<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Lenny Zeltser</title><description>Builder of security products and programs. Teacher of those who run them. Cybersecurity executive, SANS Faculty Fellow, and creator of REMnux.</description><link>https://zeltser.com</link><language>en-us</language><atom:link href="https://zeltser.com/rss.xml" rel="self" type="application/rss+xml"/><item><title>How Modern Design Principles Strengthen Security</title><link>https://zeltser.com/modern-design-security</link><guid isPermaLink="true">https://zeltser.com/modern-design-security</guid><description>Unnecessary complexity makes products hard to maintain and hard to secure. Modern apps such as Cloudflare&apos;s EmDash and Tailscale show that designing for simplicity produces stronger security as a side effect.</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;Unnecessary complexity makes products hard to maintain and hard to secure. Modern apps such as Cloudflare&apos;s EmDash and Tailscale show that designing for simplicity produces stronger security as a side effect.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/modern-design-security.CEd44wl1.jpg&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;Every design choice in a product shapes what customers must configure, monitor, and maintain. When the software requires an operating system, someone must patch it. When authentication relies on passwords, someone must store, hash, rotate, and reset them. When extensions run with unrestricted system access, every extension author becomes a security dependency. Modern applications are showing how simpler designs can produce stronger security as a side effect.&lt;/p&gt;
&lt;h2&gt;Every Component Is a Liability&lt;/h2&gt;
&lt;p&gt;WordPress illustrates the pattern. 90-96% of its security issues originate in plugins, according to &lt;a href=&quot;https://patchstack.com/whitepaper/state-of-wordpress-security-in-2025/&quot;&gt;Patchstack&lt;/a&gt; and &lt;a href=&quot;https://www.wordfence.com/blog/2025/04/2024-annual-wordpress-security-report-by-wordfence/&quot;&gt;Wordfence&lt;/a&gt;. WordPress architecture gives every plugin unrestricted access to the entire system, so the extensibility that drove its adoption also made it difficult to secure. A malicious or exploited extension can affect the entire environment.&lt;/p&gt;
&lt;p&gt;Software components not only add features, but also add things the customer can misconfigure, forget to update, or leave exposed. Self-hosted databases need replication setup, backup configuration, and version upgrades. Container platforms need network policies, image scanning, and cluster maintenance. The longer that component list grows, the harder it becomes to keep up.&lt;/p&gt;
&lt;h2&gt;Design for Simplicity, Get Security&lt;/h2&gt;
&lt;p&gt;Cloudflare&apos;s &lt;a href=&quot;https://blog.cloudflare.com/emdash-wordpress/&quot;&gt;EmDash&lt;/a&gt; shows how modern product design can strengthen security as a side effect. They rebuilt WordPress from scratch as a serverless CMS. The app&apos;s architecture made it simpler to operate and harder to attack:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Eliminate customer-managed infrastructure.&lt;/strong&gt; EmDash has no PHP runtime, no customer-managed operating system, no long-running web server, and no customer-managed database. The application runs in lightweight sandboxes that spin up on demand and shut down when idle.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Isolate extensions and require explicit permissions.&lt;/strong&gt; Plugins run in isolated sandboxes and must declare the capabilities they need, such as &quot;read:content&quot; or &quot;email:send.&quot; A plugin that declares only content-reading capabilities can&apos;t access the network or the filesystem.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Let the underlying platform handle patching.&lt;/strong&gt; The platform provider handles patching on its own schedule, with no customer-managed OS to maintain.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;EmDash is new and unproven (as of this writing), and platform offloading creates its own vendor dependency. But its architecture shows what a simpler design can achieve.&lt;/p&gt;
&lt;p&gt;Consider another example: Traditional VPN deployments require opening a port on a firewall, standing up a server, distributing credentials, and maintaining certificates. Multi-component VPN software, such as OpenVPN, added a significant attack surface on top of that operational burden.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wireguard.com/&quot;&gt;WireGuard&lt;/a&gt; took a different approach. Rather than building a full VPN stack, it designed a tunneling protocol around radical simplicity. Its entire implementation fits in roughly 4,000 lines of kernel code, small enough for a single person to audit. It uses one fixed cryptographic suite with no cipher negotiation. Products such as &lt;a href=&quot;https://tailscale.com&quot;&gt;Tailscale&lt;/a&gt; build on WireGuard to create identity-based mesh networks. The customer maintains no server, no open ports, and no certificates to rotate.&lt;/p&gt;
&lt;h2&gt;Defaults That Win&lt;/h2&gt;
&lt;p&gt;Reducing complexity removes entire categories of risk. But the components that remain still need safe defaults, because users rarely change what ships out of the box.&lt;/p&gt;
&lt;p&gt;The most successful secure defaults don&apos;t feel like security at all. When Microsoft &lt;a href=&quot;https://www.microsoft.com/en-us/security/blog/2025/05/01/pushing-passkeys-forward-microsofts-latest-updates-for-simpler-safer-sign-ins/&quot;&gt;made passkeys the default&lt;/a&gt; for new accounts, passkey sign-ins grew by 120%. The FIDO Alliance reports a &lt;a href=&quot;https://fidoalliance.org/fido-alliance-launches-passkey-index-revealing-significant-passkey-uptake-and-business-benefits/&quot;&gt;93% success rate&lt;/a&gt; for passkey logins compared to 63% for traditional methods. Passkeys are faster and easier to use than passwords for many people, and they happen to be phishing-resistant.&lt;/p&gt;
&lt;p&gt;Misconfigured cloud storage buckets were among the most common sources of data breaches before AWS &lt;a href=&quot;https://aws.amazon.com/blogs/aws/heads-up-amazon-s3-security-changes-are-coming-in-april-of-2023/&quot;&gt;made Block Public Access the default&lt;/a&gt; for all new S3 buckets in 2023. The feature had existed since 2018, but it required customers to enable it. Changing the default eliminated an entire category of exposure.&lt;/p&gt;
&lt;p&gt;EmDash applies the same deny-by-default approach to extensions, and even administrators who make no changes still get a secure configuration.&lt;/p&gt;
&lt;h2&gt;Where These Principles Lead&lt;/h2&gt;
&lt;p&gt;EmDash, WireGuard, and Tailscale all followed modern design principles: They minimized components, offloaded infrastructure to platforms, and defaulted to least privilege. The security improvements emerged from those architectural decisions, not from adding controls on top.&lt;/p&gt;
&lt;p&gt;For builders designing new products or rearchitecting existing ones, the following principles can guide the work. For existing apps, each component simplified, offloaded, or removed is one fewer thing to patch, configure, and directly defend.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Review your component list.&lt;/strong&gt; For each component, whether the runtime, database, authentication system, or extensibility model, ask whether the product truly needs it. Could a platform service replace it, and does that shift reduce your overall risk? Could a different architecture eliminate it entirely?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Default to the safest configuration.&lt;/strong&gt; If a user installs your product and makes no changes, it should be in a secure state. Every permission, integration, and capability should require an explicit opt-in rather than an opt-out.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Measure what you eliminated, not just what you added.&lt;/strong&gt; A well-designed product makes security problems structurally impossible. If your customers configure fewer components, rotate fewer credentials, and patch fewer systems, you&apos;ve strengthened security before adding any controls.&lt;/p&gt;
&lt;p&gt;The design decisions that reduce what customers must manage also reduce what attackers can target. Builders who design for simplicity will find they&apos;ve already designed for security.&lt;/p&gt;
</content:encoded></item><item><title>When Executives Reject Your Security Recommendation</title><link>https://zeltser.com/rejected-security-recommendations</link><guid isPermaLink="true">https://zeltser.com/rejected-security-recommendations</guid><description>A rejected security recommendation feels personal, but it often reflects competing demands the security team doesn&apos;t fully see. Knowing how to act on that reality helps the CISO become someone the business trusts with its priorities.</description><pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;A rejected security recommendation feels personal, but it often reflects competing demands the security team doesn&apos;t fully see. Knowing how to act on that reality helps the CISO become someone the business trusts with its priorities.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/rejected-security-recommendations.CVQ4wqW4.jpg&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;As cybersecurity leaders, we&apos;ve inevitably felt frustrated when executives didn&apos;t act on our recommendation. The instinct is to conclude that leadership doesn&apos;t take security seriously, but that take is usually counterproductive.&lt;/p&gt;
&lt;p&gt;Executive managers are weighing cyber risks against revenue targets, hiring plans, product launches, and dozens of competing priorities. Sometimes they&apos;re right to choose differently, and the rejection itself can sharpen our thinking by forcing a more targeted approach. To &lt;a href=&quot;https://zeltser.com/chief-opinion-officer-to-action-taker&quot;&gt;move past merely advising&lt;/a&gt;, we need to understand why they disagree and find ways to frame our perspective on their terms.&lt;/p&gt;
&lt;h2&gt;Disagreements Shouldn&apos;t Surprise Us&lt;/h2&gt;
&lt;p&gt;That colleagues disagree with us shouldn&apos;t be a surprise, but it often is. We invest time and energy in identifying, prioritizing, and explaining risks, and that effort fosters a sense of ownership. Behavioral economists call it the &lt;a href=&quot;https://zeltser.com/endowment-effect-infosec&quot;&gt;endowment effect&lt;/a&gt;, which is the tendency to overvalue what we possess. An executive who hasn&apos;t spent hours analyzing the same security issue doesn&apos;t share that sense of ownership. As a result, the same risk might weigh less in their mind than in ours.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://zeltser.com/choice-fatigue-and-security-decisions&quot;&gt;Decision fatigue&lt;/a&gt; amplifies the problem. Executives make hundreds of resource allocation decisions in a given week. When our risk perspective reaches them, they may be operating with diminished attention. The status quo wins, not because it&apos;s the right call, but because it requires the least effort.&lt;/p&gt;
&lt;p&gt;Traditional justifications for security spending often fall short, even when executives are paying full attention. As &lt;a href=&quot;https://www.philvenables.com/post/incentives-for-security-flipping-the-script&quot;&gt;Phil Venables has explained&lt;/a&gt;, arguments based on loss avoidance, reputational risk, and return on security investment don&apos;t justify the accumulated costs of the mitigations we propose. Executives have learned this through experience, having watched companies suffer high-profile breaches and recover. Many have drawn their own conclusions about how severe the consequences really are and have grown skeptical of our severity ratings.&lt;/p&gt;
&lt;p&gt;None of this means the disagreeing executive made the wrong call, assuming they made an informed decision. They&apos;re evaluating a broader set of tradeoffs than we see from the security team&apos;s perspective. If the problem isn&apos;t that they failed to understand us, repeating the same arguments louder won&apos;t help. We need to change how we respond to disagreement.&lt;/p&gt;
&lt;h2&gt;How We Make Rejection Worse&lt;/h2&gt;
&lt;p&gt;When executives reject a recommendation, we tend to make predictable mistakes that weaken our ability to influence:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We take it personally.&lt;/strong&gt; We interpret the rejection as the organization not valuing security. In most cases, the decision reflects resource allocation priorities, similar to deprioritizing a feature or deferring a hire. Other functions in the company face such constraints, too.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We double down with more data.&lt;/strong&gt; We respond to &quot;no&quot; by piling on more proof that the risk is real. If we did our best with the original explanation, additional details are unlikely to change the executive&apos;s decision. They probably already agreed that the risk exists and decided that the mitigation wasn&apos;t worth pursuing right now.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We don&apos;t ask why.&lt;/strong&gt; We walk away frustrated instead of asking what would need to change to get a different answer. &lt;a href=&quot;https://zeltser.com/how-to-ask-questions-to-succeed-with-security-projects&quot;&gt;The right question&lt;/a&gt;, asked genuinely, can reveal the constraints we didn&apos;t see and open persuasion paths we didn&apos;t consider, possibly for a later conversation.&lt;/p&gt;
