<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[SecOps Forward]]></title><description><![CDATA[SecOps, the current and future state.]]></description><link>https://www.secopsforward.com</link><image><url>https://substackcdn.com/image/fetch/$s_!Qr1h!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd83977f3-258a-4ed7-aff4-4189b8ecf79e_631x671.jpeg</url><title>SecOps Forward</title><link>https://www.secopsforward.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 03 May 2026 12:11:10 GMT</lastBuildDate><atom:link href="https://www.secopsforward.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Maxime Lamothe-Brassard]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[secops1@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[secops1@substack.com]]></itunes:email><itunes:name><![CDATA[Maxime Lamothe-Brassard]]></itunes:name></itunes:owner><itunes:author><![CDATA[Maxime Lamothe-Brassard]]></itunes:author><googleplay:owner><![CDATA[secops1@substack.com]]></googleplay:owner><googleplay:email><![CDATA[secops1@substack.com]]></googleplay:email><googleplay:author><![CDATA[Maxime Lamothe-Brassard]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Does AI solve the platform vs. point product dilemma?]]></title><description><![CDATA[There&#8217;s a growing consensus in cybersecurity that AI will render the old platform vs. point product debate moot. That&#8217;s wrong, badly wrong, perhaps even perilously wrong.]]></description><link>https://www.secopsforward.com/p/does-ai-solve-the-platform-vs-point</link><guid isPermaLink="false">https://www.secopsforward.com/p/does-ai-solve-the-platform-vs-point</guid><dc:creator><![CDATA[Maxime Lamothe-Brassard]]></dc:creator><pubDate>Mon, 12 Jan 2026 21:47:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!79D7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!79D7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!79D7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!79D7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!79D7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!79D7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!79D7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3000063,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secopsforward.com/i/184367294?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!79D7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!79D7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!79D7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!79D7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F232eb586-4ec4-495b-a482-12830bc6ee3a_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There&#8217;s a growing consensus in cybersecurity that AI will render the old platform vs. point product debate moot. That&#8217;s wrong, badly wrong, perhaps even perilously wrong. Understanding why is essential, and lays the groundwork for a deeper conversation about what our industry is getting right (and wrong) about AI adoption in general.</p><h2>AI to the rescue?</h2><p>The background to the point product vs. platform discussion can be summed up pretty quickly.</p><p>The cybersecurity vendor market (and thus, the average security team&#8217;s stack) has become unreasonably complex. Purchasing, integrating, and managing dozens of separate cybersecurity point solutions is time-consuming and expensive, not to mention exhausting and unsustainable.</p><p>Integrated security platforms offer an end to tool sprawl and integration challenges, along with corresponding gains in efficiency, affordability, and security outcomes. Platforms, and greater integration in general, are undeniably the right approach for the industry moving forward.</p><p>But the counterargument to platforms has always been that they can&#8217;t do everything they promise, and deliver second-rate capabilities when compared to dedicated point solutions. That critique has merit, considering the <a href="https://limacharlie.io/blog/platformization-in-cyber-security">half-baked approach to platformization at many large vendors</a>.</p><p>Until recently, this seemed like an intractable debate. But then&#8230;the great <em>deus ex machina</em> of our time arrived on the scene: generative AI. Swooping in to deliver seamless integration of <a href="https://www.secopsforward.com/p/does-the-perfect-cybersecurity-platform">best-in-class capabilities</a>, GenAI will now give every team the benefits of a unified platform with none of the drawbacks.</p><p>MCP servers, the thinking goes, will allow point vendors to offer high-quality, differentiated capabilities in a way that AI can understand and, more importantly, interact with. CLI tools like Claude Code, Gemini CLI, and Codex will give teams easy and reasonably affordable access to AI, helping them leverage point products directly without requiring a human to know how to interact with those tools, understand the intricacies and quirks of each one, or manually integrate them with the rest of the stack.</p><p>Sounds great in theory. Breaks down, very, very quickly, in practice.</p><h2>The four shaky premises of the &#8220;AI can fix this&#8221; argument</h2><p>The fundamental problem with the thesis above is that it&#8217;s based on several faulty premises. These comprise four mistaken assumptions, both technical and operational:</p><p><strong>Assumption #1: Every point product has a mature MCP server.</strong></p><p>This one is easily disproven. Take a casual survey of the tools in your stack, and you&#8217;ll see that MCP server availability and maturity vary <em>wildly</em> between point products. Some point vendors don&#8217;t have an MCP server at all (not even on the roadmap). Many others have MCP servers that are little more than an imperfect, early attempt to help teams leverage AI in their workflows.</p><p><strong>Assumption #2: Point product MCP servers support all point product capabilities.</strong></p><p>Again, simply not true. Most point solutions expose only a fraction of their capabilities through their MCP servers. Why? Because it takes significant engineering effort, and thus expense, for a point vendor to support a capability through an MCP server. Point products thus offer AI support for only a small subset of their capabilities: usually the bare minimum needed for co-pilot functionality.</p><p><strong>Assumption #3: AI will move seamlessly between tools and easily interpret data across point products.</strong></p><p>Higher-end generative AI models <em>can</em> translate concepts accurately and consistently. But there is always a cost when models are actually deployed in complex systems. The presence of MCP servers will carry some kind of overhead: e.g., the prompts needed to explain how to translate different concepts or how to move from one system to another. AI effectiveness degrades quickly. Latency creeps in. Context windows are overrun and important data is lost.</p><p><strong>Assumption #4: AI allows SecOps teams to maintain and provision point products effortlessly.</strong></p><p>Perhaps the most obviously wrong of all. AI does nothing to change one basic fact: namely, that the point products it helps to integrate/manage <em>are still separate products</em>. Every tool still means another tool vendor. Those vendors have to be onboarded individually, and require separate contracts and contract negotiations, regular compliance checks, deployment work, and the like. At best, AI takes <em>some</em> of the pain out of tool sprawl. It doesn&#8217;t eliminate the underlying problem.</p><h2>Back to square one?</h2><p>Given the current state of things, consider what it would actually mean for a SecOps team to try to solve stack fragmentation challenges using AI.</p><p>Many point products in the stack won&#8217;t even <em>have</em> well-developed MCP servers. The most likely result is a quasi-platform that offers inconsistent functionality across core capabilities&#8212;with numerous unintegrated point products thrown into the mix. Sound familiar?</p><p>Best case, even if by some luck all of your point products have functional MCP servers, the stack will incur translation costs, hampering effectiveness and degrading security outcomes. Just as importantly, the &#8220;unification&#8221; offered by generative AI <em>will only extend over a limited subset of your stack&#8217;s functionality</em>, because again, most point products will only expose a small portion of their capabilities through that MCP server.</p><p>So when, for example, teams are doing basic alert triage, they will get some relief. Great! But all of that tool sprawl comes in through the back door as soon as it&#8217;s time to do anything else with the stack: onboard new organizations, deploy detection rules in multi-tenant environments, engage in proactive threat hunting, create compliance reports, perform remediation work, or any of the other myriad things that SecOps teams need to do with their tools. That hardly sounds like &#8220;problem solved&#8221; to me.</p><h2>AI as the right way forward (and the wrong one)</h2><p>I want to be really, 100% clear about one thing here. This is not an anti-AI-in-cyber post. I firmly believe that some form of AI enablement is the future of the SOC. But what form that will take is another matter. And to be frank, I think that where we are today vis-&#224;-vis AI adoption in our industry is&#8230;not great.