Wednesday, May 9, 2018

pivot to crypto

Deep Node has pivoted to crypto trading tools. Check out streamscope! I've been working on algorithmic trading for crypto currencies and will be embedding live signals into streamscope when it's ready.

Tuesday, May 30, 2017

My father, Mark Lindquist, has made a great movie about the Timewell. Somehow his interviewing techniques brought out the deepest thoughts I have about it.

Friday, July 22, 2016

Architecture Redux

Perhaps architecture is simply the attainment of leverage over time. Developers become most productive when they have lain a foundation that allows them to hook into things already built. As an artist would have - a library of techniques, objects, building blocks... tinker toys. These devices can comprise a foundation... because they operate within consistent constraints. They (the devices) capture principles which are the only things we can rely on to guide us as we attempt to gain leverage into the future. Arkowitz

Saturday, February 13, 2016

So Norse is pretty much dead. The question in my mind is... why was this pretty picture up on a screen in SOC after SOC around the world? It wasn't a practical or actionable visualization. Hey, anyone out there with a blank screen now... hit us up, we'll put a real picture of the live activity of your own network on it.

Thursday, December 10, 2015

The team at Deep Node has created a fun Random Product Name Generator. Please enjoy!

Giant IT corporations, along with an increasing number of VC-backed companies who spend all their money on marketing using the same confusing salad of words, are ensuring that the market for cyber security products is a gigantic mess of FUD and bogus promises of protection via product. Buy this thing, it will protect you.

It's BS.

Deep Node fights for the users. Our users are the real protection, as they slog their way through the mountains of alerts generated by the detection products, attempting to construct the narratives of who is doing what - who is hacking whom, and when, and how.

Monday, November 16, 2015

"Skills Gap": The Need for New Software

Cyber Security Skills Gap Musings

Remember when desktop publishing opened up layout capabilities to the masses? Or the more recent expansion of access to video editing and publishing capabilities... YouTube is a place where anybody can publish whatever they want. It wasn't always like this.

The expanded access to content creation and publishing has to do mostly with the emergence of software which is usable by mere mortals.

In every discipline, and especially in cyber security, there are experts and savants. Folks who just live within their field, and probably couldn't do anything else. Maybe they are so good because of the way their brains are wired; maybe they found themselves in the field early in their lives and were molded to it. Whatever the case, these high-performing savants and alpha geeks have formed powerful internal modes of thought tailored specifically to their fields. They outperform everyone else and, whether intentionally or not, create a mental wall around their excellence. Those who cannot interact with the alpha geeks within the requisite thought mode are outsiders, customers, supplicants, or in the way.

I believe this is largely due to the need to have a shared conceptual model. But I'm getting ahead of myself a little bit. First comes the individual. The intelligent person who could choose from among many different fields, and be effective given the right training and tools. How does this person access a conceptual model for something as complex as cyber security? How does this person find a toehold in cyberspace from which to expand knowledge? People learn best when some core part of a discipline starts to make sense to them and they can relate the rest of the discipline to that principle or practice.

The tools at hand for the nascent cyber operative are primitive with respect to user interface and conceptual modelling. Just getting Snort running can be a nightmare. Capturing and looking at packets with tcpdump or wireshark is not for the uninitiated. The entire suite of standard cyber security tools is esoteric and difficult to grasp. Just as in the disciplines of video creation and desktop publishing, cyber security will benefit from software which makes the core concepts and data accessible in the form of an interactive conceptual model. Now the individual has a toehold and can interact in order to learn.

As people become comfortable with a new conceptual model for cyber security, as implemented within software, they are now able to collaborate with each other... because they now share the conceptual model. They have a shared context within which to discuss issues and illustrate facts. The wall falls down.

Call it a pivot. I no longer think of Deep Node's Timewell as just a cyber security tool. I think of it as software for training people and establishing a shared conceptual model of cyberspace.