Cracking the Cyber Code with Evolving Perspectives of Cybersecurity

Welcome, readers, to another insightful episode of SecuriTea Time, a podcast curated for cybersecurity and tech folks.
Today, we have a distinguished guest joining us. Joshua Zweig, the co-founder of Zip Security, previously a Civil Liberties Engineer at Palantir Technologies, is here to share his expertise and insights into the ever-evolving world of cybersecurity.
Zip Security has made waves in the industry with its innovative approaches to safeguarding digital assets. We'll delve deep into the fascinating world of cybersecurity and explore the secrets behind Zip Security's success.
So, without further ado, let's dive right into this riveting episode of SecuriTea Time!
You can listen to the complete podcast here.
Nicholas Muy: As a co-founder of a security startup, what are your thoughts on Black Hat, the event where security professionals, hackers, and researchers gather to discuss and showcase the latest trends, vulnerabilities, and research in the field of cybersecurity?
Joshua Zweig: I haven't had the chance to attend Black Hat yet, but I find it fascinating. It's a significant event in the security industry, and it can have an impact on various aspects like investor interest and potential customers. These conferences are essential for our small industry, offering valuable networking and business opportunities. This year, we didn't go because our customers are often small security teams or companies without security professionals. However, I believe these events serve as a rallying point for the industry and provide opportunities for newcomers to break into the field. Despite the intimidating branding, there are resources available to help newcomers find their way, making these conferences valuable for anyone looking to enter the cybersecurity field.
Nicholas Muy: How do you see the cybersecurity industry evolving to address the challenges of making security solutions more accessible and manageable for a broader range of organizations and practitioners, considering the unique complexities it presents?
Joshua Zweig: Well, building a security company is a challenge. You really need to be disciplined in choosing your customer base. Security is unique; it's not like building any other company. There's this constant tension between raising money for a security company and managing expectations.
When you aim for billion or ten-billion-dollar outcomes, scale and scalability become critical. But here's the thing, security is, in essence, a property of systems. Every company, every system has unique properties and security requirements, which makes it exceptionally hard.
Sometimes, companies try to make everyone in the organization a security expert, but that doesn't work for everyone. It's not a silver bullet. So, you need to be disciplined, especially in the early stages, about choosing your customers.
You have to decide how deep you want to go into the details and what lessons apply to your entire customer base. Balancing scalability and depth is tricky for any company, but security adds an extra layer of complexity because it's deeply rooted in system properties.
Security products often require a high level of management. Almost everything in the security industry seems to have 'managed' before it managed security service provider, managed bots, and so on. It's because security products demand ongoing management, especially in areas like access controls where things are constantly changing.
The challenge is identifying repeatable problems and making them scalable. It's tough because not many companies are addressing this. Customers often buy security tools but struggle to implement them effectively. We need to make this easier; it's a big task for the next 5 to 10 years.
There's also a job gap in cybersecurity. We need people to handle the management, but it's not an easy role to fill because it's not part of the core business processes. So, we've got a significant job gap, and it won't be solved easily.
In summary, building a security company is complex, and simplification is essential. We need to make security work easier for practitioners and address the workforce development challenge in the cybersecurity field.
Nicholas Muy: You've mentioned the concept of making the cybersecurity problem significantly more accessible and manageable rather than just adding more professionals. Can you elaborate on how we might achieve this and what changes you think are necessary in the industry to make this approach effective? Additionally, how do you see the balance between security and a free society evolving in the context of cybersecurity?
Joshua Zweig: I remember our previous discussions about the "missing million" issue in cybersecurity. I hadn't heard it framed that way before, but I find it to be a brilliant perspective. When we consider the challenges in cybersecurity, simply adding more people might not be the silver bullet. Instead, we should explore making the problem significantly more accessible and manageable, potentially by several orders of magnitude.
Even a million additional cybersecurity experts, as significant as it sounds, may not fully address the problem when you consider the scale of the workforce and the broader industry. To put it in perspective, in a country like the United States with a population of around 350 million, having a million cybersecurity practitioners would still represent only a small fraction. Comparing this to other industries like trucking, where millions are involved, makes you question the feasibility of relying solely on increasing the workforce.
Furthermore, we must strike a balance between security and maintaining the principles of a free society, similar to how physical security is approached. It's essential to remember that cybersecurity primarily involves playing defense against adversaries who are constantly on the offensive. Understanding their tactics, budgets, and objectives is crucial for devising effective strategies in the cybersecurity landscape. This perspective offers valuable insights into how we should navigate the challenges and complexities of cybersecurity.
