SlideShare a Scribd company logo
1 of 3
Download to read offline
Main players position themselves for VoIP
By Derek Abma
Voice over Internet protocol (VoIP) has captured the attention
of those in the technology and communications industry.
It’s a process that transforms voice into packets capa-
ble of being transmitted over Internet protocol net-
works, and there are new business opportunities being
created by it. Network equipment vendors are using it
to build more multipurpose infrastructure for carriers.
www.svn.ca
Bridging innovation gap for renewable energy Pg. 8 Life sciences the winner for VC activity Q1 2004 Pg. 9 Angels vs. VCs: No competition for start-ups Pg. 12
TELECOM:
WHAT DO
THE VCS
LOOK FOR?
WE ADVISE ENTREPRENEURS . . .
Fortune 1000 or start-up, the entrepreneurial spirit lies at the heart of your company.
Practical Legal Strategy . . . Timely Issue Identification . . . Efficient Execution . . .
www.weirfoulds.com To find out more, contact David Brown in Toronto at 416-947-5046 or dbrown@weirfoulds.com.
Volume 10, Number 5Volume 10, Number 5 June 28, 2004June 28, 2004
By Andrea Zoe Aster
Every venture capitalist prowls
for the next “disruptive technolo-
gy,” a breakthrough which pulls
the plug on a standard applica-
tion. It’s debatable whether
music downloads will ever
replace CDs, or if e-commerce
will ever replace shops—but dig-
ital cameras and mobile phones
are prime examples of the term.
Indeed, a recent round-up of
prominent VCs reveals common
enthusiasms. They were all
asked the same question: What
telecom or technology ventures
are inspiring your major invest-
ments?
“There are people under 30
who’ve only ever owned mobile
phones,” says John Piercy, man-
aging director at BCE Capital.
Indeed, mobile is the buzzword
which causes jaded VC ears to
perk up. What’s first on the wish
list? Young companies with the
brains to build diagnostic software
for smart phones. That’s because,
as mobile phones get smarter,
call-centre reps are increasingly
perplexed by service requests.
continued on page 10
Don’t sit on the fence
when taking risks
Michael Calyniuk, technology
market analyst, PwC
continued on page 7
Jeffrey Posluns
Chief Innovations Officer
WhiteHat Inc.
A serial entrepreneur who never
loses his focus.
See page 4
Jeffrey Posluns
Chief Innovations Officer
WhiteHat Inc.
A serial entrepreneur who never
loses his focus.
See page 4
PHOTOBY:JohnCarson/AndreaCivichino
4 • Silicon Valley NORTH June 28, 2004
By John Carson
“They won’t be too happy if I break my
leg!” quips Jeffrey Posluns as he hands over
his jacket and clambers up a rickety fence
for our photo shoot. But then again, he’s
not averse to taking risks, having founded
eight technology companies, investing in
two dozen more, authoring three IT books,
helping the RCMP bring an infamous teen
hacker to justice—and becoming a mil-
lionaire in the process. He’s still only 26.
The “they” he refers to is WhiteHat Inc.,
a Burlington, Ont.-based IT security
provider that Posluns works for three days
a week as its chief innovations officer, a
position he accepted in April along with a
percentage of the company and a develop-
ment team of 20 staff.
Some people are born with an entrepre-
neurial gene.
He started his first tech company at 14,
designing computer networks for small
businesses in Montreal. Five years later
Posluns founded Top-Five Inc. a Web site-
development company specializing in e-
commerce initiatives. He sold that in 1999
for “a bunch of money” from which he
allocated 15 per cent to share amongst the
staff.
“I make a point of doing that with every
company I’m involved with,” he explains.
“If not for the employees, I wouldn’t have
got to where I am.”
The next venture was a slight blip on the
resume. He co-founded information secu-
rity services firm SecureOps Inc. at 21 with
personal seed money of around $75,000
and some business loans.
“We went to a bunch of VCs, but the
problem at the time was the security mar-
ket was very young; few people understood
it,” he recalls. “I would have preferred a
strategic partner, as opposed to someone
putting in money for a percentage of the
company and then taking a lot of the con-
trol away from me.”
Motorola took 10 per cent of the com-
