Advertisement · 728 × 90

Posts by Lenny Zeltser

When an AI tool recommends an action and an employee carries it out, audit logs capture a legitimate human decision. The AI's role disappears. Addressing that blind spot takes more than awareness training. https://zeltser.com/ai-influence-awareness-training

3 days ago 2 2 0 0

A security product becomes harder to displace when each persona finds value in their own view, from SOC analysts to execs to AI agents. Designing for all of them is a stronger advantage than a longer feature list. https://zeltser.com/designing-for-humans-and-ai

3 days ago 0 0 0 0

We invest hours analyzing a security risk, and that effort makes us overvalue the recommendation. An executive who hasn't shared that analysis weighs the same risk differently, and they might be right. https://zeltser.com/rejected-security-recommendations

4 days ago 1 0 0 0
Preview
The Eternal Cycle of Cybersecurity The fight between cyber attackers and defenders resembles an ecological cycle between predator and prey—the goal is equilibrium, not victory. Being complacent is risky because maintaining balance requ...

Are we winning the fight against cyber attackers? It's the wrong question. Framing the attacker-defender dynamic as a war fuels hype and leads to the wrong investments.

1 week ago 2 1 0 0
Preview
Scope Security Assessments for Attack Paths, Not Org Charts When assessment scope follows organizational lines, gaps open where team boundaries meet and real attackers don't stop. Pulling adjacent teams into the scoping conversation and following attack logic ...

We scope security assessments along organizational lines, but attackers don't stop where one team's budget ends. Following attack logic instead of org charts closes the gaps.

2 weeks ago 1 0 0 0

Ooh, that would be an interesting one, thanks for the idea.

3 weeks ago 0 0 0 0
Preview
Understand the Reality of the SOC 2 Checkbox SOC 2 standardized security reporting, but it left the vendor in control of the system boundary and auditor selection. Understanding that structural gap helps vendors and buyers get the most value fro...

Love them or hate them, SOC 2 reports have become table stakes for SaaS deals. But the framework leaves the vendor in control of the system boundary and auditor selection, which means the reports vary drastically in rigor.

3 weeks ago 1 0 0 0
Advertisement
Preview
Most Cybersecurity Products Aren't Platforms and It's OK The test for a genuine platform is whether each new addition makes everything else more valuable, not just whether products share a brand or console. Recognizing which dynamic the architecture support...

Is a security product company building a true platform or a suite? The distinction clarifies where to invest, how to measure progress, and what competitive advantage to pursue. Here's my guidance for deciding which approach is best, including a look at CrowdStrike, Okta, and Palo Alto Networks.

3 weeks ago 4 1 2 0
Preview
Build Better Security Product Strategies Using Your AI Tool Generic AI gives generic product strategy advice. With my domain-specific frameworks and MCP server, you can use your AI agent to develop strategies, stress-test plans against practitioner criteria, a...

The profiles came from my product strategy frameworks and MCP server, not generic AI. You can stress-test your own security product strategy the same way:

4 weeks ago 2 1 0 0
RSAC 2026 Innovation Sandbox: Finalist Analysis - Lenny Zeltser Transforming security ideas into business outcomes.

Who'll win this year's RSAC Innovation Sandbox? I used my custom AI framework to score each finalist's market readiness across 8 dimensions and built detailed profiles. 4 companies clustered clearly ahead. See if you agree:

4 weeks ago 0 0 1 0
Preview
Competing in Endpoint Security: A Guide for Startups There are areas where endpoint security startups can build viable, useful products, but those openings shift as adjacent categories converge and incumbents absorb new capabilities. Founders, buyers, a...

My guide for endpoint security startups is out now. The path between competing against entrenched platforms and becoming a feature they bundle is narrow.

I got to know this space at Minerva Labs (now part of Rapid7), but much has changed since then.

1 month ago 1 0 0 0
Preview
Building Security Products for SMBs Building security products for SMBs differs from enterprise markets in distribution, pricing, and product design. Vendors who merely repackage enterprise solutions at a lower price point struggle, whi...

My new guide on building security products for SMBs. The go-to-market has shifted heavily toward MSPs and VARs, channel concentration creates real dependency risk, and AI readiness among MSPs is lower than the hype suggests.

1 month ago 1 0 0 0
Preview
What Being a CISO Taught Me About Security Leadership A four-point framework to succeeding as a CISO, based on my experiences of building and leading a security program at a high-growth company. It shows how to focus on the defender's advantage and escap...

I published a 4-point approach for succeeding as a CISO, based on my experiences building and leading a security program at a high-growth company. It shows how to focus on the defender's advantage and escape the unending cycle of reacting to vulnerabilities and responding to attackers' advances:

1 month ago 5 0 3 0
Preview
A Practitioner's Guide for Creating Cybersecurity Products Strong technology alone doesn't make a successful security product. This guide presents the strategic questions that security product managers and startup founders should answer early, covering market...

Good tech alone doesn't make a successful security product. I created a guide covering the strategic questions founders and product managers should answer early, drawing on my experience as both a CISO and a product manager.

1 month ago 1 0 0 0
Preview
From Chief Opinion Officer to Action-Taker Security leaders who only assess risks and express concerns operate as Chief Opinion Officers rather than change agents. Delivering outcomes requires agreeing with colleagues on what's real, deciding ...