</p><p>I suspect that the problem is more philosophical than technical. It&#8217;s the predictable result of tool vendors <em>still</em> not understanding what modern SecOps teams really need: abstraction, interoperability, automation, scalability, flexibility, and control. In the past, we tried to describe a possible solution in terms of a &#8220;<a href="https://limacharlie.io/blog/a-hyperscaler-for-cybersecurity">hyperscaler for cybersecurity.</a>&#8221; But today, we&#8217;d have to expand the discussion to include the absolutely fundamental need to help teams leverage AI across the full spectrum of security operations.</p><p>Unfortunately, legacy vendors and AI startups alike seem to be mired in an outdated conception of tool provisioning and of their own relationship to security teams. Nowhere is this dynamic more apparent than in the current approaches to AI&#8212;either the AI bolt-ons offered by the incumbent mega-platforms or the so-called &#8220;AI SOCs&#8221; being sold by the challengers&#8212;both of which are dead ends. But that&#8217;s a topic for another post&#8230;</p>]]></content:encoded></item><item><title><![CDATA[The lack of systems built with security in mind]]></title><description><![CDATA[How we can build the future of SecOps with security practitioners as the primary audience.]]></description><link>https://www.secopsforward.com/p/the-lack-of-systems-built-with-security</link><guid isPermaLink="false">https://www.secopsforward.com/p/the-lack-of-systems-built-with-security</guid><dc:creator><![CDATA[Maxime Lamothe-Brassard]]></dc:creator><pubDate>Tue, 17 Jun 2025 13:02:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iLXG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iLXG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iLXG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!iLXG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!iLXG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!iLXG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iLXG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2575716,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secopsforward.com/i/166125265?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iLXG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!iLXG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!iLXG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!iLXG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0208e2d5-c9a6-4f1a-9ca4-5f52391c5a39_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Whenever something strikes a chord with a large group of people, it can be good to ask <em>why</em>&#8212;and what it means.</p><p>I recently made <a href="https://www.linkedin.com/feed/update/urn:li:activity:7336019158809067520/">a post on LinkedIn</a> that got a ton of responses from my fellow security practitioners&#8230;maybe more than anything I&#8217;ve ever shared on that platform.</p><p>The gist of the post: To our surprise, we found we were able to get Microsoft Defender for Endpoint alerts in our SecOps Cloud Platform (SCP) faster than those alerts appeared <em>within Microsoft&#8217;s own product</em>. In other words, from Microsoft to Microsoft, there was about a 5-minute to six-<em>hour</em> lag on those alerts, whereas in the SCP, they showed up in near real-time.</p><p>I asked if anyone else had had similarly surprising experiences and received an outpouring of responses. It turns out a <em>lot</em> of folks have noticed strange lags and incomplete telemetry data in various parts of the Microsoft ecosystem&#8212;and in other products and platforms as well. Things that, from a security standpoint, seem counterintuitive at best&#8230;and downright negligent at worst.</p><p>In short, what we found with the Defender for Endpoint alerts is not an isolated issue at all. It highlights a much larger problem faced by security operations (SecOps) teams: the distinct lack of tools and systems built with us in mind.</p><h2>The question of audience: Optimized for whom?</h2><p>To be clear: We&#8217;ve all experienced integration problems and latency issues with third-party tools. But again, this was Microsoft to Microsoft. One of the largest and most influential tech companies on the planet, operating entirely within its own ecosystem, and still we find these unaccountable endpoint alerting lags and other related issues. So&#8230; what&#8217;s really going on here?</p><p>The answer is twofold.</p><p>First, while Microsoft may be a single company, they&#8217;re not immune to the issue of siloed product lines and development teams. Microsoft today is essentially a cloud provider with an operating system, that also owns a suite of office software, that also has an endpoint solution, etc. Even though everything is under one umbrella, there will still be problems stitching all of that together and making everything work well.</p><p>Second, and I think this is what impacts us the most as cybersecurity practitioners, is the fact that the vast majority of Microsoft products <em>are not built for us</em>. We&#8217;re simply not the intended audience. The audience for MS Office is business users. The audience for Microsoft&#8217;s cloud computing offerings? IT groups and developers. In other words, out of all of the product lines in the Microsoft family, really only one of them is aimed at (and optimized for) SecOps teams.</p><p>Take those two things together&#8212;a vast, siloed product ecosystem that needs to be integrated, made up of products that aren&#8217;t addressed to security practitioners&#8212;and it&#8217;s no wonder we end up with suboptimal security outcomes.</p><p>Of course, this isn't to pick on Microsoft. As others have noted, there are plenty of other platforms and products that treat the needs of security teams as an afterthought. It's more to the point to say that if <em>even</em> <em>Microsoft</em> has these problems, what hope is there that the rest of the IT industry will build systems and products that give security practitioners what they really need?</p><h2>A hyperscaler for SecOps</h2><p>OK, so the needs of SecOps teams differ from those of IT teams and business users. But here's the uncomfortable reality: It&#8217;s futile to wish that tech companies would start building products with our needs top of mind. Why? Because we&#8217;re a small part of a much larger tech industry. Global cybersecurity spending was something like $200 billion last year. Global IT was north of $5 trillion. We&#8217;re simply <em>never</em> going to be the main audience for most of the products in the environments that we defend.</p><p>So what&#8217;s the answer?</p><p>Well, one possible solution, although not a very good one, is to buy an endless array of point products to give us the capabilities we need. Cybersecurity has gone this route for the last decade (mostly for want of a better option). The consensus? It&#8217;s unsustainable. Tool sprawl isn&#8217;t a solution. It&#8217;s a symptom. It&#8217;s expensive, hard to scale, and creates massive infrastructure management and integration challenges.</p><p>The newer (somewhat better) approach is to turn to an integrated security platform. However, for several reasons&#8212;some operational, some business-related&#8212;these so-called <a href="https://limacharlie.io/blog/platformization-in-cyber-security">cybersecurity platforms create as many problems as they solve</a>. For service providers like MSSPs and MDRs, platform products also come with a huge downside: They&#8217;re sold by large security vendors that have their own managed security services offerings. Buying your core infrastructure from a direct competitor is a pretty high-risk strategy.</p><p>The alternative? What we&#8217;re building at LimaCharlie: <a href="https://limacharlie.io/blog/a-hyperscaler-for-cybersecurity">a hyperscaler for SecOps teams</a>. The idea is to take the <a href="https://www.secopsforward.com/p/undifferentiated-heavy-lifting-for-cybersecurity">best parts of the cloud provider approach</a> and apply it to our industry:</p><ul><li><p>Be a neutral vendor of cybersecurity tools and infrastructure</p></li><li><p>Deliver core capabilities on demand, via open APIs, and with metered billing</p></li><li><p>Make the architecture engineering-first, with automation, multi-tenancy, and infrastructure-as-code controls as basic design principles</p></li><li><p>Optimize and integrate everything in the platform for the needs of security practitioners/the best security outcomes</p></li></ul><p>This model gives SecOps teams their core capabilities via a single, well-integrated platform&#8212;but without the drawbacks of the legacy vendor approach to platformization. To give just a couple of examples of what that looks like in practice: Say a team needs a presence on every endpoint in the environment to ingest, analyze, and respond to different sources of log data at wire speed&#8230;they now have that via the SCP&#8217;s multi-platform agent and detection, automation, and response engine. If they want to parse, prune, and route telemetry data intelligently, without having to send everything to the SIEM and/or risk losing valuable data, they now have that capability natively without being forced to purchase an observability point solution. They just need to define telemetry data handling/routing rules in the SCP and refine them as needed going forward.