pany for $1 million, but about a year later
“the company started going in a direction I
disagreed with,” explains Posluns.
He got bought out, bounced back and
founded SecuritySage Inc. in 2002, a firm
offering custom security solutions to cor-
porate, government and law enforcement
agencies. In two years he grew the compa-
ny from five employees to over 100 in three
countries: “Canada, the US and London,
UK. The ‘fish and chips’ London,” he says
with a laugh.
It was during this period that he put on
his “white hat” (a slang term for a hacker
who, upon discovering a vulnerability in a
computer system, alerts the system vendor
to the problem) and assisted the RCMP in
catching one of the most infamous “black
hat” (think Mad Magazine’s Spy vs. Spy)
hackers in computer history: Mafiaboy.
Major Internet sites like Amazon and
Yahoo were crippled by the black hat hack-
er, causing an estimated US$1 billion in
damages.
“We wouldn’t know what the case was,
who was being investigated or what for,”
says Posluns. “Having had security clear-
ance for quite a while, they brought me two
pieces of code and asked me to analyse
them. Code like that would make its way
public quite quickly. It took us about a
month to find a location from where it
could be retrieved on the ‘Net.”
He explains that one of the tools found
in the code could be used to compromise a
specific type of server; the other sends out
tons of data with falsified source locations
making it look like millions of systems are
being used in an attack.
“That’s called Distributed Denial of
Service today—at the time it was just six
university computers,” recalls Posluns.
“The public was told it was a distributed
attack, but following the pathways on the
Internet from router to router, it’s deter-
mined that all the traffic is coming from
one particular spot.”
Shortly after, Mafiaboy—a 17-year-old
Montreal male—was arrested and sen-
tenced to eight months in a youth deten-
tion centre. Robert Currie, the RCMP staff
sergeant handling the investigation, pub-
licly thanked Posluns after the trial ended
for his code analysis expertise.
Currie elaborates: “Don’t be fooled by
Jeff’s calm veneer. He might appear calm,
cold and calculating, but underneath there
is a storm brewing; in fact, one of his nick-
names is Tempest. The driving force
behind him is doing things that no one else
has done before, or better... things that
someone tells him cannot be done.
“A technology challenge for Jeff is like a
red flag for a bull. I doubt we will see him
sitting in the same chair for more than a
few years,” he adds.
By necessity, the secretive and often
deceptive world of IT security has a large
presence in Posluns’ life. He has to keep
abreast of all major new threats, technolo-
gies and trends.
“Most people in the security area will
have a number of different aliases; less peo-
ple will talk to you if you’re a big corporate
type,” he says.“Some of my friends call me
by my alias as opposed to my real name!
“For example, a really great coder is
called Rainforest Puppy and very few peo-
ple know his real identity.” It’s noticeable
that Posluns refers to him as a“great coder”
while some Web sites refer to him as“hack-
er.” What shade of hat is he wearing when
showing admiration?
“There’s a large group of industry pro-
fessionals that get together once a month
over a beer and think of new ways to take
over the world. We’re all on the good guys’
side,” he reassures me.
So, was the Sasser worm good for busi-
ness?
“The only reason that viruses and
worms can be considered good is that they
raise public awareness. There’s only a lim-
ited number of mechanisms for security
exploits,” he replies.
“The biggest problem in security will
always be the users; the lack of desire of
non-IT personnel to conform to common
policies. Their job is to come into work,
provide a function, work on their comput-
er, communicate, write or whatever, and
then leave. It’s not their job to worry about
security, patching or whether their virus
definitions are up-to-date.
“I believe an added job function should
be to check for updates every morning.
Without enterprise-level software, that will
take under a minute. But it’s difficult to get
people to do so. The problem will continue