Security leaders are often trapped in endless assessments and opinion-giving without driving actual change. Staying busy with spreadsheets, dashboards, and emails doesn't move the organization forward.

Here's how we can break out of the "Chief Opinion Officer" mode:

1 month ago 4 2 0 0
Advertisement
Preview
REMnux v8 brings AI integration to the Linux malware analysis toolkit - Help Net Security REMnux, a specialized Linux distribution for malware analysis, has released version 8 with a rebuilt platform based on Ubuntu 24.04.

REMnux v8 brings AI integration to the Linux malware analysis toolkit

📖 Read more: www.helpnetsecurity.com/2026/02/17/r...

#cybersecurity #cybersecuritynews #Linux #malwareanalysis #opensource @lennyzeltser.com

1 month ago 1 1 0 0
Preview
Free Toolkits and Frameworks for Malware Analysis Open-source sandbox platforms, analysis environments, and AI-assisted tools let you build your own malware analysis capability without commercial licenses. Options include CAPEv2, DRAKVUF Sandbox, REM...

Which malware analysis toolkits and frameworks should you consider including in your workflow? Here's my overview:

2 months ago 3 1 0 0
Preview
Using AI Agents to Analyze Malware on REMnux To analyze malware effectively, AI agents need practitioners' expertise and access to the analysis tools. The REMnux MCP server provides both, connecting AI to 200+ tools on REMnux with guidance on wh...

The new REMnux MCP server connects AI agents to 200+ malware analysis tools on REMnux. I was surprised at the depth of investigation it delivers. Most of my time went into capturing how I approach the analysis and providing guidance to AI at the right time, so it can think and adapt as it works.

2 months ago 8 4 0 1
Preview
The Chief Insecurity Officer What if the CISO's job isn't to maximize security but to calibrate the right amount of insecurity? Reframing the role this way turns security leaders from obstacles into enablers of business velocity.

What if the CISO's real job is calibrating the right amount of insecurity? Frame the role around that and you become an enabler, not an obstacle. The acronym still works.

2 months ago 2 0 0 0
Preview
Interactive Replays of Conversations: A New Tool Conversation replays add an engaging dimension to training materials and docs. Save the conversation and your annotations in a data file, then use my tool to generate a self-contained HTML player you ...

I released a free tool to generate animated, annotated replays of text conversations, so you can embed them in articles, training, and docs. For example, it's a nice way to explain influence tactics of a social engineering scam. See it in action:

2 months ago 4 0 1 0
Preview
Write Good Incident Response Reports Using Your AI Tool I released an MCP server to give your AI expertise to write good IR reports from raw notes or to get constructive feedback on existing content. You can replicate my approach to codify your own experti...

How to give AI raw incident notes and get a solid draft of an IR report? Now you can point your AI tool at my MCP server for guidance based on proven writing principles. Your data isn't shared with my server; it only provides guidance.

2 months ago 1 0 0 0
Preview
Publishing Your Website Content to AI Assistants When people ask AI assistants about your product or project, they often get outdated information. Here's how to publish your static website content directly to AI tools using Cloudflare Workers and th...

I released a tool for making your website or docs easily available to AI assistants via an MCP server. This helps ensure people's AI tooling can access the latest details at the right time. For instance, this is how REMnux users now can get info about its malware analysis tools.

3 months ago 1 2 0 0
Advertisement
Amplifying Success: How Security and Privacy Teams Break Barriers Together
Amplifying Success: How Security and Privacy Teams Break Barriers Together YouTube video by RSA Conference

And here's our video on this topic from the RSA Conference: www.youtube.com/watch?v=Y3Vl...

9 months ago 0 0 0 0
Preview
How Security and Privacy Teams Break Barriers Together While cybersecurity and data privacy leaders have distinct expertise, our fundamental goals are aligned. By understanding each other’s perspectives and priorities, we can support each other to stre

While cybersecurity and data privacy leaders have distinct expertise, their goals are aligned. Edy Glozman and I discussed how these functions can support each other based on our collaboration at Axonius:

zeltser.com/security-pri...

9 months ago 3 0 1 0

It was just a typo

1 year ago 0 0 1 0

😀

1 year ago 0 0 1 0
Preview
The CISO’s Midset for 2025: Outcomes, Automation, and Leadership As the year 2025 rushes forward, the responsibilities of CISOs are continuing to evolve. We increasingly recognize the importance of not just identifying risks but actively addressing them through di

Here are the key trends that cybersecurity leaders should keep in mind for our work in 2025:

1 year ago 6 0 1 0

Terrible news today about the loss of Amit Yoran. He was a larger than life figure in cybersecurity and we will be lesser without him. May his family and friends find peace.

1 year ago 53 11 2 1

Happy birthday to the unusual number of my cybersecurity friends who all have January 1st birthdays on Facebook! 🧐🧐🧐

1 year ago 8 1 0 0

For those going home to visit family this weekend:

• Samsung calls it Auto Motion Plus
• LG calls it TruMotion
• Sony calls it Motionflow
• Roku calls it Action Smoothing
• Google TV calls it Motion Enhancement
• Vizio calls it Smooth Motion Effect.

1 year ago 17695 5941 422 709
Advertisement