Great post by Brad Feld pulling together the book info and 2 great videos.
I have the book on order from Amazon and will start reading right after this one.
I have been trying to kick of my own year thinking about how to implement some of this ASAP.
It started with my new notebook, tracking my day better and having clear goals.
Anyway – these videos are a great place to start!
Book: Principles by Ray Dalio – Feld Thoughts
Come see my good buddy Dwi and New Relic in Singapore :: https://newrelic.com/rsvp/singapore-exec-drinks-16-11-17
DarkTrace never ceases to amaze.
Check this report :: https://www.darktrace.com/resources/wp-global-threat-report-2017.pdf
Technological innovations keep businesses dynamic and pro table, their employees productive and creative, and their premises exciting and modern. A North American casino recently installed a high-tech sh tank as a new attraction, with advanced sensors that automatically regulate temperature, salinity, and feeding schedules.
To ensure these communications remained separate from the commercial network, the casino con gured the tank to use an individual VPN to isolate the tank’s data. However, as soon as Darktrace was installed, it identi ed anomalous data transfers from the sh tank to a rare external destination.
Anomalous activity detected:
- Transfer of 10GB outside the network
- No other company device had communicated with this external location
- No other company device was sending a comparable amount of outbound data
- Communications took place on a protocol normally associated with audio and video
The tank’s communication patterns included sporadic communications with company devices, but that activity was in line with similarly con gured IoT devices. The external data transfers, however, were deemed highly unusual by Darktrace’s AI algorithms.
The data was being transferred to a device in Finland where an attacker had managed to gain control over the tank. This was a clear case of data ex ltration, but far more subtle than typical attempts at data theft.
By targeting an unconventional device that had recently been introduced into the network, the attack managed to evade the casino’s traditional security tools. Darktrace’s Enterprise Immune System detected the threat because the technology does not make assumptions about where threats will arise. It detected a subtle anomaly that indicated a much larger threat, and it aided the casino in remediating the vulnerability. The incident demonstrates the need to have complete visibility of every user and device – including internet-connected sh tanks.
Enjoyed this deck from my good buddy Isaac.
Great points about how BI kicks off and the different roles and evolution of it within startup world. I wish as a product guy I had more time to get good at BI since it really takes going deep, time and a team all aligned on the same BI goals.
Much to do…