Nicholas Muy: A different approach to cybersecurity is needed, as the current model focuses on selling solutions that work well in perfect conditions, which are rarely encountered in real-world network environments. This underscores the need for a flexible and adaptable approach to cybersecurity. What are your thoughts?
Joshua Zweig: I believe it's essential to question the concept of perfection, especially in the context of modeling real-world situations. Many aspects of our work involve modeling social interactions, which inherently decay over time. It's crucial to shift our perspective from viewing this decay as a design constraint to considering it a design principle.
By embracing the complexity and unpredictability of these interactions, we can better serve our customers, as this complexity mirrors the real world. It's a shift in mindset that aligns our approach with the inherent nature of the world we're trying to understand and protect.
Nicholas Muy: The current trend of redundant integrations in security startups is costly and inefficient. We need innovative models to address challenges like data management more efficiently and reshape the industry. What do you think?
Joshua Zweig: I often think that while building a company like Slack may not directly seem like creating security features, you can essentially construct a security-focused company around elements like integrations and engineering. It's a nuanced challenge to brand yourself as a security company or not, especially in the cybersecurity sector.
Regarding government involvement in cybersecurity, it's been evolving significantly, especially in the past few years. In the early 2010s, cybersecurity was still a relatively new field, and the government was finding its footing. Recent initiatives like the DOJ's rewards for information leading to the capture of cybercriminals are intriguing. I read about a case where the FBI actively pursued hackers during a ransomware incident, highlighting the shift from just defense to actively targeting cyber threats, even within government ranks where insider threats can also pose significant risks. It's a complex landscape that continues to evolve.
Nicholas Muy: How do you envision the future of NIST 171 800 and similar frameworks in the context of evolving technology and potential shifts in the threat landscape?
Joshua Zweig: I often think about the future of NIST 171 800. It's a valuable framework but challenging for smaller organizations due to its cost and complexity. I believe the industry will make compliance easier through technology in the next five to ten years. However, I'm concerned about its relevance as technology evolves. Changes in underlying technology could alter the threat landscape, making current frameworks less effective. Additionally, rigid adherence to rules might overshadow broader security goals.
Nicholas Muy: Help me debunk the misconception that security programs aim for complete risk elimination. In reality, achieving absolute security is neither possible nor practical for businesses. Instead, should we strive for a balanced approach that effectively manages the most pertinent risks?
Joshua Zweig: My approach to security is to focus on addressing the 80% of cases that can have the most significant impact. Most people, including non-security professionals, find it challenging to pinpoint their top cybersecurity risks. It's a complex task because there are various threats to consider.
However, the goal isn't to be constantly worried about these risks but rather to identify the key ones and take appropriate actions to mitigate them. This typically covers about 80% of the security concerns and provides a solid foundation for protection.
Nicholas Muy: Could it be that security challenges are not due to a lack of effort but rather to the overwhelming complexity and resource constraints we face?
Joshua Zweig: Well, it'd be intriguing to define the contrapositive scenario the events we anticipate due to our prioritization efforts. I suspect this exercise isn't common in many organizations. Our industry could do a lot better job of thinking about the ways in which we can make things in all different pockets of security more accessible, whether that's in something like the stuff we're talking about here, something low levels like malware, or reverse engineering. It's something we ve been doing across the board, and I think this podcast has done a lot to help that out.
That concludes the highlights for this episode! Be sure to keep an eye out for the highlights of our next episode, where we'll continue exploring the realms of cybersecurity and compliance.
Ready to see what security-first GRC really looks like?
Ready to see what security-first GRC really looks like?
Ready to see what security-first GRC really looks like?
See what a real security- first GRC platform looks like
Ready to see what security-first GRC really looks like?
Focus on the traveler experience. We’ll handle the regulations.
Get Scrut. Achieve and maintain compliance without the busywork.
Choose risk-first compliance that’s always on, built for you, and never in your way.
Ready to see what security-first GRC
One platform, every framework. No more duplicate work.
You can’t manage user access if you’re always playing catch-up.
Explore the future of enterprise GRC
Tired of chasing vendors for risk assessments?
Join the thousands of companies automating their compliance with Scrut.
The right partner makes all the difference. Let’s grow together.
Make your business easy to trust, put security transparency front and center.
Risk-first security starts with risk-first visibility.
Secure your team from the inside out.
Don't settle for slow, expensive compliance. Get Scrut instead.
