Lenny Zeltser
@lennyzeltser.com
📤 2346
📥 375
📝 38
Builder of security products and programs. Teacher of those who run them.
https://zeltser.com
We told employees to "be suspicious" of links they needed for work. Now we're adding "be careful with AI" to the awareness curriculum. Teaching when to escalate works better than teaching what to fear.
https://zeltser.com/ai-influence-awareness-training
loading . . .
Awareness Training Won't Protect Employees from Their Own AI Tools
When an AI tool influences an employee's decision, audit logs record the human's action and miss the AI's role. Addressing that blind spot requires escalation procedures and engineering controls that go beyond what awareness programs can deliver.
https://zeltser.com/ai-influence-awareness-training
1 day ago
0
2
0
When designing security products, how to best accommodate human and AI user personas? Now's the time for product builders to adjust their approach:
https://zeltser.com/designing-for-humans-and-ai
loading . . .
Designing Security Products for Humans and AI Agents
AI agents are quickly joining humans as personas that use enterprise security products. Vendors who understand how to support all their users, from analysts to agents, will build products that fit how teams actually work.
https://zeltser.com/designing-for-humans-and-ai
3 days ago
0
0
0
When an AI tool recommends an action and an employee carries it out, audit logs capture a legitimate human decision. The AI's role disappears. Addressing that blind spot takes more than awareness training.
https://zeltser.com/ai-influence-awareness-training
8 days ago
0
2
2
A security product becomes harder to displace when each persona finds value in their own view, from SOC analysts to execs to AI agents. Designing for all of them is a stronger advantage than a longer feature list.
https://zeltser.com/designing-for-humans-and-ai
8 days ago
0
0
0
We invest hours analyzing a security risk, and that effort makes us overvalue the recommendation. An executive who hasn't shared that analysis weighs the same risk differently, and they might be right.
https://zeltser.com/rejected-security-recommendations
9 days ago
0
1
0
Are we winning the fight against cyber attackers? It's the wrong question. Framing the attacker-defender dynamic as a war fuels hype and leads to the wrong investments.
loading . . .
The Eternal Cycle of Cybersecurity
The fight between cyber attackers and defenders resembles an ecological cycle between predator and prey—the goal is equilibrium, not victory. Being complacent is risky because maintaining balance requ...
https://zeltser.com/participating-in-the-eternal-cycle-of-cybersecurity
17 days ago
0
2
1
We scope security assessments along organizational lines, but attackers don't stop where one team's budget ends. Following attack logic instead of org charts closes the gaps.
loading . . .
Scope Security Assessments for Attack Paths, Not Org Charts
When assessment scope follows organizational lines, gaps open where team boundaries meet and real attackers don't stop. Pulling adjacent teams into the scoping conversation and following attack logic ...
https://zeltser.com/security-assessment-scope
18 days ago
0
1
0
Love them or hate them, SOC 2 reports have become table stakes for SaaS deals. But the framework leaves the vendor in control of the system boundary and auditor selection, which means the reports vary drastically in rigor.
loading . . .
Understand the Reality of the SOC 2 Checkbox
SOC 2 standardized security reporting, but it left the vendor in control of the system boundary and auditor selection. Understanding that structural gap helps vendors and buyers get the most value fro...
https://zeltser.com/soc2-checkbox-reality/
about 1 month ago
0
1
0
Is a security product company building a true platform or a suite? The distinction clarifies where to invest, how to measure progress, and what competitive advantage to pursue. Here's my guidance for deciding which approach is best, including a look at CrowdStrike, Okta, and Palo Alto Networks.
loading . . .
Most Cybersecurity Products Aren't Platforms and It's OK
The test for a genuine platform is whether each new addition makes everything else more valuable, not just whether products share a brand or console. Recognizing which dynamic the architecture support...
https://zeltser.com/what-platform-means-cybersecurity
about 1 month ago
2
4
1
Who'll win this year's RSAC Innovation Sandbox? I used my custom AI framework to score each finalist's market readiness across 8 dimensions and built detailed profiles. 4 companies clustered clearly ahead. See if you agree:
loading . . .
RSAC 2026 Innovation Sandbox: Finalist Analysis - Lenny Zeltser
Transforming security ideas into business outcomes.
https://zeltser.com/media/rsac-2026-sandbox
about 1 month ago
1
0
0
My guide for endpoint security startups is out now. The path between competing against entrenched platforms and becoming a feature they bundle is narrow. I got to know this space at Minerva Labs (now part of Rapid7), but much has changed since then.
loading . . .
Competing in Endpoint Security: A Guide for Startups
There are areas where endpoint security startups can build viable, useful products, but those openings shift as adjacent categories converge and incumbents absorb new capabilities. Founders, buyers, a...
https://zeltser.com/endpoint-security-startup-questions
about 1 month ago
0
1
0
My new guide on building security products for SMBs. The go-to-market has shifted heavily toward MSPs and VARs, channel concentration creates real dependency risk, and AI readiness among MSPs is lower than the hype suggests.
loading . . .