&lt;p&gt;These reactions assume the problem sits with the executive. None starts by examining our own framing. If they understood the risk and chose differently, we should either accept the decision or return to it with a different approach.&lt;/p&gt;
&lt;h2&gt;A Slide Deck Isn&apos;t a Handoff&lt;/h2&gt;
&lt;p&gt;Security governance is a &lt;a href=&quot;https://zeltser.com/distribute-cybersecurity-tasks&quot;&gt;shared organizational responsibility&lt;/a&gt;, not something the CISO carries alone. But our job doesn&apos;t stop at presenting risks. As &lt;a href=&quot;https://www.linkedin.com/posts/allanalford_informationsecurity-cybersecurity-ciso-activity-7444726446117257216-LhFZ/&quot;&gt;Allan Alford has argued&lt;/a&gt;, &quot;I presented the numbers and leadership decided&quot; is where our work starts, not where it ends. If the message didn&apos;t land, we adjust the framing and try again.&lt;/p&gt;
&lt;p&gt;Allan also pointed out that we decide which risks reach the executives&apos; desks and which ones we handle quietly. When we &quot;walk into a budget meeting requesting funding for three initiatives and stay silent on four others,&quot; we implicitly make a risk acceptance decision. We should be deliberate about what we defer and transparent about why.&lt;/p&gt;
&lt;p&gt;A genuine handoff requires explicit terms, not a checkbox on a slide deck. It sounds like &quot;We&apos;ll accept this for six months, revisit in Q3, and add monitoring in the meantime.&quot; That specificity creates a shared commitment that both sides can track.&lt;/p&gt;
&lt;p&gt;Even after that handoff, our work continues as part of regular governance. Circumstances change, so we monitor whether the original risk decision still holds through periodic risk reviews. The executive takes input from many sources, so we continue &lt;a href=&quot;https://zeltser.com/cisos-and-collaboration&quot;&gt;shaping the conversation through allies&lt;/a&gt; and timing. And we build resilience that makes it easier for the business to accept risks. Defenses, guardrails, and buffers &lt;a href=&quot;https://zeltser.com/chief-insecurity-officer&quot;&gt;absorb tolerable insecurity&lt;/a&gt; so the organization can move forward.&lt;/p&gt;
&lt;h2&gt;Make It About What They Already Want&lt;/h2&gt;
&lt;p&gt;Understanding why executives said no reveals what might make them say yes. The most effective way to earn that yes is to &lt;a href=&quot;https://zeltser.com/shift-your-mindset-from-conflict-to-collaboration-to-succeed-in-security&quot;&gt;connect our recommendation to something the business already wants&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Offer options, not ultimatums.&lt;/strong&gt; An executive who says no to a $1M project might say yes to a $100K first step. That first step addresses the highest-priority exposure, &lt;a href=&quot;https://zeltser.com/vulnerability-management-hamster-wheel&quot;&gt;prioritized by business context&lt;/a&gt;. Presenting &lt;a href=&quot;https://zeltser.com/alternatives-in-it-risk-negotiations&quot;&gt;tiered alternatives&lt;/a&gt; gives them a way to say yes to something rather than no to everything.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Build allies before you need them.&lt;/strong&gt; A recommendation that arrives with the CFO&apos;s or CTO&apos;s support lands differently than one from security alone. Invest in &lt;a href=&quot;https://zeltser.com/cisos-and-collaboration&quot;&gt;cross-functional collaboration&lt;/a&gt; before the critical ask. &lt;a href=&quot;https://www.philvenables.com/post/organizational-politics-the-security-program&quot;&gt;Phil Venables has observed&lt;/a&gt; that formal committees confirm decisions, not make them. Allies shape those decisions before the meeting starts. He calls this building a &quot;base of support&quot; by being useful beyond the immediate boundaries of the security role.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Connect to outcomes they already measure.&lt;/strong&gt; When security solves a problem another team already has, the ask sells itself. Automating manual access provisioning saves the dev team 10 hours per sprint, for example. &lt;a href=&quot;https://zeltser.com/soc2-checkbox-reality&quot;&gt;Achieving SOC 2&lt;/a&gt; unblocks enterprise deals stuck in procurement. Frame the expense as unblocking revenue or velocity, not reducing risk.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Make the cost of inaction specific to their world.&lt;/strong&gt; A concrete scenario tied to the business is more persuasive than generalized breach statistics. What &lt;a href=&quot;https://zeltser.com/fear-vs-anxiety-in-cybersecurity&quot;&gt;separates specificity from FUD&lt;/a&gt; is a named customer, a dated deadline, or a measurable outcome. &quot;If customer X asks about this in their next security review and we can&apos;t answer, that&apos;s a renewal risk.&quot; Understand what &lt;a href=&quot;https://zeltser.com/non-financial-currency-for-security&quot;&gt;motivates individuals&lt;/a&gt;, not just the organization.&lt;/p&gt;
&lt;h2&gt;From Opinion to Influence&lt;/h2&gt;
&lt;p&gt;When we prioritize risks and articulate them in the executive&apos;s terms, a &quot;no&quot; becomes the beginning of a conversation, not the end of one. Each conversation handled this way compounds our credibility. We stop selling security to the business and start helping the business succeed through security.&lt;/p&gt;
</content:encoded></item><item><title>Designing Security Products for Humans and AI Agents</title><link>https://zeltser.com/designing-for-humans-and-ai</link><guid isPermaLink="true">https://zeltser.com/designing-for-humans-and-ai</guid><description>AI agents are quickly joining humans as personas that use enterprise security products. Vendors who understand how to support all their users, from analysts to agents, will build products that fit how teams actually work.</description><pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;AI agents are quickly joining humans as personas that use enterprise security products. Vendors who understand how to support all their users, from analysts to agents, will build products that fit how teams actually work.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/designing-for-humans-and-ai.BsDuNVx0.jpg&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;Poor usability in a security product often signals that the vendor doesn&apos;t understand how their customers actually work. The products that win adoption aren&apos;t necessarily the ones with the longest feature lists, but the ones that fit the team&apos;s workflow so well that users don&apos;t want to give them up.&lt;/p&gt;
&lt;p&gt;AI not only makes this gap harder to spot but also requires special attention. Coding assistants produce polished front-ends that make all enterprise products look increasingly alike, so responsive layouts and clean navigation no longer differentiate them. Instead, product managers need to understand how every persona uses the product, including AI agents.&lt;/p&gt;
&lt;h2&gt;The Next User Isn&apos;t Human&lt;/h2&gt;
&lt;p&gt;AI agents are becoming a critical interface for enterprise products. Most products started as closed, self-contained tools, but market pressure forced vendors to add APIs for customer integrations. Now agents are the next layer, handling configuration, oversight, action, and output consumption.&lt;/p&gt;
&lt;p&gt;Products that built their entire interaction model around a visual GUI now struggle to support AI agents. Before AI, vendors created drag-and-drop canvases so enterprise users could design automations without writing code. The approach caught on quickly, but users found the canvases complex and time-consuming. When AI agents offered a simpler path, many users preferred describing their intent to an agent rather than dragging components across a screen. Because these products treated the canvas as the primary interface, their APIs often don&apos;t expose the full capability set.&lt;/p&gt;
&lt;p&gt;Having a REST API doesn&apos;t make a product agent-friendly. &lt;a href=&quot;https://workos.com/blog/mcp-vs-rest&quot;&gt;REST&apos;s small, composable endpoints aren&apos;t great for AI agents&lt;/a&gt;. Each endpoint&apos;s schema consumes tokens in the agent&apos;s context window before the agent does any work, and responses return every field, whether the agent needs them or not. Simple tasks require multiple sequential calls, and the agent must pass context between each one.&lt;/p&gt;
&lt;p&gt;Products that serve agents well provide dedicated agent interfaces, not just repurposed APIs. Cloudflare&apos;s &lt;a href=&quot;https://blog.cloudflare.com/emdash-wordpress/&quot;&gt;EmDash CMS&lt;/a&gt;, for example, ships with MCP, CLI, and LLM-ready documentation, enabling AI agents to manage content alongside human editors.&lt;/p&gt;
&lt;h2&gt;The Right Interface for Each Persona&lt;/h2&gt;
&lt;p&gt;Products that present the right interface to each persona win adoption that spreads across the organization. A security exec needs a different view than a SOC analyst, who needs a different workflow than a GRC manager. AI agents are another persona in this mix, with their own requirements for structured data and efficient access. When each role finds value in its own view, displacing the product means a competitor has to win over every persona at once.&lt;/p&gt;
&lt;p&gt;Getting personas right demands industry expertise, customer conversations, and product telemetry. Building usable security products starts with &lt;a href=&quot;https://zeltser.com/what-is-security-product-manager&quot;&gt;deep knowledge of who will use them and how&lt;/a&gt;. But talking to customers isn&apos;t enough on its own. Usage telemetry reveals which features users adopt, where they encounter friction, and which capabilities they ignore. That data feeds back into the product. More usage generates better telemetry, which drives better features, which drives more usage. Each cycle sharpens the product&apos;s fit with how each persona actually works.&lt;/p&gt;
&lt;h2&gt;Anticipate What Users Need Next&lt;/h2&gt;
&lt;p&gt;The best products anticipate what each user needs and present it as the default action. For human users, the interface should present the recommended next step with enough context that the user feels confident clicking &quot;OK.&quot; The user can adjust, but the default should be right most of the time.&lt;/p&gt;
&lt;p&gt;AI agents need the same anticipatory design, delivered through APIs and MCP servers. For example, the &lt;a href=&quot;https://zeltser.com/ai-malware-analysis-remnux&quot;&gt;REMnux MCP server&lt;/a&gt; guides AI agents through malware analysis. It recommends which tools to run, how to interpret output, and when to reconsider conclusions. When the MCP server detects a packed executable, it steers the agent away from tools that won&apos;t help. It recommends unpacking first.&lt;/p&gt;
&lt;h2&gt;Visibility Has to Match the Persona&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://medium.com/anton-on-security/on-trust-and-transparency-in-detection-52ae6a29afdf&quot;&gt;Anton Chuvakin and Oliver Rochford found&lt;/a&gt; that even a few visible false positives can erode trust in correct detections. When products surface every detail behind every automated decision, users stop paying attention, just as they do with excessive alerts.&lt;/p&gt;
&lt;p&gt;Transparency matters, but different audiences need different forms of it. For example, when a security tool blocks a suspicious email:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A human analyst might need to know which rule fired, what the ML model flagged, or whether similar messages were also blocked.&lt;/li&gt;
&lt;li&gt;An AI agent triaging the same alert needs structured metadata to decide its next autonomous action, not a prose explanation that burns tokens.&lt;/li&gt;
&lt;li&gt;A legal team needs documented evidence showing why the product blocked it and whether anyone could have overridden the decision.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Each audience defines &quot;useful detail&quot; differently, and a product that serves only one leaves a usability gap that the others will notice.&lt;/p&gt;
&lt;h2&gt;The Feature List Doesn&apos;t Matter If Nobody Uses It&lt;/h2&gt;
&lt;p&gt;Product managers who want to treat usability as a competitive advantage should ask these questions about their product:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Does it present the right interface for each persona?&lt;/li&gt;
&lt;li&gt;Does it anticipate what users need next?&lt;/li&gt;
&lt;li&gt;Does it explain automated decisions in a way that each audience can act on?&lt;/li&gt;
&lt;li&gt;Can AI agents interact with it efficiently and effectively?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A product that humans adopt and agents operate has a competitive advantage that a feature list alone can&apos;t match.&lt;/p&gt;
