Zenaciti Blog

What is Wrong with CISOs?

What is Wrong with CISOs?

What is wrong with Chief Information Security Officers (CISOs)? They are stressed, angry, and frustrated. What has CISOs so miserable? ...
Selling to Technically Savvy Buyers

Selling to Technically Savvy Buyers

Closing a deal with a technically savvy buyer is tough. Here is how to do it ...
Surviving the Startup Crash

Surviving the Startup Crash

The startup crash is upon us. After 27 years being a CEO, I survived a few crashes. Along the way ...
Can the Metaverse Overcome Its Obstacles?

Can the Metaverse Overcome Its Obstacles?

The Metaverse is an expansive, overhyped realm with some massive obstacles to overcome before it can gain widespread acceptance ...
How to Kill a Startup

How to Kill a Startup

Startups are fragile, founders are flawed. Ten ways startups fail, and how to avoid those death sentences ...
How to Improve Remote Workforce Accountability

How to Improve Remote Workforce Accountability

Holding remote workers accountable is not the same as when they are face to face in the office. Here are ...
Image Sources: Shutterstock

The Most Important Part of Security Automation is Neither Security nor Automation

Success with security automation starts with a decidedly low-tech practice ...
All-Consuming Cloud

All-Consuming Cloud

Cloud platforms are not only gobbling up new customers, but they are also consuming new markets, including security ...
Source: Shutterstock, Leremy

Toxic Corporate Cultures are Driving the Great Resignation

Low pay and bad benefits are not the only thing driving workers to join the Great Resignation. Bad behaviors and ...
Cloud Eats Security

Cloud Eats Security

By 2030 the large cloud service providers like AWS, Azure, and GCP will consume the market for security tools and ...
6 Reasons Unpatched Software Persists in the Enterprise

6 Reasons Unpatched Software Persists in the Enterprise

Patching is like flossing -- everyone knows they should do it, yet too few do it often and well. Explore ...
Secrets of Successful Vendor Negotiation

Secrets of Successful Vendor Negotiation

Negotiating with vendors does not have to be tense. It can be the genesis of a lasting, rewarding partnership ...
Harassment Marketing

Harassment Marketing

Desperate for sales, high-tech companies are becoming dangerously over-aggressive with email and on-line marketing ...
Big Hairy Questions: Strategies for Technical Due Diligence (Part 2)

Big Hairy Questions: Strategies for Technical Due Diligence (Part 2)

Ten strategies that technical due diligence analysts use to uncover your product's weaknesses. (Part 2 of 2) ...
Big Hairy Questions: Strategies for Due Diligence (Part 1)

Big Hairy Questions: Strategies for Due Diligence (Part 1)

Ten strategies that technical due diligence analysts use to uncover your product's weaknesses. (part 1 of 2) ...
Beware of Zero Trust Hype

Beware of Zero Trust Hype

Zero Trust is a ridiculously overhyped word these days that gets slapped on everything including products, features, cloud services, and ...
Standardizing Security

Standardizing Security

For all the innovation in information security, there is little to no standardization.  ...
How to Pivot a Startup

How to Pivot a Startup

Building a business often requires making drastic direction changes. After pivoting my business three times, I figured out the tricks ...
Writing Hacks

Writing Hacks

Ten hacks you can use to instantly make your writing more readable ...
Discovering SQL Injection

Discovering SQL Injection

Find out about how Zenaciti CEO "discovered" SQL Injection in 1995, and how it lead him to start a security ...
Nobody Can Give You Time

Nobody Can Give You Time

Nobody can give you time. We all have the same amount of time per day. Here are some ideas to ...
Hang the Sales Person

Hang the Sales Person

Why are "leaders" complaining so much on social media about salespeople? ...
How to Get (Technology) People to Like You

How to Get (Technology) People to Like You

If you are an introvert, it can be difficult to connect with people. After a few decades of being a ...
Just Keep Swimming

Just Keep Swimming

Losers focus on winners. Winners focus on winning ...
What Makes a Great Security Leader?

What Makes a Great Security Leader?

What makes a great cybersecurity leader? While knowing hacking tools might be cool, they do not translate into leadership skills ...