Search

Diary of a Data-Driven Product Manager

Some notes about Big Data Analytics, Linux, Product Marketing, Cloud, Mobile, Security and Venture Capital

CyberFlow Analytics: Anomalytics for Internet of Things Networks

Cybercrime is more organized than ever before. If you are in the industry of Cybersecurity, you see everyday more and more companies that are victims of a highly coordinated DDoS attack or you see highly-targeted data breach, which cost 3.8 million like average. So, if hackers are getting more sophisticated, companies that are want to be protected, need to take a bold approach and to make contracts for a robust security programs for this. Greg Day and Bryce Boland, from FireEye, made a great post explaining how to quanlify the economic return from Cybersecurity solutions; and based in this approach, I think that every serious company with Enterprise customers need to think deeply on this.

But, How could you take this approach? Is any available solution to provide Real-Time detection of attacks? The simple answer is: YES. The not-so-simple answer is a little more complicated: to accomplish this difficult task, a modern Cybersecurity solutions needs to be based in the principles described by Dr. Hossein Eslambolchi (former Head of Research at AT&T Labs and a well known Cybersecurity expert): 3P (Proactive, Preventative and Predictive). Many security solutions could fulfill the first P, but the next two are more complicated, because here is where comes to play Advanced Analytics using Data Mining and Machine Learning techniques in Real-Time. This combinations of techniques and methods, could be something Dr. Eslambolchi defined like: Anomalytics. What is this, and more importantly, who is in the frontline of Anomalytics? Keep reading to find out.

Continue reading “CyberFlow Analytics: Anomalytics for Internet of Things Networks”

Why #SecurityEverywhere M&A strategy by Cisco is Remarkable

Reading the recent news from Cisco about its intent to acquire OpenDNS made to think about the strategy behind this group of acquisitions that the company have been doing since 2013. Every report that you read about Cybercrime is saying the same: Hackers don’t sleep, and they are always finding new ways to steal your data, or to crack your Mobile device, or use your laptop or computer like part of a highly sofisticated botnet. For example, there is the report from Juniper Research that said that “Cybercrime will Cost Businesses Over $2.1 Trillion by 2019”, where they found found that the majority of these breaches will come from existing IT and network infrastructure, but there is an increasing interest in the Internet of Things (IoT) and mobile devices, so to be prepared for this inmmediate future, organizations need to be creative, looking for the best platforms to be protected. And to which company they will begin to look? That’s why Cisco wants to become in the de-facto partner to call, covering every corner of the Security business. How they are doing this? Keep reading.

Continue reading “Why #SecurityEverywhere M&A strategy by Cisco is Remarkable”

Duo Security + Gem: Zero Trust for the Cryptocurrency World (aka: Bitcoin)

Some days ago, I was talking with a friend of mine about new technologies which could redefine in the upcoming years how we will work, live and make business, and certain word came to the conversation like a bomb: Bitcoin. I’m an avid reader for tech news and sites, spending a lot of time reading articles from Nathaniel Mott at Pando about Security and Net neutrality, discussing topics from a recent article from First Round’s Review (BTW: the last one about Hacking Sales with Inbound Marketing is amazing), and many others good resources about tech. I trust in Pando like a one of the best and sincere platforms for sharing information about Startups, Venture Capital and more topics. So, when I began to search information about what is Bitcoin, and which companies are working hard in this space, so I went again to Pando looking for the basics. Following this idea, I found very interesting articles from Dennis Keohane, talking about the new funding raising of Circle, one of the most interesting Bitcoin startups:

“With Goldman Sachs’ investment, Circle — and by proxy Bitcoin — gets a huge uplift in visibility outside of the smaller venture capital community. While General Catalyst and Accel carry weight in the world of entrepreneurs and fast-growth startups, the approval of a multinational investment bank like Goldman, even with all its baggage, is a signal of Bitcoin’s arrival in the consciousness of the financial world at-large.”

or one of Michael Carney (right now he is a partner at Upfront Ventures) talking about Gem, the Bitcoin Security startup based in Venice, California:

Gem’s stated goal has been to eliminate the learning curve for bitcoin developers, while allowing the industry to adopt best-in-class security standards to store, encrypt, and backup end user bitcoin assets, without deep expertise in cryptography or security. The company’s API does exactly this by making a comprehensive set of security solutions available at the push of a button. Crucially, Gem never needs to take possession of end-user funds, meaning that relationships between consumer and developer go un-interrupted.

These articles made me to wonder why Bitcoin doesn’t reach a major adoption for consumers, and I began to getting deep in this though, and after a deep information search, the answer came in front of me: “The Blockchain needs more to become in a more secure horse and Bitcoin companies need to be more serious with users credentials security”, and it seems that it matters for a broad adoption.