</content:encoded></item><item><title>Awareness Training Won&apos;t Protect Employees from Their Own AI Tools</title><link>https://zeltser.com/ai-influence-awareness-training</link><guid isPermaLink="true">https://zeltser.com/ai-influence-awareness-training</guid><description>When an AI tool influences an employee&apos;s decision, audit logs record the human&apos;s action and miss the AI&apos;s role. Addressing that blind spot requires escalation procedures and engineering controls that go beyond what awareness programs can deliver.</description><pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;When an AI tool influences an employee&apos;s decision, audit logs record the human&apos;s action and miss the AI&apos;s role. Addressing that blind spot requires escalation procedures and engineering controls that go beyond what awareness programs can deliver.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/ai-influence-awareness-training.B0VZPi7T.jpg&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;AI tools that employees use every day shape their decisions, but that influence is hard to recognize. Addressing this through AI awareness training risks repeating the mistakes we made with security awareness. We told colleagues to &quot;be suspicious&quot; of links and attachments they needed for work. We extolled the virtues of vigilance, setting unrealistic expectations rather than explaining a specific process, such as reporting a security anomaly.&lt;/p&gt;
&lt;p&gt;Now, as enterprises embed AI into daily workflows, employees build trust in systems that speak insightfully and project confidence. Many organizations offer responsible AI training that covers data privacy, acceptable use, and intellectual property. Employees are told they&apos;re responsible for verifying AI output. But accountability rules don&apos;t help people recognize when a trusted tool is shaping their judgment.&lt;/p&gt;
&lt;p&gt;A &lt;a href=&quot;https://kpmg.com/xx/en/our-insights/ai-and-technology/trust-attitudes-and-use-of-ai.html&quot;&gt;large-scale survey&lt;/a&gt; found that 66% of respondents rely on AI output without checking its accuracy. Employees using AI tools their organization chose and deployed have even less reason to question the results. The natural response will be to add &quot;be careful with AI&quot; to the awareness curriculum. But &quot;be careful&quot; hasn&apos;t worked for us before.&lt;/p&gt;
&lt;h2&gt;Trusted AI tools are harder to question than trusted colleagues.&lt;/h2&gt;
&lt;p&gt;An AI tool that helps a person do better work every day earns their trust. That trust amplifies the negative effects of a compromised agent, a poisoned model, or a misaligned recommendation. Even more than phishing emails that appear legitimate, guidance from a trusted tool arrives with credibility already established. For example:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://pubmed.ncbi.nlm.nih.gov/21077562/&quot;&gt;Automation bias research&lt;/a&gt; shows that people defer to automated systems even when those systems are wrong.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://hbr.org/2026/03/llms-are-manipulating-users-with-rhetorical-tricks&quot;&gt;Researchers found&lt;/a&gt; that when professionals challenged AI outputs, the model didn&apos;t reconsider. It escalated its rhetoric, a pattern the researchers call &quot;persuasion bombing.&quot;&lt;/li&gt;
&lt;li&gt;In a &lt;a href=&quot;https://www.medrxiv.org/content/10.1101/2025.08.23.25334280v2&quot;&gt;clinical study&lt;/a&gt;, physicians whose LLM gave erroneous recommendations saw diagnostic accuracy drop by 14 percentage points. More experienced clinicians showed larger drops, suggesting expertise amplifies rather than counteracts AI influence.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;When something goes wrong, audit logs miss the AI&apos;s role.&lt;/h2&gt;
&lt;p&gt;Traditional social engineering leaves forensic traces if we know where to look. A phishing email sits in an inbox, a pretexting call shows up in phone logs, and an unauthorized access attempt appears in authentication records.&lt;/p&gt;
&lt;p&gt;In most enterprises, AI-driven influence doesn&apos;t appear in audit logs. The AI recommends an action, and the employee carries it out. Audit logs of the downstream application capture the employee&apos;s decision as a legitimate human action. The AI interaction is &lt;a href=&quot;https://www.isaca.org/resources/news-and-trends/industry-news/2025/the-growing-challenge-of-auditing-agentic-ai&quot;&gt;rarely linked to the action it influenced&lt;/a&gt;, if it&apos;s recorded at all. OWASP&apos;s &lt;a href=&quot;https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/&quot;&gt;Top 10 for Agentic Applications&lt;/a&gt; recognizes this issue, describing the agent as an untraceable influence that manipulates humans into performing the final, audited action.&lt;/p&gt;
&lt;p&gt;Awareness frameworks don&apos;t address AI-driven influence as of this writing. &lt;a href=&quot;https://cas.docs.cisecurity.org/en/latest/source/Controls14/&quot;&gt;CIS Control 14&lt;/a&gt;, for example, trains employees to recognize &quot;phishing, business email compromise, pretexting, and tailgating,&quot; all scenarios where an adversary directly targets the employee. It doesn&apos;t cover the case where the employee&apos;s own tool is the source of influence.&lt;/p&gt;
&lt;h2&gt;Teach specific procedures, not general suspicion.&lt;/h2&gt;
&lt;p&gt;Telling employees &quot;don&apos;t trust your AI tools&quot; fails for the same reason &quot;be suspicious of links&quot; isn&apos;t practical. People who interact with AI tools throughout the day can&apos;t maintain a constant state of skepticism. Even employees who know AI can still be influenced by it.&lt;/p&gt;
&lt;p&gt;The response to this risk has four parts, and only one of them involves training.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Teach when to escalate, not what to fear.&lt;/strong&gt; If an AI tool recommends something outside normal parameters or suggests circumventing a process, employees should contact security. Escalating to a person matters more than debating the tool. This mirrors what works for other awareness topics. Tell people when and how to ask for help, not just to &quot;be cautious.&quot;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Require confirmation for high-impact actions.&lt;/strong&gt; Financial transactions, permission changes, and data exports recommended by AI need human confirmation steps that the agent can&apos;t bypass. Organizations already require dual approval for wire transfers, and AI-recommended actions with comparable consequences deserve the same control.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Close the audit trail gap.&lt;/strong&gt; Investigative teams need to see what the agent suggested, not just what the employee did. Without that visibility, they&apos;ll attribute AI-driven decisions to employees. This requires working with internal engineering teams and external vendors to implement the necessary logging.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Test AI interactions in exercises.&lt;/strong&gt; Add AI-driven scenarios to red team and tabletop exercises. Measure whether employees reported anomalous AI behavior, not whether they &quot;fell for it.&quot; Phishing exercises should reward reporting over punishing clicks, and AI exercises should do the same.&lt;/p&gt;
&lt;p&gt;Awareness training works when it tells people what to do, not what to fear. For AI tools, that means teaching escalation and building the engineering controls that training alone can&apos;t replace.&lt;/p&gt;
</content:encoded></item><item><title>Security Governance at the Speed of Vibe Coding</title><link>https://zeltser.com/security-governance-vibe-coding</link><guid isPermaLink="true">https://zeltser.com/security-governance-vibe-coding</guid><description>Employees who&apos;ve never written code now build production apps using AI, without security review, dependency scanning, or enterprise oversight. The SaaS and DevOps transitions give security teams a starting governance approach for this.</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;Employees who&apos;ve never written code now build production apps using AI, without security review, dependency scanning, or enterprise oversight. The SaaS and DevOps transitions give security teams a starting governance approach for this.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/security-governance-vibe-coding.C5DsdKDO.jpg&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;Employees outside engineering now build their own apps using AI coding tools. Developers who use AI for vibe coding present their own governance challenges, but the gap is widest when the builders have no software engineering background at all.&lt;/p&gt;
&lt;p&gt;Security leaders have navigated comparable shifts before, though none moved this fast. When SaaS removed IT&apos;s role as gatekeeper for software procurement, it took us years to figure out a reasonable governance approach. We ran into similar challenges when DevOps became the way to deploy software. Those lessons give us a starting point for governing vibe coding by non-engineers, even if the timeline to act is shorter.&lt;/p&gt;
&lt;h2&gt;The SaaS transition offers a governance playbook.&lt;/h2&gt;
&lt;p&gt;Let&apos;s say a marketing analyst uses AI to build an interactive dashboard that consolidates campaign data and surfaces insights. Or a finance team member creates a reconciliation tool that saves hours of manual work. These are the business outcomes we want, and security governance should make them safer, not slower.&lt;/p&gt;
&lt;p&gt;During the SaaS adoption wave, we realized that saying &quot;yes, with these guardrails&quot; gave us influence over how adoption happened. We created &lt;a href=&quot;https://zeltser.com/untangling-saas-complexity&quot;&gt;discovery workflows, vendor review tiers, and procurement processes&lt;/a&gt; that offered visibility without unnecessary friction. Security teams that didn&apos;t adapt became disconnected from what was running in production.&lt;/p&gt;
&lt;p&gt;Most organizations haven&apos;t built equivalent mechanisms for vibe coding. No wonder that &lt;a href=&quot;https://retool.com/blog/ai-build-vs-buy-report-2026&quot;&gt;Retool&apos;s 2026 report&lt;/a&gt; found that 60% of respondents built software outside IT oversight in the past year. Without discovery workflows or other forms of oversight over AI-built tools, we face the same blind spot we had with early SaaS, but with apps that pop up much faster.&lt;/p&gt;
&lt;h2&gt;Vibe-coded apps create challenges SaaS governance didn&apos;t address.&lt;/h2&gt;
&lt;p&gt;SaaS governance required solving SSO integration, user provisioning, vendor security reviews, and decommissioning. While these controls still apply to vibe-coded software, they&apos;re not enough. We need to address:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Orphaned code at scale:&lt;/strong&gt; When the person who built a vibe-coded app changes roles or leaves, the app loses its owner. Unlike SaaS, where the vendor maintains the product, these apps usually lack the support structure or personnel. They sit in production, accumulating tech debt, with no one responsible for patching, updating, or retiring them. The risk extends beyond security, since a business process that depends on an unmaintained tool is an operational liability.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A confidence-competence gap:&lt;/strong&gt; &lt;a href=&quot;https://arxiv.org/html/2211.03622v3&quot;&gt;Stanford researchers&lt;/a&gt; found that developers using AI assistants wrote less secure code while rating their own output as more secure. The people who trusted AI the most produced the worst security outcomes. Non-developers building apps with AI have even less ability to design and implement with security, reliability, and maintainability in mind.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;No security input in the creation process:&lt;/strong&gt; SaaS vendors typically involve security experts and undergo third-party testing. Apps vibe-coded by employees skip every traditional security practice, including threat modeling, code review, and dependency scanning.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Unmanaged hosting environments:&lt;/strong&gt; Traditional software, including SaaS, runs on managed, secured, and monitored infrastructure. Vibe-coded apps often end up on platforms like Replit that the organization hasn&apos;t vetted and doesn&apos;t monitor.&lt;/p&gt;
&lt;p&gt;Classic governance approaches assume someone vetted the vendor, reviewed the code, maintains the software, manages the infrastructure. Vibe-coded apps invalidate all four assumptions at once.&lt;/p&gt;
&lt;h2&gt;Security adapted to DevOps velocity. We can adapt again.&lt;/h2&gt;
&lt;p&gt;The challenges above look overwhelming, but security teams have adapted to comparable shifts before.&lt;/p&gt;
&lt;p&gt;When continuous deployment became mainstream, we wondered how we&apos;d keep up. Zane Lackey and Rebecca Huehls &lt;a href=&quot;https://www.oreilly.com/library/view/building-a-modern/9781492044680/&quot;&gt;made the case&lt;/a&gt; that security teams had to abandon the gatekeeper mentality. As Etsy&apos;s first CISO, Zane saw developers deploying code dozens of times a day, which was uncommon at the time. His team &lt;a href=&quot;https://material.security/resources/from-hacker-to-ciso-to-founder-a-conversation-with-signal-sciences-zane-lackey&quot;&gt;learned&lt;/a&gt; that the same velocity that overwhelmed traditional reviews let them patch vulnerabilities in minutes instead of waiting for quarterly releases. Catching and fixing problems fast was better than trying to prevent every issue before deployment.&lt;/p&gt;
