IIoT startups never lose sight of their customers’ primary objective: this machine cannot fail. Whatever work they’re doing to secure a system, they know that it absolutely cannot slow down or knock out industrial assets. They create a security layer that’s at least as agile, if not more so, than the devices and systems it’s protecting.

3.) They don’t make things harder for the customer.

Successful IIoT startups know that their target customer has been doing things a certain way for years. They know not to make assumptions that these customers have the same in-house capabilities and institutional knowledge that a non-industrial enterprise would—or, when it comes to software, that they even speak the same language. And they don’t assume that the customer will be willing to fill in gaps that are lost in translation. The most promising IIoT startups are ready to deliver IT solutions to industrial, and they’re not afraid to make it clear that that’s where their expertise lies. But they come out of the gate speaking OT.

4.) They make security integrated.

Successful IIoT startups know that treating security as an additional feature or up-sell will never fly. Their customers expect security to be baked into the product and fully integrated into existing industrial process.

5.) They don’t try to eat the whole cake at once.

Enterprise IT security and IIoT cybersecurity are two totally different animals. You can’t just port something from one world into the other. Yet, there are lessons to be learned from the evolution of enterprise security. Among the biggest that successful IIoT startups adhere to: they don’t try to solve the security problem in one fell swoop.

In the enterprise world, we started with one big problem (protecting digital assets and data), and ultimately broke it down into a whole lot of smaller problems: perimeter security, identity/authentication, data loss prevention, compliance, etc. Smart IIoT startups apply the same thinking to IIoT cybersecurity. They’re not looking to “solve” industrial cybersecurity. They’re attacking smaller, discrete problems and developing useful solutions.

6.) They start with the assumption that they will be targeted.

Even the biggest and best digital companies in the world find malicious or unexplained code in their environments—sometimes threats that have been lying dormant for years. Smart IIoT startups expect that their solutions will be subject to the same types of malicious and/or intelligence gathering threats as well. That doesn’t mean they don’t spend a huge amount of time and effort trying to prevent breaches. But they spend just as much time and effort making sure that, if someone does get in, they can isolate that breach and prevent it from infiltrating the rest of the system. And they recognize that the ICS attack surface extends beyond industrial devices and networks themselves, to all parts of the organization and supply chain.

7.) They’re ready to scale.

Successful IIoT startups never forget that for industrial customers, zero downtime is acceptable. They know that it’s not enough to have great tech—they have to be ready to engage that technology on a scale of thousands of deployments, sometimes in multiple countries—sometimes overnight.

8.) They know that security starts well before connecting a single industrial device.

Successful IIoT startups recognize that some of the most dangerous vulnerabilities aren’t just flaws in their code, but weaknesses in their supply chain. They know that any OEM that incorporates subassemblies made by others can potentially introduce tampered firmware into their system by accident. And they’ve learned the lesson from vendors who had excellent technology but saw deals evaporate because the customer realized they were using an untrusted vendor for one component of the supply chain. Solid IIoT startups take steps to secure their products during every step from building to shipping, when it can be most vulnerable to mistakes or malicious actors.

One of the more interesting areas now being explored: public ledgers. A growing number of companies are looking at Blockchain public ledger technologies to help authenticate assets and provide an audit trail with end-to-end chain of custody. (Industry groups are getting involved too—the Trusted IoT Alliance recently announced a new initiative to promote standard ledgers to authenticate IoT devices.) It’s still very early days, but work like this could prove incredibly valuable for ICS, where many categories of non-IT assets (engines, parts, sub-parts) are connecting back to the IT backbone.

9.) They don’t get distracted by buzz words.

The startup space, or at least the media covering it, tends to be overly sensitive to the hype cycle. Whatever the latest hot concept may be (currently, AI and machine learning), companies rush to make sure they can claim to check those boxes. Successful IIoT startups don’t spend their time worrying about the latest flavor of the month. They’re laser-focused on delivering concrete answers to specific industrial problems.