</p><p>The cybersecurity hyperscaler approach is different because it&#8217;s built to work as a well-integrated whole, optimized for security practitioners, and delivered in a way that gives security service providers flexibility, scalability, and control. It&#8217;s the best way forward for our industry because it offers the exact same benefits that AWS and Azure did for IT&#8212;but this time, we&#8217;re the audience.</p>]]></content:encoded></item><item><title><![CDATA[Undifferentiated heavy lifting for cybersecurity?]]></title><description><![CDATA[How cyber startups and MDRs can focus their efforts on their core value and differentiators.]]></description><link>https://www.secopsforward.com/p/undifferentiated-heavy-lifting-for-cybersecurity</link><guid isPermaLink="false">https://www.secopsforward.com/p/undifferentiated-heavy-lifting-for-cybersecurity</guid><dc:creator><![CDATA[Maxime Lamothe-Brassard]]></dc:creator><pubDate>Wed, 23 Apr 2025 20:20:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VUBb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VUBb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VUBb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!VUBb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!VUBb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!VUBb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VUBb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3137058,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secopsforward.com/i/161994290?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VUBb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!VUBb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!VUBb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!VUBb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bc0be25-89f1-4dbb-8239-7a468bb5dd84_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I keep coming back to the idea of undifferentiated heavy lifting when trying to communicate to folks what we do at LimaCharlie.</p><p>"Undifferentiated heavy lifting" was how Amazon introduced AWS to the world. The other day, I found an old video of Jeff Bezos discussing the idea during <a href="https://techtv.mit.edu/videos/16180-opening-keynote-and-keynote-interview-with-jeff-bezos">a keynote talk at MIT</a>. This was way back in September 2006, when AWS was in its infancy, and EC2 was still in public beta!</p><p>It's a fun moment from the history of technology. But what struck me most was how fresh of an idea AWS was back then, and how well Bezos explained its value to his audience of technologists.</p><p>He pointed out that a lot of businesses struggled with the infrastructure challenges of developing web-scale computing applications.</p><p>He cited technical challenges like server hosting, bandwidth management, and scaling physical growth. He also noted the administrative and managerial overhead that infrastructure tended to produce: buying decisions, contract negotiations, and the challenges of managing a mishmash of hardware and maintaining legacy software.</p><p>All of this created an untenable situation in which companies were stuck doing the hard work of infrastructure building and management instead of focusing on their core value and differentiators.</p><p>To quote the man himself:</p><blockquote><p>Your major bottleneck in developing your ideas, in developing your successful products and service offerings turns out to be something that is not unique to your business at all. It's completely undifferentiated. And the dirty secret is&#8230;that at least 70 percent of your time, energy, and dollars go into this backend heavy-lifting infrastructure.</p></blockquote><p>That's the origin of the term &#8220;undifferentiated heavy lifting.&#8221; It's <em>undifferentiated</em> because it literally does nothing to differentiate you and your business. But it's <em>heavy lifting</em> because it's both very hard and has to be done very well in order for you to have any hope of success.</p><p>The value proposition behind AWS was to take over undifferentiated heavy lifting for companies by offering them what they needed as cloud-based primitives instead. That was the genius of AWS: Foundational services to solve the complex challenges of IT infrastructure and computing&#8212;delivered in a way that was independent of physical infrastructure, well-integrated, on-demand, pay-per-use, and completely scalable. In one stroke, Amazon solved many of the infrastructure <em>and</em> technology management challenges holding businesses back.</p><p>Nearly 20 years later, we can see that the AWS model has been a massive success in IT and general tech. Now it's time to apply the idea of undifferentiated heavy lifting to the cybersecurity industry as well.</p><h2>The case for "muck" in cybersecurity</h2><p>In cybersecurity today, far too many organizations are handling their infrastructure challenges like it's still 2005. Teams tend to take one of two (equally unpalatable) approaches:</p><p>Either they collect dozens of point solutions, paid and open-source, and then try to assemble everything into a coherent security stack. Result: tool sprawl, high costs, visibility gaps, and excessive time spent on infrastructure management and integration.</p><p>Or they look for an all-in-one platform that promises to solve every problem for every user. Result: vendor lock-in on steroids, lack of customization, and the need to rely on a <a href="https://limacharlie.io/blog/MSSP-respond-to-vendor-competition">vendor that is likely competing with you</a>.</p><p>To put it mildly, neither of these are good options.</p><p>At LimaCharlie, we've been building a better option for cybersecurity teams. We&#8217;re attempting to do for our industry what AWS did for IT: offer foundational infrastructure and capabilities via a public cloud provider model.</p><p>Bezos&#8217;s tongue-in-check expression for all of that stuff, collectively, was &#8220;muck.&#8221; Our basic thesis is that all cybersecurity teams need access to the same infrastructure muck of security operations (SecOps) to handle their undifferentiated heavy lifting.</p><p>There&#8217;s no need for them to outsource these capabilities to an endless series of point products <em>or</em> to a monolithic tool vendor. Neither is there any need for teams to reinvent these capabilities themselves every time they need to offer a new service or develop a new product.</p><p>So, what does undifferentiated heavy lifting for cybersecurity look like? Here's a representative (though not exhaustive) list of the kinds of capabilities we give teams through our SecOps Cloud Platform (SCP):</p><ul><li><p><strong>Agent</strong>: Collect endpoint telemetry from any source and take action on it.</p></li><li><p><strong>Automation engine</strong>: Automation in the abstract. Gives teams the ability to say: "When X happens, do Y." Bidirectional capabilities make it possible to automate actions on third-party tools and platforms as well.</p></li><li><p><strong>Data routing and optimizatio</strong>n: The ability to bring in data from any source and route it to any destination. In combination with the automation engine, this data can be transformed, enriched, or pruned in flight to enable better security outcomes and control costs.</p></li><li><p><strong>Telemetry retention</strong>: Teams can store all telemetry data for the cost of ingestion for one year.</p></li><li><p><strong>Extensibility</strong>: An ecosystem of adapters and extensions makes it possible to manage third-party tools from within a single platform and using a common data format.</p></li></ul><p>I'd argue that every cybersecurity team needs these things in one form or another. The idea behind LimaCharlie was to build these heavy-lifting capabilities and then make them available to teams through a public cloud provider model (i.e., everything API-first, on-demand, pay-per-use, scale up or down as needed, and so on).</p><p>Our mission is to be a pure infrastructure provider for the cybersecurity industry. We want to free teams from tool sprawl, oligarch vendor lock-in, and the need to build infrastructure themselves&#8212;and enable them to innovate and differentiate in areas where they can genuinely add value.</p><h2>Focus on SecOps, not on infrastructure</h2><p>If you're an MSSP, MDR, cybersecurity builder, or even a top-tier enterprise security group, you know that basing your security operations on an endless series of point solutions is unsustainable.</p><p>You also know that you won't differentiate yourself by being the most proficient user of some vendor's product&#8212;much less by building the world's latest and greatest endpoint agent!</p><p>Your value lies in what you can do that no one else can: in the things that truly differentiate you. When you don&#8217;t have to worry so much about the heavy lifting of cybersecurity infrastructure, you can better focus on that core value instead.