&lt;p&gt;Vibe coding demands a similar shift. Pre-approval gates don&apos;t work when non-developers build apps outside traditional workflows. We need guardrails embedded into the way people already operate and visibility to spot what slips through.&lt;/p&gt;
&lt;h2&gt;Govern through guardrails, not gates.&lt;/h2&gt;
&lt;p&gt;Governing vibe-coded apps requires a single owner with authority across IT, security, legal, and privacy. Without that, apps that fall between team jurisdictions get no oversight at all. With ownership in place, security teams can adapt governance principles from SaaS oversight and DevOps, starting with visibility and building toward automated controls:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Discover and catalog vibe-coded tools:&lt;/strong&gt; We can&apos;t expect employees to register their apps on their own. Automate discovery through network monitoring, endpoint agents, and platform-level reporting from approved hosting environments, starting with what current tools can already surface. Aim for the inventory to capture what data each tool accesses, where it runs, what permissions it has, and who owns it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Prepare for orphaned apps:&lt;/strong&gt; Design the app inventory to track who built each app and when it was last updated. Build a process to flag apps for review when their builders change roles or leave, so someone can inherit or retire them before they become unpatched liabilities. Without owners to enforce decommissioning, apps that &lt;a href=&quot;https://zeltser.com/distribute-cybersecurity-tasks&quot;&gt;fall between team jurisdictions&lt;/a&gt; will get no oversight.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Use tiered governance:&lt;/strong&gt; Not every vibe-coded tool carries the same risk. A dashboard that visualizes public marketing data needs less oversight than a tool that processes financial records. As new apps enter the inventory, classify them by the data they access and the infrastructure they touch. Low-risk apps get basic cybersecurity support, while sensitive-data activities require pairing with security or IT experts.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Automate security scanning for AI-generated code:&lt;/strong&gt; Non-developers won&apos;t run security tools on their own, so the tools need to run without them. Build dependency scanning, secret detection, and permission constraints into the platforms employees already use to create and deploy their apps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Control access to company data:&lt;/strong&gt; When vibe-coded apps connect to internal resources, the organization controls the authentication. Aim to provide scoped OAuth tokens instead of broad API keys so each app can access only the data it needs, regardless of where it runs.&lt;/p&gt;
&lt;p&gt;Vibe coding won&apos;t give us the years we had when adapting to SaaS and DevOps. Security leaders who act now will &lt;a href=&quot;https://zeltser.com/chief-insecurity-officer&quot;&gt;calibrate acceptable insecurity&lt;/a&gt; on their terms rather than becoming the last to learn what&apos;s already running in production.&lt;/p&gt;
</content:encoded></item><item><title>Scope Security Assessments for Attack Paths, Not Org Charts</title><link>https://zeltser.com/security-assessment-scope</link><guid isPermaLink="true">https://zeltser.com/security-assessment-scope</guid><description>When assessment scope follows organizational lines, gaps open where team boundaries meet and real attackers don&apos;t stop. Pulling adjacent teams into the scoping conversation and following attack logic closes those gaps.</description><pubDate>Sat, 28 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;When assessment scope follows organizational lines, gaps open where team boundaries meet and real attackers don&apos;t stop. Pulling adjacent teams into the scoping conversation and following attack logic closes those gaps.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/boundary-rope.b99m14on.jpg&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;If scoped correctly, pentests and other security assessments address compliance requirements and improve defenses. However, determining the project&apos;s scope can be a challenge. If we define it too narrowly, we&apos;ll miss vulnerabilities that a real attacker could&apos;ve exploited. But if we go too broad, we inflate costs and put relationships at risk. These challenges intensify as organizations begin using AI for assessments, since agents can interpret rules of engagement more literally and operate faster than a human tester.&lt;/p&gt;
&lt;h2&gt;See Where Scope Breaks Down&lt;/h2&gt;
&lt;p&gt;We often think of a security assessment in terms of an &quot;application,&quot; &quot;infrastructure,&quot; or &quot;corporate&quot; pentest because different teams maintain these resources. The funding comes from different budgets, and different people get stressed about the findings. As a result, our scoping decisions are anchored in &quot;who&apos;s responsible?&quot; factors rather than &quot;what can an attacker reach?&quot;&lt;/p&gt;
&lt;p&gt;Such constraints prevent the assessment from mimicking how real attackers operate. A pentest focused on corporate resources might target the identity management system. But it would stop short of following a weakly controlled admin account into the customer support environment, which is a different application, scoped for a separate pentest.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://zeltser.com/distribute-cybersecurity-tasks&quot;&gt;Shared responsibility models&lt;/a&gt; divide ownership across teams, so the assessment&apos;s realistic scope spans multiple groups. Let&apos;s say a pentest focused on a web application discovers that a service account has overly permissive cloud IAM permissions. This allows access to data stores, internal services, and production infrastructure well beyond the web app itself. Is that an application finding or a cloud infrastructure finding? The app team didn&apos;t configure IAM, and the cloud team didn&apos;t build the app. Which team might feel blamed for the issue? Which is responsible for getting it addressed?&lt;/p&gt;
&lt;p&gt;A human tester who encounters ownership and scope uncertainties might take context into account and, when necessary, check with the client. An AI agent running the same assessment might push through the boundary or halt entirely, depending on how literally it interprets the scope statement. Either outcome creates problems that detailed upfront scoping could&apos;ve prevented.&lt;/p&gt;
&lt;h2&gt;Follow the Attack Logic&lt;/h2&gt;
&lt;p&gt;Political boundaries won&apos;t disappear from security assessments scoped along budgetary or organizational lines. But with the right planning, we can still move the assessments closer to how attackers actually operate.&lt;/p&gt;
&lt;p&gt;&quot;Test what an attacker could reach starting from the web app&quot; produces more realistic findings than &quot;test the web app.&quot; Attack-path language helps the assessment team flag what they discover at the edges, even when the formal scope can&apos;t span every team&apos;s resources.&lt;/p&gt;
&lt;p&gt;Bring stakeholders from adjacent systems into the scoping conversation, not just the commissioning team and the provider. The scope doesn&apos;t need to expand, but the conversation does. The people defining the scope should understand the systems the assessment might touch, so they aren&apos;t surprised when findings reach their systems. These scoping conversations surface ownership disagreements before testing forces the issue, when they&apos;re easier to resolve.&lt;/p&gt;
&lt;p&gt;Upfront planning matters even more for AI-driven assessments. Technical boundaries such as systems, network segments, and data classifications translate into rules the agent can follow. Organizational boundaries, especially when they include political considerations, don&apos;t. Agree on a plan with the teams involved, then translate it into operating procedures the AI agent can follow.&lt;/p&gt;
&lt;p&gt;We can plan individual assessments across a year or multi-year cycle, so they collectively cover the threat model. Design intentional overlap where team boundaries meet. If the cloud infrastructure review examines the same service accounts a web app pentest touched, that overlap is a feature, not redundancy. Findings from one assessment inform the next one&apos;s scope, building a feedback loop across engagements.&lt;/p&gt;
&lt;p&gt;Assign a person or function to review findings across all assessments and route cross-boundary discoveries to the right teams. Without this, people will assume that someone else will handle them. These findings should trigger a defined workflow rather than an ad-hoc conversation about whose problem it is.&lt;/p&gt;
&lt;p&gt;A scope statement is only as useful as the agreement behind it. Before your next security assessment, consider whether the people defining the scope understand what an attacker could reach, not just what the commissioning team owns. Shape that agreement around the attack paths, not the org chart.&lt;/p&gt;
</content:encoded></item><item><title>Understand the Reality of the SOC 2 Checkbox</title><link>https://zeltser.com/soc2-checkbox-reality</link><guid isPermaLink="true">https://zeltser.com/soc2-checkbox-reality</guid><description>SOC 2 standardized security reporting, but it left the vendor in control of the system boundary and auditor selection. Understanding that structural gap helps vendors and buyers get the most value from the framework.</description><pubDate>Tue, 17 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;SOC 2 standardized security reporting, but it left the vendor in control of the system boundary and auditor selection. Understanding that structural gap helps vendors and buyers get the most value from the framework.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/soc2-checkbox-reality.C5prU05O.png&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;In 2010, I &lt;a href=&quot;https://zeltser.com/cloud-security-beyond-sas-70&quot;&gt;wrote about&lt;/a&gt; companies placing too much trust in providers&apos; SAS 70 reports. At the time, Gartner called the widespread misuse &lt;a href=&quot;https://zeltser.com/cloud-security-beyond-sas-70&quot;&gt;&quot;deceptive and harmful.&quot;&lt;/a&gt; Chris Schellman, who had led over 500 SAS 70 audits, &lt;a href=&quot;https://www.accountingtoday.com/news/gartner-report-on-sas-70-audits-creates-confusion&quot;&gt;clarified&lt;/a&gt; that the industry had been using it for something it was never built for. Turns out the AICPA was already &lt;a href=&quot;https://www.aicpa-cima.com/news/article/aicpa-auditing-standards-board-approves-revisions-to-attestation-standards&quot;&gt;building a replacement&lt;/a&gt;; SOC 2 was born.&lt;/p&gt;
&lt;p&gt;SOC 2 introduced prescribed trust criteria, required management accountability, and gave buyers a basis for risk-informed decisions. Fifteen years later, familiar patterns have resurfaced.&lt;/p&gt;
&lt;h2&gt;SAS 70 wasn&apos;t meant for security.&lt;/h2&gt;
&lt;p&gt;The AICPA &lt;a href=&quot;https://www.journalofaccountancy.com/issues/2010/aug/20103009/&quot;&gt;issued SAS 70&lt;/a&gt; in 1992 as a framework for auditors to report on controls at service organizations that could affect customers&apos; financial statements. Then &lt;a href=&quot;https://www.congress.gov/bill/107th-congress/house-bill/3763&quot;&gt;Sarbanes-Oxley&lt;/a&gt; arrived in 2002. Public companies needed their vendors to demonstrate control effectiveness, and SAS 70 &lt;a href=&quot;https://www.isaca.org/resources/isaca-journal/past-issues/2011/understanding-the-new-soc-reports&quot;&gt;became the default&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Organizations began &lt;a href=&quot;https://www.cfo.com/news/the-truth-about-sas-70/669107/&quot;&gt;requesting and marketing&lt;/a&gt; SAS 70 reports for security assurance, well beyond the standard&apos;s original design. SAS 70 &lt;a href=&quot;https://www.datacenterknowledge.com/business/sas-70-ssae-16-soc-and-data-center-standards&quot;&gt;had no prescribed control criteria&lt;/a&gt;. The provider chose which controls to include, and the auditor evaluated only what the provider put forward.&lt;/p&gt;
&lt;p&gt;By the late 2000s, the market had turned &quot;SAS 70 certified&quot; into marketing language for something that was neither a certification nor a security standard. The gap between what SAS 70 was and how the market used it had grown too wide to ignore.&lt;/p&gt;
&lt;h2&gt;SOC 2 introduced the missing structure.&lt;/h2&gt;
&lt;p&gt;The AICPA &lt;a href=&quot;https://www.aicpa-cima.com/resources/landing/system-and-organization-controls-soc-suite-of-services&quot;&gt;issued SSAE 16&lt;/a&gt; in 2010 (superseded by &lt;a href=&quot;https://www.aicpa-cima.com/resources/download/aicpa-statement-on-standards-for-attestation-engagements-no-18&quot;&gt;SSAE 18&lt;/a&gt; in 2017), replacing SAS 70 with three distinct report types. SOC 2 addressed the security gap the market had tried to cover with SAS 70. SOC 1 continued financial controls reporting, and SOC 3 provided a public-facing summary of SOC 2.&lt;/p&gt;
