Making Thankful Customers

I have so many things to be thankful for this year including my family, our investors, customers, partners, contributors, advisers and employees but after spending a few weeks on the road meeting with awesome customers and prospects, I wanted to take a moment on this...

Math for Calculating Tool ROI

We are often asked how we are able to calculate metrics as described here: And demonstrated/explained here: In this installment I will explain how you can calculate Return on Investment of any security tool using reclaimed FTE labor hours as the purchase...

Building a DevSpecOps Team

As I have had opportunity to demonstrate our product to cybersecurity veterans I am often asked “How did your very small team do this when larger, well-funded teams cannot?” It is true, the WitFoo development team has never been larger than 5 active members at any...

Innovative Path to Funding

WitFoo was founded by veterans of the US Military, law enforcement and cybersecurity in February 2016 to research, enhance and equip the craft of cybersecurity operations. Over the last two years, we have raised more than $1M in capital from almost 100 individual...

Hypnosis of your Tech

We started WitFoo because we were moved by the pain we were seeing on the faces of our customers in previous endeavors. We knew that there had to be fundamental changes to how security software supported the craft. We decided we would study, listen and follow the...

Making Thankful Customers

I have so many things to be thankful for this year including my family, our investors, customers, partners, contributors, advisers and employees but after spending a few weeks on the road meeting with awesome customers and prospects, I wanted to take a moment on this...

read more

Math for Calculating Tool ROI

We are often asked how we are able to calculate metrics as described here: And demonstrated/explained here: In this installment I will explain how you can calculate Return on Investment of any security tool using reclaimed FTE labor hours as the purchase...

read more

Building a DevSpecOps Team

As I have had opportunity to demonstrate our product to cybersecurity veterans I am often asked “How did your very small team do this when larger, well-funded teams cannot?” It is true, the WitFoo development team has never been larger than 5 active members at any...

read more

Innovative Path to Funding

WitFoo was founded by veterans of the US Military, law enforcement and cybersecurity in February 2016 to research, enhance and equip the craft of cybersecurity operations. Over the last two years, we have raised more than $1M in capital from almost 100 individual...

read more

Hypnosis of your Tech

We started WitFoo because we were moved by the pain we were seeing on the faces of our customers in previous endeavors. We knew that there had to be fundamental changes to how security software supported the craft. We decided we would study, listen and follow the...

read more

GA ISSA Talk: People > Machines

I am looking forward to speaking at the Georgia Annual ISSA Meeting on 11/15. The blog series that the talk is based on is below. Part One: History Part Two: Algorithms & Machine Learning Part Three: Cognition vs AI Part Four: Playbook Automation Part Five: Humans...

read more

Lessons in InfoSec Graph Theory

One of the areas we research heavily at WitFoo is how to reduce the number of investigations our customers have to perform each day. Internally, we call this the "n" problem. Another area of focus is how to reduce the amount of time our customers spend on each...

read more

People > Machines (Part Five)

Human Success via Tools Better detection mechanisms through algorithms (code) & machine learning (pattern recognition) are valuable tools to the human responders. Playbook Automation can reduce the routine and certain tasks an analyst must perform so she can focus on...

read more

People > Machines (Part Four)

Playbook Automation in Incident Response An emerging concept in 2017 is “Playbook Automation.” What is Playbook Automation? Playbook automation collects data from different security and logging tools and makes decisions on behalf of the incident responder. Data...

read more