</p><p>And to be clear: This isn't just a vague possibility, or an idealistic vision of the future. We're <em>already</em> seeing the approach work with our SCP users. Blumira, <a href="https://limacharlie.io/blog/blumira-speeds-time-to-market-by-building-with-limacharlie">a cloud SIEM provider</a>, took their XDR from concept to GA in just five months by letting the platform take over some of the heavy lifting for them. An <a href="https://info.limacharlie.io/hubfs/Case%20Studies/Recon-Infosec-DFIR-Case-Study-2023.pdf">MDR provider improved response times and eliminated scaling concerns</a> by using our "muck" instead of struggling with its old DIY stack.</p><p>This may be the best way to explain what we're doing at LimaCharlie, and also the difference between our vision of platformization and what <a href="https://limacharlie.io/blog/platformization-in-cyber-security">PANW and others have been pushing</a>. We're not trying to be a one-stop shop for all teams. Rather, we're taking over the undifferentiated heavy lifting of cybersecurity infrastructure so teams can stay on mission: building better SecOps, taking the fight to the adversary, and keeping organizations and users safe.</p>]]></content:encoded></item><item><title><![CDATA[Why don’t cybersecurity startups follow go-to-market advice?]]></title><description><![CDATA[Are cybersecurity startup founders just not reading the same books as everyone else? Are they constitutionally immune to good advice? Far from it.]]></description><link>https://www.secopsforward.com/p/why-dont-cybersecurity-startups-follow</link><guid isPermaLink="false">https://www.secopsforward.com/p/why-dont-cybersecurity-startups-follow</guid><dc:creator><![CDATA[Maxime Lamothe-Brassard]]></dc:creator><pubDate>Thu, 27 Feb 2025 18:21:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DGML!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DGML!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DGML!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp 424w, https://substackcdn.com/image/fetch/$s_!DGML!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp 848w, https://substackcdn.com/image/fetch/$s_!DGML!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp 1272w, https://substackcdn.com/image/fetch/$s_!DGML!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DGML!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp" width="728" height="441.4921875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:621,&quot;width&quot;:1024,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:120292,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secopsforward.com/i/152633455?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b13d384-c985-45b6-9f25-c5ac611cca32_1024x1024.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DGML!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp 424w, https://substackcdn.com/image/fetch/$s_!DGML!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp 848w, https://substackcdn.com/image/fetch/$s_!DGML!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp 1272w, https://substackcdn.com/image/fetch/$s_!DGML!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20565aef-784f-46a2-aea4-89a8c530b766_1024x621.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When you&#8217;re a startup founder, it&#8217;s something of an occupational hazard.</p><p>You wind up reading piles of books about founding startups.</p><p>It&#8217;s worth the time and effort, because the best of these books offer invaluable insights from some of the most successful entrepreneurs on the planet.</p><p>But one thing I&#8217;ve noticed is that cybersecurity startups don&#8217;t follow a lot of the most important advice.</p><p>If you look at the classics of the genre&#8212;<em>Zero to One</em>, <em>The Lean Startup</em>, <em>Rework</em>&#8212;a few common themes emerge. Founders are consistently told to:</p><ul><li><p>Start small and gradually expand into larger markets</p></li><li><p>Build a minimum viable product and bring it to market quickly to test assumptions and gather data about the market</p></li><li><p>Take an iterative approach to development and pivot rapidly as needed</p></li><li><p>Keep the organization&#8217;s &#8220;mass&#8221; low by staying lean and avoiding technology lock-ins and long-term contracts whenever possible</p></li></ul><p>But time and time again, I see startups in cybersecurity:</p><ul><li><p>Launch at an unsustainable pace or rate of spending, instead of starting small and attempting to scale over time</p></li><li><p>Spend an inordinate amount of time and effort on engineering and development work before launching a new product or service</p></li><li><p>Purchase tools that would only be appropriate for a far larger business</p></li><li><p>Lose agility by accepting lock-in and long-term contracts from their vendors</p></li></ul><h2>Cybersecurity Tools as a Drag on Growth</h2><p>What&#8217;s going on here? Are cybersecurity startup founders just not reading the same books as everyone else? Are they constitutionally immune to good advice?</p><p>Far from it. If you look at much of the general business counsel found in these books (on hiring, personnel management, funding, and so on), you&#8217;ll see founders in cybersecurity applying all of that distilled wisdom&#8212;and doing it every bit as well as leaders in other sectors.</p><p>In order to understand what&#8217;s happening with security startups, we need to acknowledge a fundamental problem in our industry: Cybersecurity teams are burdened with a product marketplace that doesn&#8217;t serve their needs. This takes a number of forms, including:</p><ul><li><p>A cumbersome sales culture full of mandatory meetings with vendor reps and lengthy negotiations</p></li><li><p>A billing model that involves long contracts, complex licensing, minimum spending, and termination fees.</p></li><li><p>Black-box solutions that are opaque, inflexible, and demand a &#8220;just trust us&#8221; approach to cybersecurity</p></li><li><p>Bundles of tools sold as a single product that are often poorly integrated and come with unwanted or unneeded functionality</p></li></ul><p>These are issues I&#8217;ve talked about before in the context of <a href="https://www.youtube.com/watch?v=IbIfuMiKgP8">cybersecurity platformization</a> or <a href="https://www.secopsforward.com/p/its-time-to-move-cybersecurity-forward">the trajectory of our industry</a>&#8212;but the implications of this situation for builders and startups is particularly problematic.</p><p>Cybersecurity founders, unlike their peers in other sectors, are often <em>unable</em> to do what they should be doing, even when they know what that is. How does a fledgling company avoid lock-in when every vendor requires rigid, long-term contracts? How can you start small and grow when you&#8217;re working with bloated, pay-to-play tools that demand massive up-front investment?</p><p>At LimaCharlie, we&#8217;re building something that offers a different approach to cybersecurity tooling and infrastructure&#8212;and a way for security startups to take advantage of the experience and learnings of the successful entrepreneurs who have gone before them.</p><h2>Solving Startup Problems with the Public Security Cloud</h2><p>The alternative I&#8217;m talking about is a public cloud-like platform for security operations: something like AWS or GCP, but specifically for cybersecurity. In brief, this entails an integrated platform that provides core cybersecurity tools and infrastructure via a public cloud delivery model: pay-per-use, on-demand, API-first, scalable, and automation-friendly.</p><p>Our implementation of this approach is the SecOps Cloud Platform (SCP). For builders in cybersecurity, it&#8217;s a massive shift, because it enables them to:</p><ul><li><p>Access enterprise-tier cybersecurity capabilities through a pay-per-use billing model, enabling startups to begin with a small client base and scale their infrastructure spending as their revenue grows</p></li><li><p>Build niche products and services around narrow bands of functionality within the SCP&#8212;then expand their offerings using the same, well-integrated platform as they grow</p></li><li><p>Test and validate new business ideas at minimal cost and iterate rapidly using a platform built to facilitate engineering and customization</p></li><li><p>Stay agile and independent by using a platform designed to scale up or down as needed and integrate easily with other tools.</p></li></ul><p>A few years ago, I might have referred to the SCP as an idealistic vision for change. But some of the biggest names in cybersecurity have now <a href="https://limacharlie.io/blog/platformization-in-cyber-security">embraced the platform approach</a>, and we&#8217;ve seen our users successfully leverage the SCP as <a href="https://limacharlie.io/blog/mdr-firm-saves-100k-per-year-with-limacharlie">business enabler</a> and a <a href="https://limacharlie.io/blog/blumira-speeds-time-to-market-by-building-with-limacharlie">go-to-market accelerator</a> in real-world scenarios. In short, the SCP represents the direction cybersecurity is <em>already</em> heading&#8212;and needs to continue to head if we&#8217;re to move into the future.