to be user- or policy-related for the next
few years,” he predicts.
Posluns also does some work for the
government, but is understandably vague
on the specifics. “We set up the secure
communications facilities between a num-
ber of different groups in government, and
intrusion detection systems. We’ve done
security policy work and audits.
“SecuritySage has had 15-20 large proj-
ects. There are also a lot of little ones. For
example, we may get a call such as: ‘In the-
ory, if there were a situation like this... what
would you do? It doesn’t exist, but in theo-
ry, what would you do?’”he says with a wry
smile.
What’s next on the horizon for a serial
tech entrepreneur? Surprisingly, it’s non-
security related.
He started Dev/Null Industries Inc. in
January to develop an online mall solution.
Some may see this as a risky project con-
sidering the plethora of e-shopping Web
sites, but Posluns is typically upbeat about
it.
“I wasn’t sure if this would be successful,
but decided to throw a little bit of money at
it because it’s interesting,” he says. “The
mall template is automatically generated,
you pick colours and graphics, and collect
a commission on every product sold. It’s
been doing phenomenally well in the few
months it’s been around. It’s still in beta
stage and we’re looking at a fall launch.
Right now we have Montreal, Toronto,
London, Boston and New York.”
Apart from that, where does Posluns see
the next opportunity coming from?
“I think there’s going to be a very big
overhaul in communications over the next
few years,” he says. “We are seeing the
beginning of a widespread deployment of
VoIP technologies. There’s a company [in
VoIP] that I’m in the process of finalizing
an investment in, taking a good percent-
age.”It’s worth watching where this modest
guy puts some cash—he seems to have the
knack of picking winners.
Next on his whirlwind itinerary is a con-
ference in Athens, business meetings in
Copenhagen, some well-deserved R&R in
Rome and to London for some fine dining.
Not fish and chips.
Jeffrey Posluns Chief Innovations Officer WhiteHat Inc.
“There’s a large group of
industry professionals
that get together once a
month over a beer and
think of new ways to take
over the world. We’re all
on the good guys’ side.”
Jeffrey Posluns
CIO, WhiteHat Inc.
PHOTOBY:JohnCarson/AndreaCivichino
2 • Silicon Valley NORTH June 28, 2004
Techs and the City
“If not for the
employees, I
wouldn’t have got
to where I am.
“
“Make it easy for
the VC to say
‘yes’ by focusing
on his needs, not
your wants.
“
“We believe that
VoIP can
become one of
the biggest
applications on
the Internet.
“
page 4
page 9
page 10
“There’s a grow-
ing tension
between angels
and VCs.
“
page 12
The words “unemployment,”“downsizing” and “layoffs” are unwelcome
additions to anyone’s vocabulary, especially in the technology arena where
workers can find themselves replaced by automatic production lines, off-
shore outsourcing and other business processes.
Ottawa has taken a few cold showers in the past couple of years, but local
support at the grassroots level and the findings of a Scottish study point to
signs of renewed vigour and a strong will to help the region get back on its
feet and heal the bruises. Like a prizefighter, the city’s technology morale
staggered, bounced off the ropes and has come out fighting.
Figures from Statistics Canada show that overall employment in Ottawa-
Gatineau stands at just over 607,000 for May, and a Manpower Inc. survey
in the second quarter of this year shows that 27 per cent of respondents plan
to hire.According to the Ottawa Centre for Research and Innovation’s semi-
annual technology survey released this month, the number of tech compa-
nies in the region has increased by six per cent to 1,585 while employment
levels increased by 500 people to 64,200.
Since January 2001, many groups of laid-off technology workers have
joined together to create peer networks focused on helping their members.
The need to co-ordinate activities led to the formation of the Ottawa Talent
Initiative (OTI).
The OTI is an organization composed of unemployed volunteers and the
community working together to create positive change for the unem-
ployed—and underemployed—technology workers in the Ottawa area.