Building Security Products for SMBs
Building security products for SMBs differs from enterprise markets in distribution, pricing, and product design. Vendors who merely repackage enterprise solutions at a lower price point struggle, whi...
https://zeltser.com/smb-security-product-strategy
about 1 month ago
0
1
0
I published a 4-point approach for succeeding as a CISO, based on my experiences building and leading a security program at a high-growth company. It shows how to focus on the defender's advantage and escape the unending cycle of reacting to vulnerabilities and responding to attackers' advances:
loading . . .
What Being a CISO Taught Me About Security Leadership
A four-point framework to succeeding as a CISO, based on my experiences of building and leading a security program at a high-growth company. It shows how to focus on the defender's advantage and escap...
https://zeltser.com/ciso-leadership-lessons
about 1 month ago
3
5
0
Good tech alone doesn't make a successful security product. I created a guide covering the strategic questions founders and product managers should answer early, drawing on my experience as both a CISO and a product manager.
loading . . .
A Practitioner's Guide for Creating Cybersecurity Products
Strong technology alone doesn't make a successful security product. This guide presents the strategic questions that security product managers and startup founders should answer early, covering market...
https://zeltser.com/security-product-creation-framework
about 1 month ago
0
1
0
Security leaders are often trapped in endless assessments and opinion-giving without driving actual change. Staying busy with spreadsheets, dashboards, and emails doesn't move the organization forward. Here's how we can break out of the "Chief Opinion Officer" mode:
loading . . .
From Chief Opinion Officer to Action-Taker
Security leaders who only assess risks and express concerns operate as Chief Opinion Officers rather than change agents. Delivering outcomes requires agreeing with colleagues on what's real, deciding ...
https://zeltser.com/chief-opinion-officer-to-action-taker
about 2 months ago
0
4
2
reposted by
Lenny Zeltser
Help Net Security
2 months ago
REMnux v8 brings AI integration to the Linux malware analysis toolkit 📖 Read more:
www.helpnetsecurity.com/2026/02/17/r...
#cybersecurity
#cybersecuritynews
#Linux
#malwareanalysis
#opensource
@lennyzeltser.com
loading . . .
REMnux v8 brings AI integration to the Linux malware analysis toolkit - Help Net Security
REMnux, a specialized Linux distribution for malware analysis, has released version 8 with a rebuilt platform based on Ubuntu 24.04.
https://www.helpnetsecurity.com/2026/02/17/remnux-8-linux-malware-analysis-toolkit/
0
1
1
Which malware analysis toolkits and frameworks should you consider including in your workflow? Here's my overview:
loading . . .
Free Toolkits and Frameworks for Malware Analysis
Open-source sandbox platforms, analysis environments, and AI-assisted tools let you build your own malware analysis capability without commercial licenses. Options include CAPEv2, DRAKVUF Sandbox, REM...
https://zeltser.com/malware-analysis-tool-frameworks
2 months ago
0
3
1
The new REMnux MCP server connects AI agents to 200+ malware analysis tools on REMnux. I was surprised at the depth of investigation it delivers. Most of my time went into capturing how I approach the analysis and providing guidance to AI at the right time, so it can think and adapt as it works.
loading . . .
Using AI Agents to Analyze Malware on REMnux
To analyze malware effectively, AI agents need practitioners' expertise and access to the analysis tools. The REMnux MCP server provides both, connecting AI to 200+ tools on REMnux with guidance on wh...
https://zeltser.com/ai-malware-analysis-remnux
2 months ago
0
8
5
What if the CISO's real job is calibrating the right amount of insecurity? Frame the role around that and you become an enabler, not an obstacle. The acronym still works.
loading . . .
The Chief Insecurity Officer
What if the CISO's job isn't to maximize security but to calibrate the right amount of insecurity? Reframing the role this way turns security leaders from obstacles into enablers of business velocity.
https://zeltser.com/chief-insecurity-officer
3 months ago
0
2
0
I released a free tool to generate animated, annotated replays of text conversations, so you can embed them in articles, training, and docs. For example, it's a nice way to explain influence tactics of a social engineering scam. See it in action:
loading . . .
Interactive Replays of Conversations: A New Tool
Conversation replays add an engaging dimension to training materials and docs. Save the conversation and your annotations in a data file, then use my tool to generate a self-contained HTML player you ...
https://zeltser.com/interactive-replays
3 months ago
1
4
0
How to give AI raw incident notes and get a solid draft of an IR report? Now you can point your AI tool at my MCP server for guidance based on proven writing principles. Your data isn't shared with my server; it only provides guidance.
loading . . .
Write Good Incident Response Reports Using Your AI Tool
I released an MCP server to give your AI expertise to write good IR reports from raw notes or to get constructive feedback on existing content. You can replicate my approach to codify your own experti...
https://zeltser.com/good-ir-reports-with-ai
3 months ago
0
1
0
I released a tool for making your website or docs easily available to AI assistants via an MCP server. This helps ensure people's AI tooling can access the latest details at the right time. For instance, this is how REMnux users now can get info about its malware analysis tools.
loading . . .
