Product Posts

Signal Sciences / Fastly integration update on Risky.Biz Pod

Had a great chat with Patrick Gray on the Riskybiz Podcast about the acquisition of Signal Sciences by Fastly! Really enjoyed having the opportunity to talk about how our post-acquisition integration strategy, how we’re growing and scaling the business, and the challenges of security at scale. Been a long time fan of this show and really nice to actually make an appearance! https://risky.biz/snakeoilers14pt1/

Avoiding the Silo: Bridging the Divide Between Security + Dev Teams

Had a lot of fun joining Adrian Sanabria Jeff Man and Larry Pesce on Paul Asadoorian’s Security Weekly podcast and sharing some thoughts on how to bridge the gap between Security and Development teams in both traditional and cloud native environments. Can’t wait for the next time! 

The New Rules for Web App and API Security

Was excited to be able to share some thoughts in this ebook about how the speed of your security tools controls your team’s response time during an attack attempt. Get the ebook to see more! https://fastly.us/2ScDRnu 

Product Led Growth with Gainsight Founder Mickey Alon and VP Product Ciara Peter

I found a super helpful podcast from SaaStr (YouTube video here) featuring Gainsight’s CTO and VP product. They shared a bit about their framework and tactics for product led growth trials which I found extremely informative and easily applicable. Some takeaways: Growth team = growth marketing + growth product management with PQL being the interlock point. growth marketing focuses on getting users to sign…

Using Operating Cadence to Drive Company Alignment with David Sacks

I discovered David Sacks on the All-In Podcast late last year along with the other Besties and through the pod realized that he has a ton of SaaS operating experience, with COO roles at Paypal and CEO roles at Yammer. I then discovered a post on setting up an operating cadence that he wrote on SaaS which I found helpful and I thought I’d…

Acquired by FSLY for $775M!

I wanted to keep around a few screenshots of all the media coverage this week of the news. Needless to say, this is terrific news for us and extremely gratifying personally. I think my favorite quote is from the investor call: Thank you so much, and congratulations to all of you, all around. I mean, this combination to me seems like is natural as…

The Killer App for Edge Computing in 2020 will be Kubernetes

Edge computing is aptly named. Aside from the literal reference to its network boundary location, edge computing represents the next frontier of innovation—the nascent space where anything can happen and the possibilities seem endless. Even with standards and use cases just beginning to emerge, the industry buzz is deafening. But what will the tipping point look like? Where is the killer app that will…

Keeping Serverless Data Safe

The push to the cloud has introduced a previously unknown level of agility to many organizations, but sometimes at the expense of data security. Human error often is the cause of cloud security blunders, putting sensitive data at risk and causing real damage to companies in terms of financial liability and loss of reputation. This webinar discusses some of the more overlooked aspects of…

Ship Smart Apps with Dumb Pipes

This is a video of my tech talk at Pivotal Spring One Platform, a developer conference that took place October 7-10, in Austin, TX. Abstract: As more companies adopt microservices and cloud native application architectures, the network becomes abstracted away by container management platforms like Kubernetes and service meshes platforms like Istio, giving developers more flexibility and agility and less networking concerns.   But…

Stacking the Deck Against the Competition

In Geoffrey Moore’s Crossing the Chasm he recommends a key framework for establishing niche market dominance called Creating the Competition. What he means is to frame your product in such a way that you have a distinct market and a distinct product differentiation, while using your competitors to help educate your prospects on your positioning in both. The market alternative is the incumbent in…

HTTP Request Smuggling

An interesting exploit was published at BlackHat 2019 this year by Portswigger’s James Kettle. It is interesting because of the implications to several things I am working on regarding reverse proxies as well as my experience working with CDNs. The summary of the exploit is that the HTTP standard allows two conflicting header fields that are used to define the behavior of multiple requests…

How Kubernetes Virtualizes Compute, Storage, and Networking

Kubernetes is the hotness in the cloud/virtualization space right now. The last time I really was able to focus on virtualization was when Openstack was the hotness, (which feels like it wasn’t that long ago). Though I have had a general idea of what Kubernetes is and what it does, I haven’t felt comfortable with the various elements of abstraction at the hardware and…

Loading…

Something went wrong. Please refresh the page and/or try again.