10.) They understand the need to secure data at rest and in motion.

Industrial customers need solutions not just to secure data at the edge—where more data than ever before is being collected and processed—but also to secure data in motion as it travels to the cloud.

Data in motion poses a particularly cumbersome challenge for industrial systems. Some companies in this space are developing solutions to simplify passthrough of encrypted data, eliminating the need to decrypt data at any point in transit, and its associated risks.

11.) They understand the job is never done.

Good cybersecurity startups recognize that they’ll never be “finished” with their solution, and they don’t get too comfortable with their current design. They understand that real-world cybersecurity means ongoing, indefinite iteration.

This isn’t a comprehensive list. But if you’re charting the course of companies developing interesting new solutions in IIoT cybersecurity, it’s a good place to start.

Authors: Michael Dolbec & Abhishek Shukla, Managing Directors of GE Ventures

https://samplecic.ch/an-insiders-11-take-aways-from-companies-winning-industrial-iiot-cybersecurity-4.html

Is more IoT driving more cyber attacks?

The WannaCry ransomware attack from this May made the whole world think about cyber security issues once again. Another unique point for WannaCry versus previous cyber attacks is IoT also got involved with the crisis as well. We learned from the news reports that this worm virus was different from usual. It had not only tried to encrypt computer data, but it had also attacked connected devices such as medical and teaching equipment in hospitals and schools. This is also why this May’s cyber attack has influenced so many industries.

IoT has minimized the barrier between the Internet and devices. Once one of these two is attacked, the other one would also be involved inevitably. As for the IoT security, cameras on our smart devices and smart homes are the most associated aspect of every one of us and may have influence on our everyday life.

Thanks to the IoT technology, we can remote control those connected cameras. Even if we are not home, we still can access these devices and check our properties. However, just because we are using those connected cameras and devices, if we do not do a good job in terms of security, such as utilizing weak passwords, or even no pin, criminals could easily access and control our devices by large scale scanning. According to Gao Sheng, senior software engineer from China’s national Internet Emergency Center, passcodes like “user”, ”admin”, and pure numbers have been widely used, and are the easiest ones to decrypt and hack.

See Also: How tweaks to IoT’s supply chain can close security gaps

Worldwide Threats

Is more IoT driving more cyber attacks?

As the concept of a connected world is becoming more and more popular, different types of smart home appliances have become first choice for millions of families. And because of this, the cyber attacks on IoT are changing to multiple modes. Outlaws can access all connected appliances by only hacking one router. According to Helpnetsecurity, U.S. (28%) and China (7%) are the two countries that experience the most cyber attacks. In 2015, the X-code Ghost incident had deeply influenced China’s iOS development environment.  It still reigns as the most famous cyber security accident regarding the Internet and IoT in China.

Lots of Chinese developers used an unofficial iOS development kit that had been modified by malware, later dubbed X-code Ghost. The malware injected third party code into apps compiled with it. Since this attack happen on the developer side at compile time, even jail broken devices were affected. The X-code Ghost incident influenced lots of popular apps that have billions of users, such as WeChat, Didi, and so on. Both of these popular apps affect every facet of Chinese user’s normal life because of IoT.

IoT security attacks caused because of the Internet will not only impact normal people’s life, but also produce more serious problems to large-scale enterprises. Based on the report titled Toward New Possibilities in Threat Management from Price Waterhouse Coopers in 2017, the number of cyber attacks in the East Asia region has rapidly increased by 969%, and security incidents of industrial IoT have increased over 22x. Due to most enterprises using semi-automatic production models, and the popularity of smart connected systems, countless IoT devices have been utilized into the production process. But, many parts of these devices are still keeping the factory passwords, which are weak pins like “user” and “admin”.