Risk-first compliance for forward-thinking teams.
Audits without the back-and-forth. Just seamless collaboration.
Scale fast. Stay compliant. Automate the rest.
Compliance? Done and dusted, in half the time.
Get ahead of GDPR compliance before it becomes a problem.
Outgrowing table-stakes compliance? Create custom frameworks with ease.
Navigate SOC 2 compliance, minus the stress.
PCI DSS compliance, minus the panic.
Take the wheel of your HIPAA certification journey today.
We’ve got what you need to fast-track your ISO 27001 certification.
Make your NIST AI RMF journey as smooth as possible.
Your GRC team, multiplied and AI-backed.
Modern compliance for the evolving education landscape.
Ready to simplify healthcare compliance?
Don’t let compliance turn into a bottleneck in your SaaS growth.
Find the right compliance frameworks for your business in minutes
Ready to see what security-first GRC really looks like?
Real-time visibility into every asset
Ready to simplify fintech compliance?
The Scrut Platform helps you move fast, stay compliant, and build securely from the start.
Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.
Scrut helps you streamline audits, close deals faster, and stay ahead of risk without slowing down your team. Because trust shouldn’t take months to earn.
Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.
Tag, classify, and monitor assets in real time—without the manual overhead.
Whether you're entering new markets or launching new products, Scrut helps you stay compliant without slowing down.
Scrut pulls compliance data straight from the tools you already use—so you don’t have to dig for evidence, chase approvals, or manually track controls.
Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.
With Scrut, you’re not just adding a tool to your offering—you’re adding a competitive edge. Join our Partner Network and help your clients streamline their GRC program.
Gaining trust is your first step to growing and cracking better deals. The Scrut Platform comes pre-built with all the tools you need to showcase a firm security posture and build confidence.
Don’t settle for rigid systems—Scrut ensures your risk management strategy is as flexible as your business needs.
Start building a security-first culture. Save your operations from improper training and a lack of compliance awareness.
Scrut fast-tracks compliance so you can focus on scaling, not scrambling. Automate compliance tasks and accelerate enterprise deals—without the grind.
Automate assessments, track compliance, and get full visibility into third-party risk—all in one place.
Scrut automates compliance tasks, supports proactive risk management, and saves you time, so you can focus on growing your business. Start building trust with customers and scaling confidently.
Leave legacy GRC behind. Meet the AI-powered platform built for teams managing risk and compliance in real time.
Give auditors direct access, keep track of every request, and manage audits effortlessly—all in one place.
Scrut ensures access permissions are correct, up-to-date, and fully compliant.
Whether you need fast results or a fully tailored program mapped to your risks and needs, Scrut delivers exactly what you need, when you need it. Ready to start?
Scrut unifies compliance across all your frameworks, so you can stop juggling systems and start scaling securely.
Manually managing your compliance processes and audits can get inefficient and overwhelming. Scrut automates these outdated, manual processes and eliminates your last-minute worries.
Access automated compliance, real-time risk tracking, and expert-backed support—all in one platform. Get started with Scrut!
Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.
The Scrut Platform helps you move fast, stay compliant, and build securely from the start.
Earn trust and back it up with solid evidence. Scrut takes you through the SOC 2 compliance journey step-by-step, navigating every complexity you face.
Manage your PCI DSS compliance with real-time monitoring and effortless automation. Get started with Scrut today!
Securing your PHI shouldn’t be a constant hassle. Scrut automates your workflows—from risk assessments to monitoring—so you can put your compliance worries on the back burner.
Automate security controls, simplify audits, and keep your ISMS aligned with the latest standards. Get started with Scrut!
Tackle potential AI risks with NIST AI RMF-compliant controls and get expert support every step of the way.
Offload the grunt compliance work to us. Execute manual, draining GRC tasks with the reliable AI-powered Scrut Teammates without switching contexts or bottlenecks.
Whether you're managing student data, partnering with educational institute, or expanding to new geographies—Scrut gives you the tools to stay compliant, manage risk, and build trust at every step.
Scaling healthcare doesn’t have to come at the cost of security. Scrut keeps your organization compliant, audit-ready, and protected—no matter how fast you grow.
Scrut automates the hard parts of compliance and security so you can move fast and stay ahead of risks from day one.
The Scrut Platform helps you move fast, stay compliant, and build securely from the start.
Growth in fintech comes with heavy scrutiny. Scrut helps you stay compliant, audit-ready, and secure—without slowing down your momentum.