</p><p>The SCP offers a better, more efficient way to support cybersecurity operations. But beyond this, the security public cloud will also be a growth engine for the industry, enabling innovators and builders in cybersecurity to apply the business lessons learned by founders working in other areas of technology and in other fields.</p>]]></content:encoded></item><item><title><![CDATA[Managing Cybersecurity in Uncertain Times]]></title><description><![CDATA[There&#8217;s no magic bullet. But one key is to embrace technologies that improve efficiency, flexibility, and control.]]></description><link>https://www.secopsforward.com/p/managing-cybersecurity-in-uncertain</link><guid isPermaLink="false">https://www.secopsforward.com/p/managing-cybersecurity-in-uncertain</guid><dc:creator><![CDATA[Maxime Lamothe-Brassard]]></dc:creator><pubDate>Fri, 24 Jan 2025 17:50:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rJpM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rJpM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rJpM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!rJpM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!rJpM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!rJpM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rJpM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:352366,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rJpM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!rJpM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!rJpM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!rJpM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb758574-6fba-41e0-a989-0304244edd2e_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Nobody knows how the economy will perform in 2025. For cybersecurity businesses&#8212;and managed security service providers (MSSPs) in particular&#8212;the unknown looms.</p><p>The economy depends on macro factors we don&#8217;t get much of a say in: trade wars, actual wars, climate disasters, inflationary pressures, supply chain issues, and political volatility just about everywhere. Economically speaking, the coming year could be as great as the optimists predict, or turn out to be extremely challenging.</p><p>So, how can MSSPs and other security businesses get ready for what lies ahead, when the only real certainty is uncertainty?</p><p>There&#8217;s no magic bullet. But one key is to embrace technologies that improve efficiency, flexibility, and control. For cybersecurity teams, security operations (SecOps) platforms are an excellent way to do this.</p><h2>How SecOps platforms hedge against the unknown</h2><p>First, a clarification. When I say &#8220;SecOps platforms,&#8221; I&#8217;m referring specifically to the type of solution we&#8217;ve been building at LimaCharlie. I&#8217;m <em>not</em> talking about what some vendors <a href="https://limacharlie.io/blog/platformization-in-cyber-security">try to pass off as cybersecurity platforms</a>: bundles of poorly integrated point products or opaque all-in-one toolsets.</p><p>A real SecOps platform must be well-integrated and transparent. It should give teams core cybersecurity capabilities in a manner that supports modern security operations at scale. API-first access, multi-tenancy, automation, and infrastructure as code (IaC) control are table stakes.</p><p>A public cloud-like delivery model (everything available on demand, pay-per-use pricing, etc.) is also crucial in this context. Cybersecurity teams need the same flexibility that has driven public cloud adoption in IT&#8212;especially in times of uncertainty.</p><p>I often talk about SecOps platforms as enablers of better security outcomes. But from a business operations standpoint, they&#8217;re also an excellent way for MSSPs to make it through a turbulent period and emerge unscathed, or even stronger than before, on the other side.</p><p>This is because SecOps platforms help security businesses:</p><p><strong>Adapt</strong></p><p>Pay-per-use pricing, on-demand capabilities, and IaC controls help MSSPs respond to shifting market demand for security services.</p><p>In a downturn, MSSPs can reduce a deployment without getting stuck paying for licenses they&#8217;re no longer using, having to renegotiate contracts, or being dropped into a different pricing tier.</p><p>If business is booming, teams can quickly add endpoints or expand a service offering for an existing client&#8212;without having to meet with vendor sales teams or enter into protracted negotiations. Multi-tenancy and IaC also make it easier to onboard new clients using pre-configured tenants and reusable code templates.</p><p><strong>Consolidate</strong></p><p>The integration and consolidation offered by SecOps platforms allow security businesses to optimize infrastructure spending no matter what&#8217;s happening in the market.</p><p>If budgets are strained, a SecOps platform can help MSSPs cut operating costs by eliminating one-off tools from their stack and replacing them with platform capabilities. This lets firms reduce spending without changing their core service offerings. It also makes labor spending more efficient, because skilled team members can focus on higher-value tasks instead of tool management.</p><p>In good times, an MSSP can invest engineering resources in more ambitious projects to capitalize on the consolidation offered by SecOps platforms. For example, a firm might take advantage of the opportunity to develop a custom EDR capability, gaining independence from their legacy EDR vendor.</p><p><strong>Automate</strong></p><p>The automation capabilities offered by SecOps platforms benefit security businesses in almost any climate.</p><p>During a hiring freeze, automation can be used eliminate manual workflows, helping team members work more productively without burdening them unfairly.</p><p>In a period of growth, platform automation is even more essential, because it enables scalable operations and workflows. Firms can accept new business with confidence knowing that a new client won&#8217;t produce a 1:1 increase in workload.</p><p><strong>Communicate</strong></p><p>SecOps platforms are the antithesis of that &#8220;just trust us, you&#8217;re safe&#8221; attitude so common among legacy cybersecurity vendors. There are no &#8220;magic-box&#8221; components in a true SecOps platform. Teams can see and control their infrastructure&#8212;and thus establish <a href="https://www.pivotpointsecurity.com/podcasts/ep80-maxime-lamothe-brassard-the-aws-approach-to-provable-security/">provable security</a>.</p><p>The cybersecurity value of that is obvious. But there&#8217;s an important business benefit as well, because service providers can use platform transparency and visibility to <em>show</em> customers exactly how they&#8217;re protected.</p><p>If clients are facing budget woes and thinking about cutting back on their security spending, it&#8217;s critical for MSSPs to highlight the value of their services demonstrably and objectively.</p><p>In better times, clearly communicating value to clients also makes it easier to justify price increases that improve margins and overall profits.</p><p><strong>Deliver</strong></p><p>On-demand, pay-per-use capabilities let MSSPs roll out a new service offering without having to take on another vendor or commit to another long-term contract.</p><p>In a difficult, highly competitive economy, this means MSSPs can still say &#8220;yes&#8221; to their customers&#8217; niche requests. They don&#8217;t have to worry about the cost and complexity of onboarding a new tool to service a single account.</p><p>In a strong economy, on-demand capabilities allow service providers to take advantage of new opportunities more efficiently. SecOps platforms abstract away infrastructure complexity, making it possible to <a href="https://limacharlie.io/blog/blumira-speeds-time-to-market-by-building-with-limacharlie">bring a new product or service offering to market quickly</a> without sacrificing quality.</p><h2>The best way forward, come what may</h2><p>No one has a crystal ball. But as cybersecurity practitioners, preparing for the unexpected is what we do.</p><p>MSSPs need tools that help them to respond to unforeseen challenges&#8230;both technological and economic.</p><p>SecOps platforms give teams the agility, control, and scalability they need. That&#8217;s better for security. It&#8217;s better for business. And it&#8217;s the best way for service providers to navigate an uncertain future.</p>]]></content:encoded></item><item><title><![CDATA[It’s Time to Move Cybersecurity Forward]]></title><description><![CDATA[The cybersecurity industry's approach to tooling and infrastructure is badly outdated.]]