I asked Dave Sproule, a founding member of the OTI, what he sees hap-
pening to the Ottawa tech employment scene from the grassroots level.
Improving or declining?
“While there have been some successes by individuals with correspon-
ding encouragement to the community, there have also been surprises,” he
says.“Due to the nature of the timeliness of statistical data, it is not easy to
quantify this into a trend.”
He goes on to say that the 18 key recommendations identified in the
OTI’s Community Action Plan released in May correspond to three main
strategies: grow jobs in Ottawa; immediate support for unemployed and
underemployed tech workers; provide assistance for those same people in
transitioning their skills to other sectors.
That’s the view from inside the ballpark; parties overseas have taken an
interest too from a positive stance.A study undertaken by a team of Scottish
researchers has highlighted some of the entrepreneurial processes involved
in the “emergence of Ottawa as a leading world technology cluster.”
The study was undertaken by Colin Mason and Sarah Cooper of the
Hunter Centre for Entrepreneurship at the University of Strathclyde in
Glasgow, and Richard Harrison of Edinburgh University Management
School. It was funded by the Canadian High Commission under its
Canadian Studies Program.
In the report Ottawa is cited as a world-class technology centre dominat-
ed by information and communications technology industries—notably
telecom equipment,semiconductors,software and emerging photonics and
life sciences clusters.More than 20,000 technology jobs were lost in 2001-02
as a result of redundancies from leading employers such as Nortel, Alcatel
and JDS Uniphase.
The authors mention the case of an entrepreneur who had been respon-
sible for establishing a new facility on behalf of his employer to develop a
new product line. Having set it up, he was“basically asked to knock it down
again because of a change in direction.”He formed his own small team, got
support from an extensive group of financial backers and exploited the
technology himself.
It’s a great example of seeing opportunity when senior management pull
the plug.
Success in Ottawa seems to hinge on incestuous business relationships.
Who have you worked for? Who do you know? As one VC is quoted in the
study:“This is a community where most of the people are spin-outs of spin-
outs. Two phone calls and I can find out everything...”
A British friend was unfortunate enough to hit the shores of Canada dur-
ing the moribund tech landscape of 2001. The timing was totally off; after
four months of vainly searching for a network support position he very
nearly cashed in his return ticket and left. But 3,500 miles is a long way to
come just to throw in the towel.
He took a pay cut, joined a small tech start-up, worked the hours and is
now considering starting his own enterprise. That’s the attitude that will get
Ottawa’s unemployed back to work, but only if the opportunity and will are
there.
As Denzil Doyle says in his column in this very issue: “If someone can
prove to me that the Ottawa area is a net acquirer of high tech companies, I
will dance a jig on the front steps of Parliament every Monday morning for
the rest of my life.”
Why should Ottawa be an acquirer? It should be supporting those
branching out on their own, starting new ventures. It takes guts to put your
own money—sometimes a redundancy payment—on the line and lay the
foundation for a start-up. If that means joining a like-minded community
of collaborators, or asking a VC to make those“two phone calls”then that’s
the way to go.
In its report entitled “Start Me Up: A Look at New Entrepreneurs in
Canada”released this month,CIBC Small Business demonstrates that start-
ups in Ontario are growing at a rate consistent with the national average,
but the graph shows it trailing all the other provinces except Quebec. Why
should this be? Is it a lack of motivation or funding?
With the report predicting 100,000 small business start-ups over the next
five years, I hope that the techs in the Capital region can contribute, play a
large role in the community and lead the way.
Don’t throw in the towel just yet. There’s still a few more rounds to go...
John Carson
Editor