Publishing Your Website Content to AI Assistants
When people ask AI assistants about your product or project, they often get outdated information. Here's how to publish your static website content directly to AI tools using Cloudflare Workers and th...
https://zeltser.com/publishing-to-ai-assistants
3 months ago
0
1
2
While cybersecurity and data privacy leaders have distinct expertise, their goals are aligned. Edy Glozman and I discussed how these functions can support each other based on our collaboration at Axonius:
zeltser.com/security-pri...
loading . . .
How Security and Privacy Teams Break Barriers Together
While cybersecurity and data privacy leaders have distinct expertise, our fundamental goals are aligned. By understanding each other’s perspectives and priorities, we can support each other to stre
https://zeltser.com/security-privacy-break-barriers/
10 months ago
1
3
0
Here are the key trends that cybersecurity leaders should keep in mind for our work in 2025:
loading . . .
The CISO’s Midset for 2025: Outcomes, Automation, and Leadership
As the year 2025 rushes forward, the responsibilities of CISOs are continuing to evolve. We increasingly recognize the importance of not just identifying risks but actively addressing them through di
https://zeltser.com/ciso-mindset-2025/
about 1 year ago
1
6
0
reposted by
Lenny Zeltser
Lesley Carhart
over 1 year ago
Terrible news today about the loss of Amit Yoran. He was a larger than life figure in cybersecurity and we will be lesser without him. May his family and friends find peace.
2
53
12
reposted by
Lenny Zeltser
Joshua Wright
over 1 year ago
Happy birthday to the unusual number of my cybersecurity friends who all have January 1st birthdays on Facebook! 🧐🧐🧐
0
8
1
reposted by
Lenny Zeltser
Elizabeth Smith
over 1 year ago
For those going home to visit family this weekend: • Samsung calls it Auto Motion Plus • LG calls it TruMotion • Sony calls it Motionflow • Roku calls it Action Smoothing • Google TV calls it Motion Enhancement • Vizio calls it Smooth Motion Effect.
422
17690
6647
reposted by
Lenny Zeltser
Yael N
over 1 year ago
Just because you’re good at a job doesn’t mean you’ll necessarily be equally good as the manager of people doing that job.
1
5
1
reposted by
Lenny Zeltser
Corey Quinn
over 1 year ago
You can keep up to date on which AI search companies haven’t bent the knee to Amazon pretty easily via their robots.txt:
0
24
2
reposted by
Lenny Zeltser
Royans Tharakan
over 1 year ago
PyPI adds digital attestations to bolster Python package security. #Python #PyPI #Security
loading . . .
PyPI Now Supports Digital Attestations for Package Security
PyPI adds digital attestations to bolster Python package security. #Python #PyPI #Security
https://blog.pypi.org/posts/2024-11-14-pypi-now-supports-digital-attestations/
0
5
3
reposted by
Lenny Zeltser
Jamie Levy 🦉
over 1 year ago
woot woot, we just got
@huntress.com
up. keep an eye out for new content there! 🥳🎉
1
18
4
reposted by
Lenny Zeltser
David Oxley
over 1 year ago
I’ve created a Starter Pack around cyber threat intelligence to make it easier to find that community here on Bluesky. Let me know of folks I missed, as I’m sure there are many!
go.bsky.app/TxQYHap
add a skeleton here at some point
32
186
74
Security teams' visibility allows us to help the company lower expenses while also decreasing risk. Reducing costs associated with unneeded user accounts and apps, for example, is another way for security leaders to add value:
loading . . .
Security Leaders Can Lower Expenses While Reducing Risk
As companies seek to optimize operations and constrain expenses, cybersecurity leaders worry about funding the projects we consider essential. Fortunately, in such an economic climate, we can achieve
https://zeltser.com/lower-cybersecurity-expenses-reduce-risk/
over 2 years ago
0
2
0
reposted by
Lenny Zeltser
Corey Quinn
almost 3 years ago
I am the greatest Prompt Engineer in the world.
13
116
38
How long until adventurous skiers replace their ski goggles with Apple Vision Pro?
almost 3 years ago
0
3
0
Kvetching about bad business and security practices is therapeutic, so I wrote this: Withholding SSO from customers is bad for business and security.
https://zeltser.com/witholding-sso/
almost 3 years ago
0
1
0
reposted by
Lenny Zeltser
Laura Helmuth
almost 3 years ago
We ran an editorial at Scientific American about the overwhelming evidence that school should start later. A teacher got his students to write to us & the school! changed! its! schedule!!!
https://www.scientificamerican.com/article/high-school-students-need-more-sleep-and-later-school-start-times/
loading . . .
High School Students Need More Sleep and Later School Start Times
After reading a Scientific American editorial on sleep and school start times, students and their teacher wrote to the editors about their experiences. Their district listened, and school will start later next year
https://www.scientificamerican.com/article/high-school-students-need-more-sleep-and-later-school-start-times/
9
104
39
I’m new here.
almost 3 years ago
1
1
0
you reached the end!!
feeds!
log in