></description><link>https://www.secopsforward.com/p/its-time-to-move-cybersecurity-forward</link><guid isPermaLink="false">https://www.secopsforward.com/p/its-time-to-move-cybersecurity-forward</guid><dc:creator><![CDATA[Maxime Lamothe-Brassard]]></dc:creator><pubDate>Tue, 10 Sep 2024 16:10:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DlgI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DlgI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DlgI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!DlgI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!DlgI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!DlgI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DlgI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:287150,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DlgI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!DlgI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!DlgI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!DlgI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95537e87-21fe-4e2f-b28e-f80c2dc57987_1792x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cybersecurity is 10-15 years behind IT.</p><p>That may seem like a big claim. But recent events have shown that our industry&#8217;s approach to tooling and infrastructure is badly outdated.</p><p>The heart of the problem is far too many cybersecurity vendors are selling products that are essentially black boxes. The prevailing mentality among tool providers: &#8220;Buy our product, and you&#8217;re protected. We&#8217;ll keep you safe. You don&#8217;t have to worry about how.&#8221;</p><p>Even things like update management, version control, and change windows become part of that dubious promise&#8212;something for vendors to handle so customers feel secure.</p><p>But when security vendors treat their solution as if it lives in a bubble, isolated from the rest of tech, it leads to problems. Local security teams can&#8217;t see what vendors are doing&#8212;and are denied basic control and management of their tools. Vendors don't know how their changes will impact customers.</p><p>As we&#8217;ve seen, this approach can have unintended, even catastrophic consequences. But despite what LinkedIn influencers and opportunistic marketing teams would have us believe, the problem isn&#8217;t limited to a specific security company, it&#8217;s industry wide. It&#8217;s time for a change.</p><h2>What cybersecurity can learn from IT</h2><p>There&#8217;s an important lesson for our industry in the recent cybersecurity disruptions, and it mirrors something IT learned long ago. Tech industries are successful when they adopt a practitioner-focused, engineering-centric approach to core tools. For cybersecurity to move forward, <a href="https://www.youtube.com/watch?v=BezOWU3kluM">we must do the same</a>.</p><p>At a high level, we must:</p><ul><li><p>Stop seeing security tools as products that deliver protection, and focus instead on <em>knowing</em> <em>how</em> we&#8217;re protected&#8212;what some have described as the shift from <a href="https://ventureinsecurity.net/p/future-of-cyber-defense-and-move">promise-based security to evidence-based security</a>.</p></li><li><p>Give teams full control of tools and infrastructure so the stack can be observed, tested, validated, and customized to suit their unique needs.</p></li><li><p>Offer practitioners API-first access to tools and the ability to manage deployment, configuration, updates, and testing as they see fit.</p></li><li><p>Build security tools using the principles and best practices that IT professionals already embrace, e.g., automation, scalability, CI/CD, infrastructure-as-code (IaC), and so forth.</p></li></ul><p>These changes would give teams full visibility and control over their operations&#8212;including tool testing, updates, rollouts, and rollbacks. The net effect would be greater stability in production environments and better security outcomes.</p><h2>Security benefits of an engineering approach</h2><p>Our industry has some of the most skilled, innovative people in <em>any</em> area of technology&#8212;but they&#8217;re often stuck working with tools they can&#8217;t see into, can&#8217;t customize, and can&#8217;t control.</p><p>The benefits of moving to an engineering-focused approach would be immediate:</p><ul><li><p>Security teams could create fine-grained detection and response logics much more easily, protecting their environment in ways that aren&#8217;t possible using one-size-fits-all tools.</p></li><li><p>Manual workflows and processes could be automated, freeing skilled team members to focus on higher-value tasks.</p></li><li><p>Practitioners would be better able to implement mature, proactive security practices like detection-as-code (DaC).</p></li><li><p>An organization&#8217;s security posture could be tested, empirically and regularly, with greater rigor and assurance than current solutions allow.</p></li></ul><p>Clearly, this transformation won&#8217;t be accomplished by any one company. It&#8217;s going to have to be an all-hands effort.</p><p>The good news is that forward-looking cybersecurity vendors are already making strides in the right direction. See, for example, Red Canary&#8217;s <a href="https://atomicredteam.io/">Atomic Red Team</a> for testable security, <a href="https://blog.soteria.io/detectors-as-code-b33e63baa2f0">Sublime Security&#8217;s</a> open, engineering-based approach to email security, and the MSSP <a href="https://blog.soteria.io/detectors-as-code-b33e63baa2f0">Soteria&#8217;s extensive work on DaC</a>, just to name a few.</p><p>For many of us in cybersecurity, it can be hard to hear that we need to play catch-up with IT. I&#8217;m sure that some won&#8217;t <em>want</em> to hear this message. But the sooner we, as an industry, adopt the successful practices that revolutionized IT, the better. Cybersecurity teams need the same benefits that transparency, scalability, and automation deliver to other technology professionals. Because then, instead of being hamstrung by our tools, we will be empowered by them.</p>]]></content:encoded></item><item><title><![CDATA[Does the perfect cybersecurity platform exist?]]></title><description><![CDATA[The future of cybersecurity belongs to platforms that empower practitioners to build the stack and SecOps program they need to ensure the best possible security outcomes.]]></description><link>https://www.secopsforward.com/p/does-the-perfect-cybersecurity-platform</link><guid isPermaLink="false">https://www.secopsforward.com/p/does-the-perfect-cybersecurity-platform</guid><dc:creator><![CDATA[Maxime Lamothe-Brassard]]></dc:creator><pubDate>Mon, 05 Aug 2024 17:46:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ndEu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ndEu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ndEu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ndEu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ndEu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ndEu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ndEu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3503567,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ndEu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ndEu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ndEu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ndEu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7cf7853-b0e4-41de-955a-c1848cce08f9_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Some proponents of cybersecurity platformization claim that an effective security platform must be built from &#8220;best-of-breed&#8221; or &#8220;best-in-class&#8221; solutions. The idea is that a perfect cybersecurity platform is possible, just as long as it comprises the correct bundle of point products. But this notion is based on an outdated understanding of security practitioners&#8217; needs&#8212;and a misguided vision for the future of our industry.</p><h1>Unpacking the &#8220;best-in-class&#8221; claim</h1><p>It&#8217;s not hard to understand why a vendor would insist that everything in their platform is &#8220;best in class.&#8221;</p><p>The case for cybersecurity platformization rests on simplifying security tooling and infrastructure. The goal is to reduce complexity, integration challenges, and costs&#8212;and deliver better security outcomes. A comprehensive platform, therefore, promises to replace many point solutions that organizations are currently using. But because of this, vendors feel compelled to reassure potential adopters that they won&#8217;t be sacrificing capabilities.</p><p>For example, Lee Klarich, Chief Product Officer at Palo Alto Networks (PANW), a major advocate of security platformization, <a href="https://www.fool.com/earnings/call-transcripts/2023/08/20/palo-alto-networks-panw-q4-2023-earnings-call-tran/">recently told investors</a>:</p><blockquote><p>Prior attempts to [build a comprehensive security platform] generally required a tradeoff for the customer&#8230;the capabilities that were delivered on their attempts to do a platform were not industry-leading. And so, the customer had to make a tradeoff between&#8230;worse capabilities, but in one place, or best-in-class capabilities. And that&#8217;s a hard tradeoff in cybersecurity.&nbsp;That is one thing that we&#8217;re not asking our customers to do. We&#8217;re making sure that everything we do is industry-leading on its own.</p></blockquote><p>CEO Nikesh Arora has made similar remarks:</p><blockquote><p>What we want is best-of-breed products, so we decided we&#8217;re going to do both. We&#8217;re going to have phenomenal success in best-of-breed categories. In addition, we&#8217;re going to make sure our best-of-breed products were integrated.