They Get You Coming in and Going Out

Is more IoT driving more cyber attacks?
For general users like us, right now, there are two kinds of cyber attacks: inbound and outbound. Inbound cyber attacks target our smart devices like phones, tablets, or cameras directly. DNS Amplification Attacks are common outbound attacks, with over 80% of family level cyber attacks resulting from router issues. To this point, Helpnetsecurity suggested three tips to actively avoid attacks. First, we need to periodically change the passcode of our smart devices and family Internet. Second, do not connect to unknown Wi-Fi and Bluetooth devices. Last but not least, upgrade device software in a timely fashion.

Nowadays, both iOS and Android will send out an upgraded version regularly, even every app on our phone will release upgrades frequently. Some users think these upgrades are annoying and choose to shut down this function, but most of the upgrades are related to security issues. As normal users, timely upgrading of our devices and apps is our best way to increase our cyber safety.

https://samplecic.ch/is-more-iot-driving-more-cyber-attacks-4.html

What does the WPA2 vulnerability mean for IoT?

Researchers at a Belgian University earlier this week revealed the discovery of a break in the security protocol used to protect the vast majority of Wi-Fi connections (WPA2 based).  Mathy Vanhoef of imec-DistriNet, KU Leuven University, released his findings explaining that an attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs) to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, and photos.

Vanhoef stressed that “Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.” Further, The KRACK attack is universal and works against all type of devices connecting to or using a WPA2 WiFi network. This includes Android, Linux, iOS, macOS, Windows, OpenBSD, and embedded and IoT devices. If your device supports Wi-Fi, it is most likely affected.

See Also: 6 technologies you need to know to secure your IoT network

The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is still likely affected. Consumers are advised to update all their devices once security updates are available.

I spoke to cybersecurity researcher Nadir Izrael, CTO and co-founder of Armis, the company responsible for the discovery of BlueBorne, a set of vulnerabilities that impact any connected device using Bluetooth. Nearly all devices with Bluetooth capabilities, including smartphones, TVs, laptops, watches, smart TVs, and even some automobile audio systems, are vulnerable to this attack. If exploited, the vulnerabilities could enable an attacker to take over devices, spread malware, or establish a “man-in-the-middle” to gain access to critical data and networks without user interaction.

Izrael explained:

“It’s not shocking to learn Wi-Fi is vulnerable, but it’s still disturbing to see how the technology we all rely on every day can’t be trusted. This is the second time in two months that we’ve seen all connected devices being vulnerable to widespread airborne vulnerabilities; we recently discovered vulnerabilities in Bluetooth and the BlueBorne threat. The difference is that with KRACK we can’t tell people to just turn off Wi-Fi. The majority of all traffic is now wireless. It’s how we connect, communicate, and live.

KRACK shows us we are now living in the new age of exposure. It is a combination of a world of devices that either can’t be updated or cannot have any security software running on them. Since we can’t stop using smartphones, remove all the smart TVs, take away the connected healthcare unit, or remove the quality control sensors from the manufacturing line, we need solutions that will see each device and its activity – and take action on whether that device is behaving properly or inappropriately.”

The challenge to update connected products

What does the WPA2 vulnerability mean for IoT?
While companies are rushing to release security updates and patches (Tech blog Charged offers an ongoing list of firmware patches as they become available) the reality is a little more complex for IoT. As Izrael notes:

“Updating devices has become very complex. Some devices can be updated; in fact, updates are a part of a standard process. Other devices make updates very difficult. The vast majority of these simple connected devices in the home and at work do not allow for easy software updates or security patches. Many lack a decent interface for a consumer or IT professionals to easily access a way to update them. Some have default passwords that may not be known (default passwords that themselves create risks as we have seen with the Mirai attack). Others have simply no way to get an update onto the device.”

Is this proof of vulnerabilities ripe for future attack?