&lt;p&gt;Where SAS 70 let providers choose which controls to include, SOC 2 introduced the &lt;a href=&quot;https://cloudsecurityalliance.org/blog/2023/10/05/the-5-soc-2-trust-services-criteria-explained&quot;&gt;Trust Services Criteria&lt;/a&gt; for security, availability, processing integrity, confidentiality, and privacy. Unlike SAS 70, the new report &lt;a href=&quot;https://www.techtarget.com/searchsecurity/definition/SSAE-16&quot;&gt;required a written management assertion&lt;/a&gt;, making organizations formally accountable for the report&apos;s claims.&lt;/p&gt;
&lt;h2&gt;SOC 2 became table stakes.&lt;/h2&gt;
&lt;p&gt;Enterprise buyers needed evidence of vendor security controls, and SOC 2 filled that gap as the cloud market grew. The framework&apos;s adoption accelerated when compliance automation tools such as Vanta and Drata made it accessible to startups and smaller companies that previously couldn&apos;t afford it.&lt;/p&gt;
&lt;p&gt;Lower barriers changed what SOC 2 meant in practice. The report appeared in vendor questionnaires and RFPs as a checkbox, and for many companies the goal shifted from demonstrating a strong program to passing a binary check.&lt;/p&gt;
&lt;p&gt;As a result, merely having a SOC 2 report no longer distinguishes a company. It&apos;s the baseline expectation for SaaS providers selling to enterprises.&lt;/p&gt;
&lt;h2&gt;SOC 2 concerns start to surface.&lt;/h2&gt;
&lt;p&gt;Broader adoption put more weight on SOC 2&apos;s structural gaps. Despite the improvements over SAS 70, the audited organization still defines the system boundary and selects the auditor. These choices drive the concerns I hear from fellow CISOs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;a href=&quot;https://www.aicpa-cima.com/resources/download/2017-trust-services-criteria-with-revised-points-of-focus-2022&quot;&gt;Trust Services Criteria&lt;/a&gt; prescribe what to evaluate, but the provider decides which systems and services the report covers and how controls address each criterion. Organizations have an incentive to optimize for controls that produce favorable evidence.&lt;/li&gt;
&lt;li&gt;The rigor of examinations varies across auditors. Auditors who work quickly and keep clients satisfied win repeat business at the expense of examination rigor. As a result, promises of &lt;a href=&quot;https://www.journalofaccountancy.com/issues/2026/feb/promises-of-fast-and-easy-threaten-soc-credibility/&quot;&gt;&quot;fast and easy&quot; threaten SOC credibility&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The AICPA has responded by &lt;a href=&quot;https://www.aicpa-cima.com/resources/download/see-common-peer-review-deficiencies-from-soc-1-r-and-soc-2-r-engagements&quot;&gt;cataloging common examination deficiencies&lt;/a&gt; and &lt;a href=&quot;https://www.aicpa-cima.com/news/article/final-version-of-new-aicpa-peer-review-standards-update-now-available&quot;&gt;requiring peer reviewers to examine firms&apos; SOC work&lt;/a&gt;. However, I&apos;m not aware of any firm that has faced disciplinary action for lax examinations.&lt;/p&gt;
&lt;h2&gt;Use SOC 2 intentionally.&lt;/h2&gt;
&lt;p&gt;SOC 2 addressed real weaknesses in how the market used SAS 70, but the old pattern of treating reports as checkboxes persists.&lt;/p&gt;
&lt;p&gt;SaaS companies have an incentive to draw scope boundaries that exclude their weakest processes and time observation windows to avoid known-bad periods. Controls might exist during the examination and atrophy once the report ships. These practices are the predictable result of letting the vendor define the scope and select the auditor.&lt;/p&gt;
&lt;p&gt;Vendors that want their SOC 2 to carry weight should design controls around their actual product and threat model, not a default compliance template. And they should hold their auditors to high standards and avoid misrepresenting where the program actually stands.&lt;/p&gt;
&lt;p&gt;From a buyer&apos;s perspective, a SOC 2 report from a trusted audit firm offers visibility into a vendor&apos;s security program. But due diligence requires not only reading control statements, but also asking which systems and processes were excluded from scope. If that boundary doesn&apos;t match what you actually rely on, the assurance doesn&apos;t either.&lt;/p&gt;
</content:encoded></item><item><title>Most Cybersecurity Products Aren&apos;t Platforms and It&apos;s OK</title><link>https://zeltser.com/what-platform-means-cybersecurity</link><guid isPermaLink="true">https://zeltser.com/what-platform-means-cybersecurity</guid><description>The test for a genuine platform is whether each new addition makes everything else more valuable, not just whether products share a brand or console. Let&apos;s draw a distinction between a platform and a suite.</description><pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;The test for a genuine platform is whether each new addition makes everything else more valuable, not just whether products share a brand or console. Let&apos;s draw a distinction between a platform and a suite.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/what-platform-means-cybersecurity.DrNzij4t.jpg&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;Many cybersecurity startups refer to their products as a platform. That aspiration can shape product strategy and motivate a company to think big. But the label carries a specific meaning. Misapplying it means investing in ecosystem infrastructure that the architecture can&apos;t support while starving the integration work that actually makes a suite competitive.&lt;/p&gt;
&lt;h2&gt;A platform creates self-reinforcing value.&lt;/h2&gt;
&lt;p&gt;Each new addition to a platform delivers more value than it would as a standalone offering by plugging into an established ecosystem.&lt;/p&gt;
&lt;p&gt;Network effects, the dynamic that the book &lt;a href=&quot;https://ide.mit.edu/publication/platform-revolution/&quot;&gt;Platform Revolution&lt;/a&gt; identifies as the primary engine of growth, create a virtuous cycle where increased participation generates compounding value. In tech platforms, this plays out through shared foundations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Products or participants share data, so one&apos;s telemetry enriches another&apos;s analysis.&lt;/li&gt;
&lt;li&gt;Shared identity eliminates onboarding friction.&lt;/li&gt;
&lt;li&gt;Distribution advantages let new features reach an established base instantly.&lt;/li&gt;
&lt;li&gt;Shared data trains AI models whose accuracy improves as more products contribute telemetry.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;However, the cybersecurity industry uses &quot;platform&quot; differently. &lt;a href=&quot;https://www.gartner.com/en/documents/5314263&quot;&gt;Gartner&apos;s cybersecurity platform consolidation framework&lt;/a&gt; treats platforms as consolidated security capabilities under a single vendor. &lt;a href=&quot;https://www.paloaltonetworks.com/cyberpedia/what-is-cybersecurity-platformization&quot;&gt;Palo Alto Networks describes platformization&lt;/a&gt; the same way. These definitions all describe a &lt;em&gt;suite&lt;/em&gt;.&lt;/p&gt;
&lt;h2&gt;Suites consolidate. Platforms compound.&lt;/h2&gt;
&lt;p&gt;In a suite, each module adds a fixed increment of value. On a platform, each addition makes everything else on it more valuable. That holds regardless of who builds the additions. The classic examples are &lt;a href=&quot;https://www.hbs.edu/faculty/Pages/item.aspx?num=48249&quot;&gt;multi-sided platforms&lt;/a&gt; in which third parties create value that the platform owner doesn&apos;t fully control.&lt;/p&gt;
&lt;p&gt;Bill Gates reportedly &lt;a href=&quot;https://semilshah.com/2015/09/17/transcript-chamath-at-strictlyvcs-insider-series/&quot;&gt;offered a well-known test&lt;/a&gt; for recognizing platforms. A platform, he said, is &quot;when the economic value of everybody that uses it exceeds the value of the company that creates it.&quot; That formulation captures platform dynamics with heavy third-party participation. But the self-reinforcing dynamic doesn&apos;t require outside participants.&lt;/p&gt;
&lt;p&gt;If your next product gains meaningful advantages from what&apos;s already at the foundation, you have platform dynamics:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A &lt;em&gt;suite&lt;/em&gt; solves the complexity problem. Customers want fewer vendor relationships, tighter integration between security functions, and a single console for operations.&lt;/li&gt;
&lt;li&gt;A &lt;em&gt;platform&lt;/em&gt; goes further. Shared foundations enable the vendor&apos;s own teams and external partners to build capabilities that reinforce one another, delivering more than either could independently.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Platform dynamics emerge from architectural decisions, ecosystem participation, and sustained investment in shared foundations. &lt;a href=&quot;https://www.linkedin.com/pulse/platform-vs-product-suite-rob-saccone-kejae&quot;&gt;A vendor can&apos;t simply declare itself a platform&lt;/a&gt;, and most that try end up with a suite.&lt;/p&gt;
&lt;h2&gt;Platform dynamics require deliberate architecture.&lt;/h2&gt;
&lt;p&gt;The companies that have built genuine platform dynamics did so through specific architectural choices. CrowdStrike shows perhaps the clearest example in cybersecurity:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CrowdStrike &lt;a href=&quot;https://www.sec.gov/Archives/edgar/data/1535527/000153552725000009/crwd-20250131.htm&quot;&gt;built a single-agent architecture&lt;/a&gt; with a unified data layer, where a single sensor feeds endpoint data to every module on the platform.&lt;/li&gt;
&lt;li&gt;When CrowdStrike launched Falcon Cloud Security and Falcon Identity Protection, those modules &lt;a href=&quot;https://www.sec.gov/Archives/edgar/data/1535527/000153552725000009/crwd-20250131.htm&quot;&gt;ran on the same sensor and drew on shared telemetry&lt;/a&gt;, reaching the existing customer base. Standalone competitors had to build those capabilities from scratch.&lt;/li&gt;
&lt;li&gt;Partners can extend the platform through CrowdStrike&apos;s &lt;a href=&quot;https://ir.crowdstrike.com/news-releases/news-release-details/new-crowdstrike-marketplace-transforms-cybersecurity-consumption&quot;&gt;Marketplace&lt;/a&gt; and &lt;a href=&quot;https://www.crowdstrike.com/en-us/blog/launching-the-crowdstrike-store-to-bring-trusted-third-party-apps-to-the-falcon-platform/&quot;&gt;Falcon Foundry&lt;/a&gt;, building applications that access the same data and reach the same customer base.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Not every network that looks like a flywheel behaves like one. Okta&apos;s Integration Network connects &lt;a href=&quot;https://www.sec.gov/Archives/edgar/data/1660134/000166013425000049/okta-20250131.htm&quot;&gt;over 7,000 applications&lt;/a&gt;, but most are &lt;a href=&quot;https://www.stitchflow.com/blog/okta-sso-vs-provisioning&quot;&gt;standardized SSO connectors&lt;/a&gt; that follow the same pattern regardless of who builds them. Adding app number 7,001 doesn&apos;t make existing integrations more valuable. The platform dynamic is real, but it lives in the identity data layer, not the integration count:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Once an organization adopts Okta as its identity provider, each additional Okta capability (access reviews, lifecycle management, governance) draws on that shared identity foundation. A standalone competitor would have to rebuild that context from scratch.&lt;/li&gt;
&lt;li&gt;Okta&apos;s threat intelligence improves as more organizations contribute identity signals, creating a data advantage that a competitor can&apos;t replicate through features alone.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Okta&apos;s identity expansion is suite behavior, while its shared identity data layer is platform behavior. The two can coexist. Palo Alto Networks shows this pattern at a larger scale:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The company &lt;a href=&quot;https://www.sec.gov/Archives/edgar/data/1327567/000132756725000027/panw-20250731.htm&quot;&gt;assembled its security portfolio largely through acquisition&lt;/a&gt;, consolidating network security, cloud security, and security operations under one vendor. That&apos;s suite behavior, and it&apos;s effective, because customers get fewer vendor relationships and tighter integration.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;But Cortex XSIAM &lt;a href=&quot;https://www.sec.gov/Archives/edgar/data/1327567/000132756725000027/panw-20250731.htm&quot;&gt;collects telemetry from endpoint, network, identity, and cloud data sources&lt;/a&gt; and correlates them in a shared layer. When firewall data from Strata enriches threat detection in Cortex, both products become more valuable. That&apos;s platform behavior.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Unifying the data layer is the hard part. Frank Wang &lt;a href=&quot;https://franklyspeaking.substack.com/p/how-legacy-security-companies-succeed&quot;&gt;describes this common failure&lt;/a&gt; as the &quot;middleware trap,&quot; which is putting a shared console over separate acquired backends without unifying the underlying data models. Palo Alto avoided that pattern by &lt;a href=&quot;https://www.sec.gov/Archives/edgar/data/1327567/000132756725000027/panw-20250731.htm&quot;&gt;enforcing Cortex Data Lake as a shared foundation&lt;/a&gt; early in its acquisition integration, turning what could have been suite consolidation into genuine platform investment.&lt;/p&gt;