Then, I started to search more focused in this problem, looking for info about Bitcoin hacks around the world, and for my surprise, the list is very large. Even, there is a forum topic at Bitcointalk describing a very good complication of the most famous hacks and heists. One of the most famous hacks was Mt. Gox Bitcoin exchange, giving to hackers the shocking number of $460 Million; so when you see creepy things like this one, you become in an instant skeptical person about Bitcoin; but this idea is changing quickly with companies like Circle, Coinbase and Gem; because they are putting an incredible grade of resources and expertise to create Bitcoin-based secure platforms.

Continue reading “Duo Security + Gem: Zero Trust for the Cryptocurrency World (aka: Bitcoin)”

Duo Security: the company you need to protect your Mobile users

If you read my last post about how I integrated Redis, PostgreSQL and Neo4j, you should have noted that I use CentOS with SELinux activated in all my servers, because I know the costs behind a massive data theft, and all we have learnt this in a hard way. If you are in tech, you should remember the hacks at Target, Sony Entertaiment, Home Depot; the recently discovered vulnerabilities like VENOM, FREAK and the Logjam bug; or the news from Google shutting down its Chrome platform; or the news about the massive security risks in Lenovo’s PCs; or the three vulnerabilities discovered in Internet Explorer and the Trapwot Marlware by Palo Alto Networks’s Unit 42 Threat Intelligence team (BTW: incredible newsletter focused in Security alerts) and the list grows exponentially with time.

It´s not just in U.S; in the APAC region, the cyber battle is ruthless too. FireEye released an amazing research report in April describing how a cyber threat group (they called APT30) exploited governments and commercial entities across Southeast Asia and India for almost a decade, and more recently they worked with Microsoft in a new report, where they exposed a new Obfuscation tactic used on Microsoft TechNet, where they determinated that APT17, a China-based advanced persistent threat group was behind the attempt. This battle is getting more serious every second in every corner of the world, and there is one particular area where attacks are more sophisticated and common: targeting Mobile users and apps.

If you are one of my loyal readers, you should know that I’m a Statistics fan, and precisely, the numbers about cybersecurity in the well known Mary Meeker´s 2015 Internet Trends Report are simply shocking (Slides 88 and 89):

and there are many companies which are Mobile-First companies that are vulnerable to all this. But, my friend, still there are people out there which is working very hard to help you to secure your Mobile apps. FireEye for example, made a strategic partnership with Samsung Knox to protect Galaxy S6 users, based in their mobile threat protection products; already I’ve talked about Lookout and Palo Alto Networks, Red Hat’s approach to make the best Enterprise Linux distribution with a big thinking in security, OpenDNS with its Umbrella platform for protecting user from many forms of attacks in your corporate network, and more vendors. But, I will talk here about a new competitor in the space which is redefining how Mobile-First companies like Facebook, Uber, Etsy, are securing their respective apps with Two-Factor Authentication (2FA), and it seems they are doing a very good job on it, because every day, many organizations are more interested in the services they provide. Surprisingly for me, they are not based in California, their HQs are in Ann Arbor, Michigan and its name is: Duo Security.

Continue reading “Duo Security: the company you need to protect your Mobile users”

Integrating Redis, PostgreSQL and Neo4j in CentOS 7

Recently, working for a new client here at UCI, we began to think in an internal Social Network, focused in educational purposes where students, researchers, teachers and more, could have an online space to discuss trends, make comments, give online talks, etc. My team was in charge to define the Data Model of the platform, and of course, to define the completed strategy to the new Data infrastructure behind the platform. We are a big fans of CentOS (and RHEL of course), for its incredible stability, performance and amazing security features through SELinux, the security project sponsored by Red Hat, available in many Linux distributions today, but in CentOS and Fedora, there is the last policy version (# 28) which is the most updated version of it.

We began to dig in the data model, and we saw an opportunity to create a new kind of data storage solution, using PostgreSQL like the center of the hub; but making interactions with NoSQL solutions focused in fast in-memory read/writes and of course, to be able to store the social interaction among the members of the network like a graph. So, we began to test Redis and Neo4j for these particular tasks. This post is to explain how we did it.

Continue reading “Integrating Redis, PostgreSQL and Neo4j in CentOS 7”

10 Companies with Mobile-related services to skyrocket your Career

Thinking in testing the LinkedIn’s blogging platform, I was planing since the last week to publish a post about Career Management, and talking to my one of my friends, came the idea to create a list of 10 companies with Mobile-related services to skyrocket a professional career. This kind of post is perfect for LinkedIn, so I made two. You can visit my LinkedIn’s profile to read them:

Enjoy them and let me know what do you think with a comment in the posts. Thanks for reading.