</p></blockquote><p>The implication seems to be that if a vendor assembles a platform from the best SIEM solution it can acquire, the very best EDR tool, the best automation products, etc., then customers will get something like the platonic ideal of a security platform.</p><p>But despite the ostensible newness, this approach betrays a fundamentally conservative view of the security industry.</p><p>For Klarich and Arora, there&#8217;s an unspoken assumption at work here: Security teams must get the capabilities they need from a product&#8212;ideally, one with the right or &#8220;best&#8221; set of features.</p><p>But this is nothing new at all. Whether the capabilities come from multiple point tools, or from a platform made up of acquired, repackaged, and bundled &#8220;best-of-breed&#8221; security products, the basic model is the same. You buy a product. You get features that give you capabilities.</p><h1>Product features != capabilities</h1><p>LimaCharlie was founded to challenge this assumption. We began with a simple question: What if core cybersecurity capabilities and infrastructure could be delivered, <em>not</em> as features of some vendor&#8217;s product, but directly through a public cloud-like environment instead?</p><p>The SecOps Cloud Platform (SCP) is the realization of this vision. It gives security teams capabilities in the same way that AWS or GCP does for IT: as interoperable, cloud-native primitives, available on-demand and priced pay-per-use.</p><p>Think, for example, of the capabilities currently offered by security information and event management (SIEM) products. SIEMs ingest, standardize, and centralize log and other telemetry data; they enable real-time monitoring and coordination of event information; and so on.</p><p>But these capabilities don&#8217;t <em>have</em> to be delivered as product features. It&#8217;s perfectly possible to provide those same capabilities directly and abstractly*&#8212;*which is precisely what the SecOps Cloud Platform does. The SCP makes it possible to ingest logs and file types from any source, standardize all telemetry data to a common JSON format, and run everything through a detection, automation, and response engine for correlation, analysis, and alerting. The kind of mature, well-integrated capabilities that were once only obtainable through SIEM products are now available via a public cloud for security.</p><p>This change offers enormous benefits. Because it is a public cloud, the SCP enables security teams to utilize platform capabilities as much or as little as they want, and in exactly the way that they want. They also avoid the downsides of legacy security products like integration difficulties, vendor lock-in, rigid long-term contracts, and unpredictable costs.</p><p>In the case of SIEM-like capabilities, this means users can reduce reliance on one of their highest-cost tools, customize event management workflows more flexibly than ever before, and take unprecedented control of their security infrastructure.</p><p>The SCP offers similar benefits across the spectrum of security operations. Capabilities that any SOC or MSSP would require for endpoint detection and response, historical threat hunting, observability, security automation, and more are now available through a unified public cloud platform that integrates seamlessly with the rest of the stack.</p><p>In short, although PANW and others say that they&#8217;re building security platforms, there&#8217;s a massive difference between their approach and the cloud provider model that the SCP embraces.</p><h1>Practitioners over products</h1><p>There are many ways to describe the difference between the SecOps Cloud Platform and the version of platformization pushed by traditional product vendors. But the most essential is this: The SCP prioritizes empowering security practitioners rather than the products they use.</p><p>Given the challenges facing security teams, we believe that this approach is the only one that makes sense.</p><p>Nearly everyone working in cybersecurity acknowledges that solution sprawl is a serious issue; feels that tooling and infrastructure have become complex to the point of unmanageability. But there&#8217;s a good reason for all of that complexity. Modern security operations <em>are</em> inherently complex. Organizations all have different security needs, and those needs are constantly changing and evolving. There is no &#8220;best&#8221; product&#8212;or suite of products&#8212;that will fix that problem. The future of security lies in human intelligence, automation, and customization, not in any one vendor&#8217;s product.</p><p>Platform vendors are correct when they say that simplification and consolidation are necessary. But they&#8217;re mistaken if they think a bundle of point solutions masquerading as a platform can ever accomplish that&#8212;let alone meet the bigger challenges in our industry.</p><p>The way forward is to give security teams direct access to mature, integrated capabilities, allowing them to fully operationalize their knowledge and expertise.</p><p>The perfect cybersecurity platform doesn&#8217;t exist. But not all platforms are created equal. The future of cybersecurity belongs to platforms that empower practitioners to build the stack and SecOps program they need to ensure the best possible security outcomes.</p>]]></content:encoded></item><item><title><![CDATA[Buy, build—or a better option?]]></title><description><![CDATA[Many cybersecurity teams struggle with a common question: Do we buy security tools and infrastructure from a vendor, or build what we need in-house?]]></description><link>https://www.secopsforward.com/p/buy-build-or-a-better-option</link><guid isPermaLink="false">https://www.secopsforward.com/p/buy-build-or-a-better-option</guid><dc:creator><![CDATA[Maxime Lamothe-Brassard]]></dc:creator><pubDate>Mon, 15 Jul 2024 17:38:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3GPH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3GPH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3GPH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!3GPH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!3GPH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!3GPH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3GPH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png" width="728" height="416" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:2919592,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3GPH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!3GPH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!3GPH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!3GPH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36aed711-01b8-4de1-9ab4-277a53119c5c_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>How cybersecurity can move beyond an old dilemma</h2><p>Many cybersecurity teams struggle with a common question: Do we buy security tools and infrastructure from a vendor, or build what we need in-house? But what&#8217;s often overlooked is that this issue has <em>already</em> been solved in many other areas of general tech&#8212;with our industry lagging behind.</p><h3>The buy&#8211;build conundrum in cybersecurity</h3><p>Security practitioners need high-quality tooling and infrastructure. Until now, there have only been two real ways to meet this need&#8212;each with advantages and disadvantages.</p><p>Organizations that <strong>buy</strong> security solutions get:</p><ul><li><p>Robust, proven technologies (+)</p></li><li><p>Less development and maintenance work (+)</p></li><li><p>Scalable solutions and workflows (+)</p></li></ul><p>But they must contend with:</p><ul><li><p>Hard-to-customize solutions, making tailored implementations difficult (-)</p></li><li><p>Black-box tools that make it impossible to achieve <a href="https://www.pivotpointsecurity.com/podcasts/ep80-maxime-lamothe-brassard-the-aws-approach-to-provable-security/">provable security</a> (-)</p></li><li><p>Increased costs and vendor lock-in (-)</p></li></ul><p>In short, though the quality of purchased solutions is generally sound, this route carries serious operational and business risks. Lack of control over the stack places limitations on an organization&#8217;s security operations and internal workflows. And over time, the total cost of ownership (TCO) of vendor-supplied tools can become excessive. For managed security service providers and startups, infrastructure costs may even threaten profitability.</p><p>For this reason, many security teams opt to <strong>build</strong> some capabilities internally (whether that means assembling what they need from open-source components or literally coding custom solutions themselves).