&lt;p&gt;Platforms are rare because declaring one is easy and building one is hard. &lt;a href=&quot;https://hbr.org/2019/05/a-study-of-more-than-250-platforms-reveals-why-most-fail&quot;&gt;Even by a generous definition&lt;/a&gt;, most platform attempts across industries fail within five years, often because they can&apos;t attract participants to both sides of the flywheel simultaneously.&lt;/p&gt;
&lt;p&gt;Not every buyer needs a platform. When the security team evaluating your product has three analysts and no developers, ecosystem extensibility is overhead they didn&apos;t ask for.&lt;/p&gt;
&lt;h2&gt;Build for the dynamics you actually have.&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;If you&apos;re building a suite,&lt;/strong&gt; your competitive advantage comes from how well your components work together, not from ecosystem gravity. Design for integration depth and operational simplicity. Don&apos;t overinvest in marketplace features or partner programs that you can&apos;t support, because those investments drain resources from the integration work that actually differentiates a good suite.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;If you&apos;re building toward a platform,&lt;/strong&gt; you need shared architectural foundations that create compounding value, not just a shared brand or console. That might be a shared data layer where each product&apos;s telemetry enriches the others, or an integration network where each new participant increases value for everyone already connected. Build those foundations for your own product expansion first, then consider opening to partners once the internal foundation proves its value.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;If you&apos;re deciding which to pursue,&lt;/strong&gt; start with your core product. Does each new addition gain a meaningful advantage from what&apos;s already there, or is it essentially standalone work under a shared brand? If additions reinforce each other, you have platform dynamics. If they don&apos;t, you have a suite. Either is a legitimate path, and some companies will find both, with suite dynamics in parts of the portfolio and platform dynamics in others.&lt;/p&gt;
</content:encoded></item><item><title>Build Better Security Product Strategies Using Your AI Tool</title><link>https://zeltser.com/security-product-strategy-with-ai</link><guid isPermaLink="true">https://zeltser.com/security-product-strategy-with-ai</guid><description>Modern AI tools can help evaluate a security product&apos;s strategy, but only if they have the right criteria. An MCP server with domain-specific frameworks gives your AI agent the practitioner knowledge to test strategic fit, evaluate competitors, and assess vendor viability.</description><pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;Modern AI tools can help evaluate a security product&apos;s strategy, but only if they have the right criteria. An MCP server with domain-specific frameworks gives your AI agent the practitioner knowledge to test strategic fit, evaluate competitors, and assess vendor viability.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/security-product-strategy-with-ai.C8dLEXFV.jpg&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;AI agents, with the right guidance, can catch strategic contradictions, separate verified facts from marketing claims, and stress-test key assumptions. Point yours at my MCP server to give it access to product strategy frameworks that generic AI doesn&apos;t have. Whether you&apos;re building your own product, evaluating a startup vendor, or sizing up competitors, the frameworks adapt to your context.&lt;/p&gt;
&lt;p&gt;It incorporates my &lt;a href=&quot;https://zeltser.com/security-product-creation-framework&quot;&gt;guide to creating cybersecurity products&lt;/a&gt; and insights I&apos;ve published over the years as a builder and consumer of cybersecurity products. Your AI agent applies this practitioner knowledge to what it knows about the company, stage, and market.&lt;/p&gt;
&lt;h2&gt;A Layer on Top of Generic AI&lt;/h2&gt;
&lt;p&gt;Ask a generic AI to review a product strategy and you&apos;ll get textbook advice. &quot;Consider the target market. Review the revenue model.&quot; It won&apos;t catch that your $7,200/yr deal size contradicts the Fortune 500 sales motion, or that per-seat pricing undervalues security products when small teams protect large asset inventories.&lt;/p&gt;
&lt;p&gt;When you guide the AI tool with specific criteria, expectations, and templates, it identifies such contradictions. The AI tests whether the pricing, positioning, go-to-market, and trust readiness actually support each other. That guided approach also adjusts to the company stage, so an early-stage startup gets different questions than a growth-stage company. It incorporates insights from my &lt;a href=&quot;https://zeltser.com/topic/product-management&quot;&gt;product management articles&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;AI-Driven Product Analysis in Action&lt;/h2&gt;
&lt;p&gt;The frameworks are useful for evaluating companies you&apos;re considering buying from, comparing against, or investing in. To demonstrate, I used this approach to create structured &lt;a href=&quot;https://zeltser.com/media/rsac-2026-sandbox&quot;&gt;profiles of the RSAC 2026 Innovation Sandbox finalists&lt;/a&gt;. Each profile covers eight market-readiness dimensions, from problem clarity and capability depth to funding efficiency and defensibility. The profiles separate verified facts from marketing claims and score each company on a consistent rubric. You can apply the same approach to evaluate whether a startup vendor will still be around in two years, or to compare how competitors position themselves in the market.&lt;/p&gt;
&lt;p&gt;The frameworks also help you develop and stress-test your own product strategy through interactive conversations. The AI applies practitioner knowledge to challenge your assumptions about pricing, positioning, and go-to-market readiness. Below is a simulated conversation to demo such capabilities. You can &lt;a href=&quot;https://zeltser.com/media/product-strategy-replay.html&quot; target=&quot;_blank&quot;&gt;open it in a new tab&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Codified Strategy Expertise&lt;/h2&gt;
&lt;p&gt;To help you conduct such analysis, my MCP server provides capabilities that help your AI agent reason through the analysis in a structured, methodical way:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Strategy creation from your context:&lt;/strong&gt; Your AI receives frameworks for building a product strategy that adapts to your company&apos;s stage and situation. It covers market positioning, capabilities, pricing, sales motions, delivery, trust, and team planning.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Constructive feedback on strategy drafts:&lt;/strong&gt; Your AI evaluates an existing plan against specific criteria, including pricing-positioning alignment, go-to-market readiness, trust gaps, and team expertise.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-company competitive analysis:&lt;/strong&gt; Your AI receives structured comparison frameworks with scoring rubrics for evaluating competitors, market segments, or investment cohorts side by side.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Topic-specific strategic guidance:&lt;/strong&gt; Your AI receives focused guidance when you need depth on a single area, such as pricing models, compliance readiness, competitive moats, or platform strategy.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The MCP server is designed to preserve confidentiality. Your AI agent doesn&apos;t send your documents or proprietary details to my server, and the server doesn&apos;t log conversation contents.&lt;/p&gt;
&lt;h2&gt;How to Connect Your AI Tool&lt;/h2&gt;
&lt;p&gt;To give your AI tool access to these security product frameworks, point it at my MCP server &lt;code&gt;https://website-mcp.zeltser.com/mcp&lt;/code&gt;. For example, run this command for Claude Code:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;claude mcp add zeltser-website --transport http https://website-mcp.zeltser.com/mcp --scope user
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Of course, the MCP server also works with Claude Desktop and other MCP-compatible tools. (By the way, the same server provides &lt;a href=&quot;https://zeltser.com/good-ir-reports-with-ai&quot;&gt;incident response writing guidance&lt;/a&gt; and text search across my website&apos;s security content.)&lt;/p&gt;
&lt;p&gt;If you prefer to build your own tooling that incorporates my security product guidance, you can &lt;a href=&quot;https://zeltser.com/media/docs/security-product-strategy.yaml&quot;&gt;download my product insights as a YAML file&lt;/a&gt;, which your software can parse locally and use in a way that fits your needs. If you want to codify your own domain expertise for AI consumption, the &lt;a href=&quot;https://github.com/lennyzeltser/mcp-expertise-toolkit&quot;&gt;MCP Expertise Toolkit&lt;/a&gt; that powers this server provides a template for building your own.&lt;/p&gt;
&lt;h2&gt;Key Takeaways&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The frameworks test whether the company&apos;s pricing, positioning, and go-to-market actually support each other, whether you&apos;re evaluating your own strategy or someone else&apos;s.&lt;/li&gt;
&lt;li&gt;You can sort competitive claims by evidence quality, separating verified capabilities from marketing language when assessing vendors, competitors, or investment targets.&lt;/li&gt;
&lt;li&gt;Guidance adjusts to the company stage and draws on vertical market analysis when possible.&lt;/li&gt;
&lt;li&gt;Your strategy data stays local and isn&apos;t sent to my MCP server to preserve confidentiality.&lt;/li&gt;
&lt;/ul&gt;
</content:encoded></item><item><title>Competing in Endpoint Security: A Guide for Startups</title><link>https://zeltser.com/endpoint-security-startup-questions</link><guid isPermaLink="true">https://zeltser.com/endpoint-security-startup-questions</guid><description>There are areas where endpoint security startups can build viable, useful products, but those openings shift as adjacent categories converge and incumbents absorb new capabilities. Founders, buyers, and investors need to distinguish a viable product strategy from a feature waiting to be bundled.</description><pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;There are areas where endpoint security startups can build viable, useful products, but those openings shift as adjacent categories converge and incumbents absorb new capabilities. Founders, buyers, and investors need to distinguish a viable product strategy from a feature waiting to be bundled.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://zeltser.com/assets/endpoint-security-startup-questions.Dc8MJXBO.jpg&quot; alt=&quot;Article illustration&quot; /&gt;&lt;/p&gt;&lt;p&gt;Endpoint security startups face a dilemma. Build broadly, and you compete against &lt;a href=&quot;https://zeltser.com/what-platform-means-cybersecurity&quot;&gt;platforms&lt;/a&gt; with more data, broader distribution, and deeper pockets. Build narrowly, and you risk becoming a feature that those platforms develop before you gain traction.&lt;/p&gt;
&lt;p&gt;If you are creating an endpoint security product, this guide will help you navigate these market dynamics. If you are evaluating or investing in one, the same questions will help you assess whether the startup has found a defensible position.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#prevention-is-baseline-platforms-are-entrenched&quot;&gt;Prevention is baseline, platforms are entrenched.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#the-gaps-exist-but-they-shift&quot;&gt;The gaps exist, but they shift.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#adjacent-categories-are-converging-with-endpoint-security&quot;&gt;Adjacent categories are converging with endpoint security.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#ai-and-data-advantages-grow-with-scale&quot;&gt;AI and data advantages grow with scale.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#incumbents-own-the-budget-and-the-channel&quot;&gt;Incumbents own the budget and the channel.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#defensibility-determines-the-exit-terms&quot;&gt;Defensibility determines the exit terms.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#a-rubric-for-the-startups-position&quot;&gt;A rubric for the startup&apos;s position.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Prevention is baseline, platforms are entrenched.&lt;/h2&gt;