SEA Thoughts: Mobile Enterprise opportunities and Venture Capital

If you are one of my followers at Twitter, you should note I’m a big believer of the Southeast region. I’m always reading and looking for interesting news from this group of countries. One of the numbers that have impressed me is the accelerated growth of Mobile subscriptions. This area has an amazing potential to grow almost every industry which could take advantage from Mobile devices, apps and its related ecosystem. All these trends are being heard and used by entrepreneurs and investors, and everyday we hear a new Venture Capital deal from well known investments firms. So, I want to start a new section in the blog called: SEA Thoughts, where I will expose interesting news related to Mobile, Cloud and Big Data Analytics sectors in Southeast Asia, and this is my first post focusing in one of my favorite sectors: Mobile.

Continue reading “SEA Thoughts: Mobile Enterprise opportunities and Venture Capital”

What I Learned using Buffer for my own Social Media Marketing Strategy

If you are one of my followers at Twitter (@marcosluis2186), you should note that I’m a Buffer fan. This incredible tool and its ecosystem has allowed me to grow my personal brand in every major Social Media platform using its clean UI and its powerful analytics dashboard. I’ve been using Buffer for a while since I returned from my previous work in Venezuela, where I was a HootSuite Ambassador for LATAM. Don’t make wrong: HootSuite is a great Social Media Management platform, but it’s not made for my country, for the characteristics of Internet connections here, and HootSuite is based in Adobe Flex and ActionScript, which is very heavy in terms of network data use and speed here; instead Buffer which has a clean and simple dashboard with a small fingerprint using HTML5 and CSS 3 mainly, united to they use Amazon CloudFront like its CDN to distribute its static files around the world, and it’s works great. But these are not the unique features why I use Buffer everyday now; there is more benefits if you get in this boat. Keep reading.

Continue reading “What I Learned using Buffer for my own Social Media Marketing Strategy”

Red Hat + Docker + Databricks: The Triple Partnership to dominate Cloud Analytics

Yesterday, I was reading the Docker newsletter from March 12, and I saw a lot of interesting links about how many people use Docker for several purposes. One of the writeups that picked my curiosity was a post written by Kenny Bastani called “Getting Started with Apache Spark and Neo4j using Docker Compose”. This article described in a simple manner how to use Apache Spark and Neo4j using a Docker-based image for it. Then, I began to search about Apache Spark in the Enterprise and in the process, I stopped in the Databricks site. This incredible team has developed an easy way to create an Apache Spark cluster with Databricks Cloud, which allows to deploy Spark As a Service in an unified Cloud-hosted data platform.

Apache Spark aims to become The Platform for Big Data for its incredible performance, ease of use and built for fast result delivery. Then, I spent almost a day reading everything I could about Apache Spark, and I found this great article at LinkedIn written by Kavitha Mariappan (VP of Marketing at Databricks), where she described why every company interested to extract value using from Apache Spark, could use Databricks Cloud for it.

Then, I began to think in the long term for Databricks Cloud making questions like: What about the new development trend to “Dockerize” everything? Docker containers is an amazing way to provide a fast, secure and clean way to deploy Enterprise applications; so what about if Databricks and Docker work together to create a Docker-based image to deploy Apache Spark quickly? But, beyond that, for all this, you need a strong base for this, and the recent release of Red Hat Enterprise Linux 7.1 is perfect for this; for its new Atomic Host offering, a version of the battle-tested Enterprise Linux distribution optimized to run Containers-based applications; combined with the Real-Time version, which could be a great complement for an Apache Spark cluster for its needs for low-latency response times for its distributed architecture. But, which benefits could bring to the world a collaboration among these great companies? Keep reading to find out.

Continue reading “Red Hat + Docker + Databricks: The Triple Partnership to dominate Cloud Analytics”

My favorite talks from Lucene/Solr Revolution 2014

After several weeks very busy in the job, I´ve had a short amount of time to write a post. In the past days, I have worked with Apache Solr, the de-facto Open Source platform for Enterprise Search applications, because I´m leading a new team for a new Search application for a client, and of course, the first reference is this incredible piece of software. I have to thank to Andy Wibbels (CMO) and Max Bunag (Sales Director – Southwest US, APAC and LATAM) from Lucidworks team, who helped me to find the right content about Solr’s scalability and performace tuning. In this “search”, I found the amazing talks in the past Lucene/Solr Revolution event, focused entirely in Lucene and Solr, and this post is about my favorite talks in this event.

Continue reading “My favorite talks from Lucene/Solr Revolution 2014”

Blog at WordPress.com. | The Baskerville Theme.

Up ↑

Follow

Get every new post delivered to your Inbox.

Join 2,050 other followers