Fortunately, the world as we know it is not going to end for now, but the Izrael notes that KRACK is a proof-of-concept. As patches are now being released, the hope is that it will not be exploited in the wild, but it’s likely that criminals will try. He suggests that for protection,  businesses must ensure that all their corporate and employee devices are updated with the latest software and patches. For devices they don’t control or can’t update, businesses need to ensure devices can’t connect to a critical network.

Izrael warns that poor industry focus on security due to connectivity being the first priority has set up an ecosystem ripe for attack: :

“In a world of a glaring lack of security standards across IoT protocols, we see an attack surface that is expanding rapidly, exposing enterprises to attacks they are ill-prepared to defend against. Unfortunately, we know that companies can’t even see 40% of the connected devices in their environment. This is why IoT and all these connected devices are a big security concern. It’s a huge security blind spot for organizations, with serious consequences.”

As researchers scramble to determine the origin of and people responsible for KRACK, it’ll only be a matter of time before the next Wi-Fi (WPA2 specific or not) vulnerability with potential for serious consequences is brought to light.

https://samplecic.ch/what-does-the-wpa2-vulnerability-mean-for-iot-4.html

The future of tokenization and blockchain is not just ICOs

Blockchain business case variety seems secondary in the conversation around blockchain hype. Tokenization on a blockchain system has received attention around the world with the increasing prevalence of ICOs (Initial Coin Offerings).

For those who continue to see “ICO”, but have no firm understanding of the definition, here’s an over simplified version. An ICO is a way a company can raise funding through using cryptocurrencies such as Bitcoin. This works by the company creating its own coin, perhaps the ClaytonCoin, and those interested in purchasing shares in the company can trade their Bitcoins for ClaytonCoins. A ClaytonCoin then supposedly represents a share in the company, but, to quote Smith + Crown:

“Most ICOs today are marketed as ‘software presale tokens’ akin to giving early access to an online game to early supporters. In order to try to avoid legal requirements that come with any form of a security sale, many ICOs today use language such as ‘crowdsale’ or ‘donation’ instead of ICOs.”

The unregulated nature of ICOs caused China and South Korea to ban them. On the other hand, ICOs in the US have found much success such as in the case of Tezos raising $230 million.

See Also: LAToken raises millions in ICO to create “the first asset-backed token exchange”

Beyond ICOs

Even with successful ICOs happening in the US, tokenization built on blockchain is under utilized in terms of its potential. I ran into a start-up called, FundersToken, at an after party for RISE 2017 that is trying to fix this. FundersToken is a CRM software-based company, with the backbone of tokenization. Their software with blockchain technology offers business augmentation and digitalization. Their goal is to allow business with no blockchain experts to use tokenization for various business functions. These include exchange of goods/services, voting, equity transfer (ICOs), and dividends.

Voting and governance through tokenization has been done through Distributed Autonomous Organizations (DAOs). While in an ideal world the voting rights would work very similar to standard governance in companies, but there are again no regulations. This may prove to be an issue in specific scenarios. Yet, many VCs point to tokenization as the future of governance in addition to funding. Another article from Smith + Crown contains great comparisons of the Pros v. Cons.

For this technology to be industry changing, more companies like FundersToken must come forward and include the nontechnical. As a technology evangelist, there is a duty to be patient with the ignorant and help encourage productive uses of new technology. The worst thing that could happen for the future of blockchain is association with only ICOs. That is not to say ICOs don’t promote blockchain properly, in fact, it’s the exact opposite. But, imagine if when the Internet was gaining popularity, the only thing the Internet was known for was digital media. Sure, people would be thrilled to hang on my every word, but it would miss the greater potential.

Live AMA

The founding team of FundersToken will be joining myself and the rest of the ReadWrite team on WeChat to do a live AMA about both their product and tokenization within a week. If you would like to participate, feel free to connect with me on WeChat:

The future of tokenization and blockchain is not just ICOs

https://samplecic.ch/the-future-of-tokenization-and-blockchain-is-not-just-icos-4.html

Создайте подобный сайт на WordPress.com
Начало работы