&lt;p&gt;Dominant endpoint security platforms have absorbed what were once separate product categories and set a high bar for newcomers. Microsoft bundles Defender for Endpoint with its E5 licensing and &lt;a href=&quot;https://www.microsoft.com/en-us/security/blog/2025/08/27/microsoft-ranked-number-one-in-modern-endpoint-security-market-share-third-year-in-a-row/&quot;&gt;holds the #1 market share according to IDC&lt;/a&gt;. Gartner &lt;a href=&quot;https://blog.sec-labs.com/2019/08/gartner-epp-magic-quadrant-2019-defender-in-the-leading-quadrant/&quot;&gt;began evaluating EDR alongside endpoint protection&lt;/a&gt;, and Forrester &lt;a href=&quot;https://www.forrester.com/blogs/endpoint-security-is-dead-long-live-endpoint-security/&quot;&gt;retired its standalone endpoint security evaluation&lt;/a&gt; entirely. Prevention and detection are now table stakes.&lt;/p&gt;
&lt;p&gt;Customers are unlikely to switch from their endpoint platform, even after catastrophic failure. The CrowdStrike 2024 outage &lt;a href=&quot;https://www.cnbc.com/2024/07/20/microsoft-says-about-8point5-million-of-its-devices-affected-by-crowdstrike-related-outage.html&quot;&gt;affected ~8.5 million Windows systems&lt;/a&gt;, yet CrowdStrike maintained &lt;a href=&quot;https://www.cybersecuritydive.com/news/crowdstrike-retains-customers/734203/&quot;&gt;97%+ gross customer retention&lt;/a&gt;. If you have a new endpoint security product, be certain it offers significant differentiation over these entrenched incumbents.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Questions on platform differentiation:&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How does it differ from modern endpoint protection platforms such as Microsoft Defender, CrowdStrike Falcon, and SentinelOne Singularity?&lt;/li&gt;
&lt;li&gt;Does it aim to replace existing endpoint security solutions, or will it complement them? If the two will coexist, how well do they integrate?&lt;/li&gt;
&lt;li&gt;Does the product protect beyond traditional endpoints, such as cloud workloads, containers, browsers, AI agents, or firmware?&lt;/li&gt;
&lt;li&gt;Does it overlap with &lt;a href=&quot;#adjacent-categories-are-converging-with-endpoint-security&quot;&gt;adjacent categories&lt;/a&gt; such as browser isolation, application allowlisting, or data loss prevention?&lt;/li&gt;
&lt;li&gt;How many additional agents, consoles, and integrations will the SOC need to manage? Does the product reduce operational load or add to it?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;The gaps exist, but they shift.&lt;/h2&gt;
&lt;p&gt;Platform vendors &lt;a href=&quot;https://www.securityweek.com/securityweek-report-426-cybersecurity-ma-deals-announced-in-2025/&quot;&gt;spent billions in recent years&lt;/a&gt; acquiring startups to fill gaps in their endpoint coverage, validating that the window of opportunity is substantial. But these windows close. Application control was once a standalone category before platforms absorbed it. EDR was a niche that became the standard. Browser security and supply chain security are today&apos;s gaps, but they may be tomorrow&apos;s bundled features.&lt;/p&gt;
&lt;p&gt;Platforms cannot build niche capabilities as fast as they can acquire them. They optimize for breadth and allocate engineering capacity to current customers. When customers demand a capability, building from scratch can take years, while acquiring takes months. The startup, in turn, eventually needs &lt;a href=&quot;#incumbents-own-the-budget-and-the-channel&quot;&gt;distribution and resources&lt;/a&gt; it cannot obtain on its own.&lt;/p&gt;
&lt;p&gt;Recent acquisitions and funding rounds suggest where some of the gaps are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Agentic AI security:&lt;/em&gt; Palo Alto Networks &lt;a href=&quot;https://cyberscoop.com/palo-alto-networks-acquires-koi-agentic-ai-security/&quot;&gt;acquired Koi&lt;/a&gt; for a reported ~$400M.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Browser security:&lt;/em&gt; CrowdStrike &lt;a href=&quot;https://www.securityweek.com/crowdstrike-to-acquire-browser-security-firm-seraphic-for-420-million/&quot;&gt;acquired Seraphic&lt;/a&gt; for ~$420M.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Runtime memory protection:&lt;/em&gt; Prelude Security &lt;a href=&quot;https://www.preludesecurity.com/blog/announcing-additional-16-million-investment&quot;&gt;raised $45M&lt;/a&gt; to address in-memory attacks that evade file-based detection.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Continuous identity:&lt;/em&gt; CrowdStrike is &lt;a href=&quot;https://www.cnbc.com/2026/01/08/crowdstrike-ai-cybersecurity-sgnl-acquisition.html&quot;&gt;acquiring SGNL&lt;/a&gt; for ~$740M to pair endpoint risk signals with access control across human, non-human, and AI identities.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Firmware and below-OS security:&lt;/em&gt; Eclypsium &lt;a href=&quot;https://www.securityweek.com/eclypsium-eyes-global-expansion-with-45-million-series-c-investment/&quot;&gt;raised $45M&lt;/a&gt; in an effort to secure infrastructure firmware.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;AI agent security:&lt;/em&gt; SentinelOne &lt;a href=&quot;https://www.sentinelone.com/press/sentinelone-to-acquire-prompt-security-to-advance-genai-security/&quot;&gt;acquired Prompt Security&lt;/a&gt; and Zenity &lt;a href=&quot;https://www.prnewswire.com/news-releases/zenity-raises-38m-series-b-funding-round-to-secure-agentic-ai-302289584.html&quot;&gt;raised $38M in a Series B&lt;/a&gt; to secure autonomous AI agents.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Questions on gap durability:&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Which existing vendors are the startup&apos;s closest competitors, even if they use a different approach?&lt;/li&gt;
&lt;li&gt;How long before a platform vendor builds or acquires a competing capability in the startup&apos;s niche?&lt;/li&gt;
&lt;li&gt;If a platform vendor shipped a &quot;good enough&quot; version of the product&apos;s capability tomorrow, what would the startup retain that they cannot replicate?&lt;/li&gt;
&lt;li&gt;Is the gap the startup is targeting driven by a structural limitation of platforms, or by a priority they have not yet addressed?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Adjacent categories are converging with endpoint security.&lt;/h2&gt;
&lt;p&gt;A startup building near the boundary of endpoint security faces competition from two directions. Adjacent categories are expanding into threat detection. Also, endpoint platforms extending into device management, DNS, and browser control.&lt;/p&gt;
&lt;p&gt;MDM/UEM vendors already have agents on endpoints and are adding security capabilities. Jamf grew its &lt;a href=&quot;https://www.nasdaq.com/press-release/jamf-announces-third-quarter-2025-financial-results-2025-11-10&quot;&gt;security ARR to $216M, up 44% year-over-year&lt;/a&gt;, reaching 30% of total revenue by Q3 2025. Francisco Partners subsequently &lt;a href=&quot;https://seekingalpha.com/news/4510131-jamf-jumps-after-it-confirms-deal-to-go-private-in-2_2b-transaction&quot;&gt;acquired Jamf for $2.2 billion&lt;/a&gt;, validating the category&apos;s strategic value. Other device management vendors are making similar moves:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Kandji, which had &lt;a href=&quot;https://techcrunch.com/2024/07/17/kandji-raises-another-100m-for-apple-device-management-as-valuation-rises-to-850m/&quot;&gt;raised $100M at an $850M valuation&lt;/a&gt;, &lt;a href=&quot;https://siliconangle.com/2025/10/22/kandji-rebrands-iru-launches-ai-powered-unified-security-platform/&quot;&gt;expanded from Apple MDM into EDR, vulnerability management, and compliance automation&lt;/a&gt; in October 2025.&lt;/li&gt;
&lt;li&gt;NinjaOne &lt;a href=&quot;https://fortune.com/2025/02/24/ninjaone-500-million-funding-series-c-capitalg-iconiq-venture/&quot;&gt;raised $500M at a $5B valuation&lt;/a&gt; for what it calls &quot;autonomous endpoint management,&quot; expanding from RMM and patch management into a platform that increasingly overlaps with endpoint security workflows.&lt;/li&gt;
&lt;li&gt;Microsoft&apos;s Intune &lt;a href=&quot;https://learn.microsoft.com/en-us/intune/intune-service/protect/microsoft-defender-integrate&quot;&gt;integrates directly with Defender for Endpoint&lt;/a&gt; to enforce compliance policies based on real-time device risk, extending the bundling dynamic into the device management layer.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Automated patching, configuration enforcement, and vulnerability management fill the space between what MDM manages and what EPP detects. Automox &lt;a href=&quot;https://siliconangle.com/2021/04/27/endpoint-management-startup-automox-raises-110m-expand-enterprise-functionality/&quot;&gt;raised over $150M&lt;/a&gt; to consolidate these functions into a cloud-native product, while Action1 &lt;a href=&quot;https://siliconangle.com/2023/06/15/action1-raises-20m-implement-zero-knowledge-architecture-platform/&quot;&gt;raised $20M&lt;/a&gt; for cloud-native patch management. Larger players such as Tanium (&lt;a href=&quot;https://www.securityweek.com/salesforce-ventures-investment-values-tanium-9-billion/&quot;&gt;valued at $9B&lt;/a&gt;) also operate here.&lt;/p&gt;
&lt;p&gt;Beyond device management, DNS filtering is an enforcement layer that major endpoint security platforms do not cover natively, creating space for startups that can integrate DNS-layer protection into broader endpoint strategies:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cisco Umbrella&apos;s legacy client &lt;a href=&quot;https://www.cisco.com/c/en/us/products/collateral/security/anyconnect-secure-mobility-client/umbrella-roaming-client-eol.html&quot;&gt;reached end-of-support in April 2025&lt;/a&gt;, forcing customers to migrate to Cisco Secure Client and giving competitors an opening during the transition.&lt;/li&gt;
&lt;li&gt;DNSFilter, which &lt;a href=&quot;https://www.crunchbase.com/organization/dnsfilter/company_financials&quot;&gt;raised $50.5M total&lt;/a&gt;, targets MSPs with &lt;a href=&quot;https://www.dnsfilter.com/msp&quot;&gt;multi-tenant management&lt;/a&gt; and &lt;a href=&quot;https://www.dnsfilter.com/features/website-categorization&quot;&gt;machine-learning domain categorization&lt;/a&gt;, a distribution model that parallels the MSP-first approach discussed in the &lt;a href=&quot;https://zeltser.com/smb-security-product-strategy&quot;&gt;SMB security product guide&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Infoblox, which &lt;a href=&quot;https://siliconangle.com/2024/09/25/analysis-infoblox-looks-change-ops-game-universal-ddi-product-suite/&quot;&gt;manages core DNS and network services for enterprises&lt;/a&gt;, has &lt;a href=&quot;https://www.networkworld.com/article/4033754/infoblox-reinforces-dns-defense-package.html&quot;&gt;extended into protective DNS&lt;/a&gt; by adding threat intelligence and machine-learning analytics capabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Enterprise browsers represent a third convergence vector, one that could reduce dependency on OS-level endpoint agents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Island &lt;a href=&quot;https://www.securityweek.com/island-banks-250m-series-e-for-enterprise-browser/&quot;&gt;reached a ~$4.8B valuation with $810M in total funding&lt;/a&gt;, positioning its enterprise browser to &lt;a href=&quot;https://siliconangle.com/2025/03/26/secure-enterprise-browser-island-raises-250m-nearly-5b-valuation/&quot;&gt;consolidate web filtering, isolation, and zero-trust access into a single solution&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Palo Alto Networks &lt;a href=&quot;https://techcrunch.com/2023/11/06/confirmed-palo-alto-has-acquired-talon-cyber-security-sources-say-for-625m/&quot;&gt;acquired Talon for a reported $625M&lt;/a&gt; and &lt;a href=&quot;https://www.paloaltonetworks.com/company/press/2023/palo-alto-networks--closes-talon-cyber-security-acquisition-and-will-offer-complimentary-enterprise-browser-to-qualified-sase-ai-customers&quot;&gt;integrated it into Prisma SASE&lt;/a&gt; as a browser-based enforcement point for unmanaged devices.&lt;/li&gt;
&lt;li&gt;Google launched &lt;a href=&quot;https://cloud.google.com/blog/products/identity-security/introducing-chrome-enterprise-premium&quot;&gt;Chrome Enterprise Premium&lt;/a&gt;, adding threat protection, data loss prevention, and zero-trust access controls directly into the browser.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For endpoint security startups, browsers are both a risk (if enforcement shifts to the browser, the OS-level agent becomes less critical) and an opportunity (browser telemetry as a data source that endpoint platforms do not yet capture well).&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Questions on adjacent category dynamics:&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Is the startup building in an adjacent category or competing against vendors expanding from one? Does the customer already use an adjacent platform that bundles security features?&lt;/li&gt;
&lt;li&gt;Does the product depend on a platform (MDM, DNS infrastructure, browser) that is adding its own security capabilities? If so, what happens to the startup&apos;s position when that platform ships a competing feature?&lt;/li&gt;
&lt;li&gt;Are adjacent vendors adding security faster than security platforms are adding adjacent capabilities, or the reverse? How does this affect the startup&apos;s timeline?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;AI and data advantages grow with scale.&lt;/h2&gt;