</p><p>This approach offers undeniable benefits:</p><ul><li><p>Full control of and ownership over mission-critical solutions (+)</p></li><li><p>The ability to customize stack, operations, and workflows for optimal security outcomes (+)</p></li><li><p>Cost savings and access to capabilities that might otherwise be unobtainable (+)</p></li></ul><p>But the trade-offs here can be significant:</p><ul><li><p>Skilled team members must spend substantial time and effort on building solutions (-)</p></li><li><p>The hidden, long-term cost of ongoing infrastructure maintenance (-)</p></li><li><p>Increased complexity in the stack and problems integrating with other tools (-)</p></li></ul><p>Thus, while the savings and control are attractive at first, this approach carries other kinds of costs over time. Teams overwhelmed by the challenges of maintaining in-house tools may lose focus on security operations. <a href="https://limacharlie.io/blog/mdr-firm-saves-100k-per-year-with-limacharlie">Managed security services providers</a> frequently encounter problems when they try to scale a business built on a DIY stack.</p><p>Often, there is no clear right answer to the buy or build dilemma, and security leaders may feel forced to pick the &#8220;least bad&#8221; alternative. And that&#8217;s why it&#8217;s time for a better option.</p><h3>The public cloud for cybersecurity</h3><p>The irony of our situation is that these problems have already been solved in other areas of technology. For example, consider the case of a large retail pharmacy chain looking to deploy a prescription provisioning and point-of-sale system. In the past, they would either have had to conduct an extensive search to identify a vendor with an ideal solution, or hunt for an open-source stack to meet their needs. But today, they would simply assemble the required compute, storage, queueing, databasing, and so on from public-cloud components offered by AWS, Microsoft Azure, Google Cloud Platform, or another provider.</p><p>We take this for granted these days. The public cloud model has been <em>so</em> successful that some of the problems that used to face engineering, development, and IT groups now seem almost quaint. For our colleagues in other technical fields, there&#8217;s no longer a need to buy certain solutions outright, or build them independently, because <em>core IT capabilities</em> <em>already exist on demand</em>&#8212;ready and waiting to be consumed, with pricing based on usage.</p><p>LimaCharlie&#8217;s <a href="https://limacharlie.io/blog/why-does-limacharlie-exist">basic premise</a> is that this is exactly what&#8217;s missing in cybersecurity. The SecOps Cloud Platform (SCP) is our vision for the future of the industry.</p><h3>The meaning of &#8220;core capabilities on demand&#8221;</h3><p>To be clear, when we talk about access to core cybersecurity capabilities, we&#8217;re not implying that there is a one-size-fits-all solution that can meet all needs, or suggesting a rip-and-replace approach to security infrastructure.</p><p>We&#8217;re making a far more modest claim: Namely, that the foundational capabilities required to secure and monitor any organization are now well-understood enough to be delivered via a public cloud. This would include things like deploying bi-directional endpoint capabilities through a multiplatform agent; alerting and correlating log telemetry regardless of source; automating real-time analysis and response in any environment; observing, transforming, and routing telemetry data regardless of source or destination; and more.</p><p>Note that these are not esoteric capabilities. In 2024, they&#8217;re simply table stakes for modern SecOps. There&#8217;s no need for teams to reinvent the wheel by attempting to develop them independently. Nor is there any reason to rely on legacy vendors when these capabilities are available as mature, integrated, cloud-native primitives&#8212;on-demand, API-first, and pay-per-use.</p><h3>Benefits of the SecOps Cloud Platform</h3><p>When foundational security capabilities are made available through a SecOps Cloud Platform, tremendous benefits emerge:</p><ul><li><p>Teams can assemble the stack they need, customize it as much as they want, and manage everything from a single, scalable, well-integrated platform&#8212;without getting bogged down in development work and infrastructure maintenance.</p></li><li><p>Organizations of every size, from large enterprises to managed security service providers and startups, can eliminate tool sprawl, free themselves from vendor lock-in, and reduce costs.</p></li><li><p>Pay-per-use pricing makes it possible to scale usage up or down as needed. There are no mandatory long-term contracts, fixed minimums, or capacity planning as there are with traditional vendors.</p></li><li><p>Modular, on-demand capabilities allow organizations to use only those elements of the platform that they truly need (or that they are currently ready for). The SecOps Public Cloud can be adapted and integrated into a team&#8217;s operations safely and gradually.</p></li><li><p>MSSPs and MDRs are able to work with mature tools that they control&#8212;and are not forced to rely on vendors who are also competitors.</p></li><li><p>Security teams in every kind of organization can focus on their true mission: improving security operations and delivering better security outcomes for stakeholders.</p></li></ul><h3>The future of our industry</h3><p>We believe that cybersecurity practitioners will one day join their peers in IT and reap the benefits of the public cloud model. This is still an idealistic vision&#8212;but one that&#8217;s gaining momentum with each passing year.</p>]]></content:encoded></item><item><title><![CDATA[Why Start LimaCharlie]]></title><description><![CDATA[The problem with the current cybersecurity vendor ecosystem]]></description><link>https://www.secopsforward.com/p/why-start-limacharlie</link><guid isPermaLink="false">https://www.secopsforward.com/p/why-start-limacharlie</guid><dc:creator><![CDATA[Maxime Lamothe-Brassard]]></dc:creator><pubDate>Thu, 18 Apr 2024 14:51:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Jzrq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jzrq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jzrq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!Jzrq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!Jzrq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!Jzrq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jzrq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1826648,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jzrq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!Jzrq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!Jzrq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!Jzrq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec1fa37d-999c-416d-ada7-52a5f18b98cc_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>I recently had an enlightening chat with <a href="https://www.linkedin.com/in/tylershields/?ref=better-secops.ghost.io">Tyler Shields</a>, and a question I've often been asked came up: "Why did you start LimaCharlie?" Though I've always had an answer, only recently did I realize it's not just about "what tools did I wish I had", but also what we want to leave for the next generation.</p><p>As someone who's been in the security industry for a long time, starting in Intelligence, then Crowdstrike, Google, and Chronicle, I've seen history repeat itself. I've witnessed old solutions get rebranded as new and the same patterns keep repeating.</p><p>While some patterns are great, like new people learning about security and picking up the mission, others aren't as nice. Truthfully, they're patterns the security industry shouldn't be proud of.</p><p>So, when I think about my time in security and look to the future, I ask myself: What do I want the next generation of security professionals to live with? How do I want them to think about the challenges they're facing?</p><p>One answer is clear to me: I want them to live in a world where they're enabled by tools to create new solutions. I don't want them to feel like they're fire-fighting from one technology to the next, trusting on blind faith in an all-mighty vendor.</p><p>I refuse to let a future where security professionals have a "choice" between three vendors, each with their opaque walled gardens, claiming to stop breaches better than the next.</p><p>What I want for the future generation is simple and has been done elsewhere. What I want for them is not rocket science. We just haven't done it in security yet.</p><p>Throughout my career, I've wanted incredibly easy access to powerful tools that put me in the driver's seat, and now that I'm in a position to impact the future, that's what I want to the next generation.</p><p>Our cousins in the general tech world have had this for a while now &#8212; it's called a Cloud Provider. These Cloud Providers have opened up a world of powerful solutions, innovation, and velocity that the tech world could never have had if it had remained subservient to "boxed software" vendors. These Cloud Providers give tools ("primitives") to professionals, get out of the way and don't force their users into complex bundles. A Cloud Provider gives you the keys, you're not just a passenger.</p><p>A Cloud Provider for Cybersecurity might sound weird at first, but it makes so much sense that I haven't been able to shake it off since starting LimaCharlie.</p><p>That is why I started LimaCharlie. Every time I get tired at the end of the day, I think of that alternative future and refuse to let the next generation down.</p><p></p>]]></content:encoded></item></channel></rss>