Telegraph Hill Blog

4 Steps to Cloud Security on a Startup Budget

Today’s startups increasingly rely on the cloud for their tech infrastructure and thus an IT and cloud security environment that differs significantly from traditional managed servers and network firewalls. Public cloud adoption will grow 18 percent this year alone,...

read more

Lean Startups and Business Data Quality

Lean practices mean non-functional requirements like business data quality, information security, and test automation get relatively little attention at first. Firms employing lean focus on what’s most important to customers today and de-emphasize planning and...

read more

Fintech: Is the Bubble Deflating?

The head of innovation at Wells Fargo, Steve Ellis, is sort-of quoted here as saying "fintech sector could see a dot-com-style shakeout similar to what occurred in 2000".   Telegraph Hill has a lot of experience within Fintech, here is my take: Hype vs Real Finance...

read more

Minimal Viable Information Security

Technology startups are different from going concerns, not least of which is their approach to information security risk. Here are my observations on how cyber risk management evolves in a startup, along with a caveat emptor to potential customers of startups. Risk...

read more

Human Capital Trends by Deloitte

Equating your human workforce with “capital” is only slightly less demeaning than referring to them as “meat”.  Still, this report by Deloitte deserves some attention:  Here's my summary: TREND 1....

read more

Cyber Security, John Donne and IOT

Here's my summary of a cyber security essay by Bruce Schneier, a premier thought leader on security for public consumption.  As a former English major, I'm using a meditation from John Donne as our guide: “No man is an island, entire of itself; every man is a piece of...

read more

Business-first Cyber Security

Staffed by elite cyber security experts, Telegraph Hill Software offers an approach to business-first security similar to that described here by McKinsey.  But we packaged our security consulting for remote delivery to firms throughout the United States that cannot...

read more

Beyond the obvious security steps

All complex systems, whether physical or human or information security, increasingly fail because of multiple co-existing faults: "Of the 400+ reports received [US Army internal investigation], the most significant [information security] vulnerability found was,...

read more

IoT Hygiene

Another thoughtful post by <a href="http://" target="_blank" rel="noopener">Schneier on the recent DDOS attack that caused extensive Internet outages.  The attack made use of consumer IoT devices to attack a DNS service provider named Dyn who, it is...

read more

AI War for Talent

An actual practitioner echoes some points we made here in this HBR article.  There's a war for such talent because applying AI and making money is not trivial.  A good quick...

read more