&lt;p&gt;Dominant endpoint platforms benefit from network effects that grow with every deployment. CrowdStrike&apos;s Threat Graph &lt;a href=&quot;https://www.crowdstrike.com/en-us/blog/how-log-structured-merge-trees-enable-crowdstrike-to-process-trillions-of-events-per-day/&quot;&gt;processes trillions of events daily&lt;/a&gt; across its entire customer base, and each new customer &lt;a href=&quot;https://seekingalpha.com/article/4857835-crowdstrike-the-hidden-network-effect-in-cybersecurity&quot;&gt;adds telemetry that sharpens detection for all others&lt;/a&gt;. Microsoft &lt;a href=&quot;https://www.microsoft.com/en-us/corporate-responsibility/cybersecurity/microsoft-digital-defense-report-2025/&quot;&gt;processes over 100 trillion security signals per day&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Competing against this scale of data requires different data, not volume:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Halcyon &lt;a href=&quot;https://siliconangle.com/2024/11/25/halcyon-nabs-100m-block-ransomware-capsule-neural-networks/&quot;&gt;reached a $1B valuation&lt;/a&gt; with an architecture trained exclusively on ransomware attack patterns, a specialization depth that general-purpose platforms optimize away.&lt;/li&gt;
&lt;li&gt;In contrast, Deep Instinct &lt;a href=&quot;https://tracxn.com/d/companies/deep-instinct/__6kHoli0PjisliZkOtNROLXKb6zTRj6cntk1zYQlGmHA&quot;&gt;raised $322M&lt;/a&gt; to &lt;a href=&quot;https://techcrunch.com/2020/02/12/deep-instinct-nabs-43m-for-a-deep-learning-cybersecurity-solution-that-can-suss-an-attack-before-it-happens/&quot;&gt;compete on general endpoint detection with deep learning&lt;/a&gt; and has since &lt;a href=&quot;https://www.deepinstinct.com&quot;&gt;pivoted to data security&lt;/a&gt;, illustrating the difficulty of matching the platforms&apos; breadth with funding alone.&lt;/li&gt;
&lt;li&gt;Cybereason&apos;s trajectory, &lt;a href=&quot;#defensibility-determines-the-exit-terms&quot;&gt;discussed below&lt;/a&gt;, reinforces this pattern.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Other opportunities to compete with platforms are in the areas they&apos;re not designed to cover, such as the proliferation of AI agents in enterprise environments. This category is early enough that the incumbents do not yet have a data moat, which creates a window similar to what CrowdStrike found when EDR was nascent.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Questions on AI and data strategy:&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What proprietary data can the startup accumulate that incumbents with larger customer bases will find difficult to replicate?&lt;/li&gt;
&lt;li&gt;Does the product&apos;s AI advantage target a specific threat category, or does it compete broadly against platforms with vastly more training data?&lt;/li&gt;
&lt;li&gt;If the product depends on third-party AI models, what percentage of its value proposition survives if a platform vendor adds similar capabilities?&lt;/li&gt;
&lt;li&gt;If the startup is targeting an emerging category such as AI agent security, can it build a data advantage before the incumbents enter?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Incumbents own the budget and the channel.&lt;/h2&gt;
&lt;p&gt;A startup&apos;s competition is often not another vendor but an existing budget commitment. Enterprise buyers typically operate under multi-year contracts, and displacing an incumbent means justifying the switching costs, staff retraining, and software redeployment. Even at renewal, cyber insurance discourages change. Many insurers now &lt;a href=&quot;https://www.coalitioninc.com/topics/5-essential-cyber-insurance-requirements&quot;&gt;list EDR among baseline underwriting requirements&lt;/a&gt;, and a buyer already satisfying that requirement with an existing tool has little incentive to risk a transition.&lt;/p&gt;
&lt;p&gt;Prospective customers may already have endpoint security through their Microsoft E5 agreement, making Defender a competitor they perceive as &quot;free.&quot; Microsoft has extended this bundling to AI capabilities by &lt;a href=&quot;https://learn.microsoft.com/en-us/copilot/security/security-copilot-inclusion&quot;&gt;including Security Copilot in E5 at no additional cost&lt;/a&gt;, further raising the floor that startups must clear. However, E5&apos;s Security Copilot allocation is &lt;a href=&quot;https://learn.microsoft.com/en-us/copilot/security/security-copilot-inclusion&quot;&gt;capped at modest levels&lt;/a&gt;, creating room for startups offering deeper AI capabilities.&lt;/p&gt;
&lt;p&gt;Distribution is the other constraint. At scale, VARs, MSSPs, and MDR providers control which products enterprise buyers see and how fast they get deployed. An MDR vendor can bypass a startup&apos;s product entirely by bundling technology with staffing into a managed service, so the buyer never evaluates standalone alternatives. For example, Sophos &lt;a href=&quot;https://www.sophos.com/en-us/press/press-releases/2025/02/sophos-completes-secureworks-acquisition&quot;&gt;acquired Secureworks for $859M&lt;/a&gt; and &lt;a href=&quot;https://www.sophos.com/en-us/press/press-releases/2025/05/sophos-msp-elevate-program-0&quot;&gt;defends over 18,000 MSP-managed customer environments&lt;/a&gt;. A startup selling to those SMBs must convince the MSP, not the end customer.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Questions on budget and distribution:&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Is the prospective customer under a multi-year endpoint security contract? If so, when does it expire, and what would justify an early switch?&lt;/li&gt;
&lt;li&gt;Does the customer&apos;s cyber insurance already require EDR? If so, what argument would persuade them to switch from a tool that already satisfies that requirement?&lt;/li&gt;
&lt;li&gt;Is the customer already using Microsoft Defender through an existing E5 agreement? If so, what is the startup&apos;s displacement argument?&lt;/li&gt;
&lt;li&gt;Would the customer spend on an MDR service rather than a standalone product? If so, how does the startup&apos;s offering compare to that alternative on a total cost of ownership basis?&lt;/li&gt;
&lt;li&gt;What is the startup&apos;s go-to-market strategy? Direct enterprise sales, channel partnerships through MSSPs and MDR providers, or product-led growth?&lt;/li&gt;
&lt;li&gt;If the startup targets SMBs rather than enterprises, how does its strategy account for the &lt;a href=&quot;https://zeltser.com/smb-security-product-strategy&quot;&gt;different distribution and pricing dynamics&lt;/a&gt;?&lt;/li&gt;
&lt;li&gt;Does the product address a regulatory requirement (NIS2, DORA, SEC disclosure rules) that existing platforms do not satisfy?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Defensibility determines the exit terms.&lt;/h2&gt;
&lt;p&gt;Building a new endpoint platform is exceptionally difficult today. For most startups in this space, the realistic best outcome is acquisition on favorable terms. The difference between a strong exit and a distressed sale comes down to defensibility, timing, and leverage.&lt;/p&gt;
&lt;p&gt;Today&apos;s incumbents are harder to displace than the previous generation. Symantec and McAfee &lt;a href=&quot;https://www.computerworld.com/article/2546495/antivirus-software-market-jumped-13-6--in-2005.html&quot;&gt;held 72% combined AV market share in 2005&lt;/a&gt; but were architecturally locked into on-prem, signature-based detection.&lt;/p&gt;
&lt;p&gt;Today&apos;s dominant platforms are cloud- and AI-native and don&apos;t carry the architectural debt that created their own opening a decade ago. Displacing them requires either a comparable paradigm shift or a niche they have not prioritized.&lt;/p&gt;
&lt;p&gt;The track record is instructive. Cylance pioneered AI-based prevention but was &lt;a href=&quot;https://techcrunch.com/2024/12/16/blackberry-sells-cylance-for-160m-a-fraction-of-the-1-4b-it-paid-in-2018/&quot;&gt;acquired by BlackBerry for $1.4 billion&lt;/a&gt; in 2018 and &lt;a href=&quot;https://www.securityweek.com/blackberry-sells-cylance-to-arctic-wolf-for-160-million-after-buying-it-for-1-4-billion/&quot;&gt;resold to Arctic Wolf for $160 million&lt;/a&gt; in 2025, an ~89% decline. Cybereason competed broadly on general EDR, &lt;a href=&quot;https://www.crunchbase.com/organization/cybereason/company_financials&quot;&gt;raised over $900 million in total funding&lt;/a&gt;, reached a &lt;a href=&quot;https://www.calcalistech.com/ctechnews/article/sk7lt5sxn&quot;&gt;~$3 billion valuation&lt;/a&gt;, and was &lt;a href=&quot;https://www.cybereason.com/press/levelblue-to-acquire-cybereason&quot;&gt;eventually acquired&lt;/a&gt; at a fraction of that peak.&lt;/p&gt;
&lt;p&gt;Carbon Black went public, was &lt;a href=&quot;https://techcrunch.com/2019/08/22/vmware-acquires-carbon-black-for-2-1b-and-pivotal-for-2-7-billion/&quot;&gt;acquired by VMware for $2.1 billion&lt;/a&gt; in 2019, then absorbed into Broadcom&apos;s portfolio where it &lt;a href=&quot;https://www.csoonline.com/article/1310164/broadcom-pauses-sale-of-carbon-black-as-euc-deal-goes-through.html&quot;&gt;reportedly could not find a buyer willing to meet its asking price&lt;/a&gt;. SentinelOne, the sole independent public company from this cohort, has seen its &lt;a href=&quot;https://www.macrotrends.net/stocks/charts/S/sentinelone/market-cap&quot;&gt;market capitalization fall substantially&lt;/a&gt; from its 2021 peak.&lt;/p&gt;
&lt;p&gt;Becoming a platform is not impossible, but the conditions that enabled CrowdStrike and SentinelOne to emerge no longer exist in the same form. For most founders, the more honest strategy is to position for strategic acquisition with enough differentiation to have leverage. Security teams evaluating a startup with this trajectory should ask what happens to their deployment after the acquisition closes, and whether the product&apos;s roadmap is shaped by customer needs or by exit timing.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Questions on defensibility and exit:&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Is the startup positioning for strategic acquisition, or does it have a credible and funded path to becoming a platform? How does that choice shape its product roadmap?&lt;/li&gt;
&lt;li&gt;Does the company have sufficient funding to deliver on its promises, or a reasonable path to obtaining it?&lt;/li&gt;
&lt;li&gt;Which platform vendors would benefit from acquiring the product&apos;s capability, and are there at least two?&lt;/li&gt;
&lt;li&gt;What would a customer lose by switching to a competitor or a platform&apos;s bundled alternative?&lt;/li&gt;
&lt;li&gt;If the startup is acquired, what happens to the customers? Will they face forced migration, feature stagnation, or integration into a platform they don&apos;t use?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;A rubric for the startup&apos;s position.&lt;/h2&gt;
&lt;p&gt;The following table can help assess whether the startup is pursuing a defensible gap in the endpoint security market. Score the startup against each factor. Those that cluster in the &quot;Needs Rethinking&quot; column are likely building a feature, not a company. My &lt;a href=&quot;https://zeltser.com/security-product-creation-framework&quot;&gt;guide for creating cybersecurity products&lt;/a&gt; covers the broader product strategy framework that applies beyond endpoint security.&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Factor&lt;/th&gt;
&lt;th&gt;Defensible Niche&lt;/th&gt;
&lt;th&gt;Vulnerable Position&lt;/th&gt;
&lt;th&gt;Needs Rethinking&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Differentiation&lt;/td&gt;
&lt;td&gt;Addresses gap platforms have not covered&lt;/td&gt;
&lt;td&gt;Incremental improvement over existing&lt;/td&gt;
&lt;td&gt;Feature platforms will bundle&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Technical depth&lt;/td&gt;
&lt;td&gt;Hard to replicate (novel research, unique data)&lt;/td&gt;
&lt;td&gt;Moderate complexity&lt;/td&gt;
&lt;td&gt;Commodity technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Platform relationship&lt;/td&gt;
&lt;td&gt;Complementary; platforms want to acquire&lt;/td&gt;
&lt;td&gt;Ambiguous; could coexist or conflict&lt;/td&gt;
&lt;td&gt;Directly competitive with bundled feature&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Independent evidence&lt;/td&gt;
&lt;td&gt;Validated by MITRE, AV-Comparatives, or incidents&lt;/td&gt;
&lt;td&gt;Supported by analyst coverage&lt;/td&gt;
&lt;td&gt;Supported only by marketing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AI/data advantage&lt;/td&gt;
&lt;td&gt;Proprietary data flywheel that compounds with customers&lt;/td&gt;
&lt;td&gt;Dependent on third-party models or public data&lt;/td&gt;
&lt;td&gt;No data advantage over platforms&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Acquirer interest&lt;/td&gt;
&lt;td&gt;Multiple platforms bidding for the capability&lt;/td&gt;
&lt;td&gt;Niche interest&lt;/td&gt;
&lt;td&gt;No clear acquirer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Founding team&lt;/td&gt;
&lt;td&gt;Shipped endpoint security products before&lt;/td&gt;
&lt;td&gt;Adjacent security experience&lt;/td&gt;
&lt;td&gt;No relevant domain experience&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</content:encoded></item></channel></rss>