Profile cover photo
Profile photo
Lenny Zeltser
Advances information security. Grows tech businesses. Fights malware.
Advances information security. Grows tech businesses. Fights malware.
About
Posts

Post has attachment
Technology and the role it plays in our lives continues to change. Our language evolves with it. This has clear implications for "cyber" terminology.

Post has attachment
On importance and challenges of communicating in plain English... and an exercise for improving writing skills that involves haiku.

Post has attachment
What's it like to perform security product management in large companies vs. startups? My perspective, based on 6+ years of experience of performing this work, after switching to product management from consulting.

Post has attachment
So much negativity in infosec lately. Lighten up! If you're hearing about many breaches, it's because people are increasingly focused on data security. If you see strong attack tactics, it's because defense advancements are forcing adversaries to improve. Keep up the fight.
Animated Photo

Post has attachment
Paul Miller points out that our interactions with technology are increasingly affected by the behind-the-scenes decisions and adjustments that the providers make without any approval or consultation with the users. If the essence of ownership is control, who truly owns cloud-managed devices?

Post has attachment
My new 1-page cheat sheet shares advice on product management of new tech solutions. Please share with your favorite product manager. I'd love some feedback on these tips.

Post has attachment
Solid advice from Mark D. Adams on how to behave at a social networking event. What to do and what not to do. The more people follow these basic etiquette rules, the more beneficial will the event be for all (or at least most) of its participants.

Post has attachment
What's it like to contribute at an early stage of a startup? Below are my reflections on the first few months I've spent at +Minerva Labs so far. I've outlined some takeaways in a generalized form that might benefit others in a similar position or those that are curious about entrepreneurial environments.

Post has attachment
This is my attempt to look beyond the "fileless malware" buzzword by exploring the malware that influenced how we use the term today.

Post has attachment
I attempted to follow the breadcrumbs trail that began with an official-looking fake invoice and led me to oblique firms in the Principality of Liechtenstein. This illicit and profitable campaign has been active for at least a decade, as far as I can tell.
Wait while more posts are being loaded