More Related Content

What's hot

Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop
 
Why lawyers should care about bitcoin
Why lawyers should care about bitcoinWhy lawyers should care about bitcoin
Why lawyers should care about bitcoinDavid Smith
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Veber Fintech Event September 2016
Veber Fintech Event September 2016Veber Fintech Event September 2016
Veber Fintech Event September 2016Neil Laver
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteSandraPaiva
 
Technology Forecast - Driving Growth With Cloud Computing
Technology Forecast - Driving Growth With Cloud ComputingTechnology Forecast - Driving Growth With Cloud Computing
Technology Forecast - Driving Growth With Cloud ComputingPier Paolo Mucelli
 
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020Bernard Marr
 
The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017Exponential_e
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decadestudentinternetdeals33
 
25 Tech Predictions for 2020
25 Tech Predictions for 2020 25 Tech Predictions for 2020
25 Tech Predictions for 2020 TJR Global
 
WIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - MilanWIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - MilanPietro Leo
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in Insuranceminorifh
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)Felipe Prado
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006tom termini
 

What's hot (20)

Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Why lawyers should care about bitcoin
Why lawyers should care about bitcoinWhy lawyers should care about bitcoin
Why lawyers should care about bitcoin
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Article 4
Article 4Article 4
Article 4
 
Veber Fintech Event September 2016
Veber Fintech Event September 2016Veber Fintech Event September 2016
Veber Fintech Event September 2016
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 
Technology Forecast - Driving Growth With Cloud Computing
Technology Forecast - Driving Growth With Cloud ComputingTechnology Forecast - Driving Growth With Cloud Computing
Technology Forecast - Driving Growth With Cloud Computing
 
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
 
The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017
 
Wisekey kamp
Wisekey kampWisekey kamp
Wisekey kamp
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
25 Tech Predictions for 2020
25 Tech Predictions for 2020 25 Tech Predictions for 2020
25 Tech Predictions for 2020
 
WIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - MilanWIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in Insurance
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006
 

Viewers also liked

Recommendation Letter
Recommendation LetterRecommendation Letter
Recommendation LetterUmar Aslam
 
Design offer '' Alungoo queen'' in Khuvsgul
Design offer '' Alungoo queen'' in KhuvsgulDesign offer '' Alungoo queen'' in Khuvsgul
Design offer '' Alungoo queen'' in KhuvsgulAltantuya Sanduijav
 
Oficio parlamentar mda
Oficio parlamentar mdaOficio parlamentar mda
Oficio parlamentar mdaROGÉRIO ALVES
 
Slide Meeting With TNB
Slide Meeting With TNBSlide Meeting With TNB
Slide Meeting With TNBso fluffy
 
Arya Fitness Studio Logo
Arya Fitness Studio LogoArya Fitness Studio Logo
Arya Fitness Studio LogoAlexys Gonzalez
 
Ringling Bros. and the Asian Elephant: A Lifetime of Collaboration
Ringling Bros. and the Asian Elephant: A Lifetime of CollaborationRingling Bros. and the Asian Elephant: A Lifetime of Collaboration
Ringling Bros. and the Asian Elephant: A Lifetime of Collaborationcongresombian
 
DTEK50 by BlackBerry Spec Sheet
DTEK50 by BlackBerry Spec SheetDTEK50 by BlackBerry Spec Sheet
DTEK50 by BlackBerry Spec SheetBlackBerry
 
OpenStack Day Taiwan 2016 -Shintaro Mizuno
OpenStack Day Taiwan 2016 -Shintaro MizunoOpenStack Day Taiwan 2016 -Shintaro Mizuno
OpenStack Day Taiwan 2016 -Shintaro Mizunoshintaro mizuno
 
Identifying terminology
Identifying terminologyIdentifying terminology
Identifying terminologyChris Bailey
 
Final research vegan
Final research veganFinal research vegan
Final research veganElMarsh1
 
Fertilization in plants ( Double fertilization, syngamy, triple fusion.
Fertilization in plants ( Double fertilization, syngamy, triple fusion.Fertilization in plants ( Double fertilization, syngamy, triple fusion.
Fertilization in plants ( Double fertilization, syngamy, triple fusion.Sreekanth Dasari
 
Fashion Market in China
Fashion Market in China Fashion Market in China
Fashion Market in China Sami Muneer
 

Viewers also liked (16)

Recommendation Letter
Recommendation LetterRecommendation Letter
Recommendation Letter
 
Design offer '' Alungoo queen'' in Khuvsgul
Design offer '' Alungoo queen'' in KhuvsgulDesign offer '' Alungoo queen'' in Khuvsgul
Design offer '' Alungoo queen'' in Khuvsgul
 
Oficio parlamentar mda
Oficio parlamentar mdaOficio parlamentar mda
Oficio parlamentar mda
 
Slide Meeting With TNB
Slide Meeting With TNBSlide Meeting With TNB
Slide Meeting With TNB
 
Arya Fitness Studio Logo
Arya Fitness Studio LogoArya Fitness Studio Logo
Arya Fitness Studio Logo
 
Certificate_5
Certificate_5Certificate_5
Certificate_5
 
Getting started
Getting startedGetting started
Getting started
 
Profit By RPO
Profit By RPOProfit By RPO
Profit By RPO
 
Ringling Bros. and the Asian Elephant: A Lifetime of Collaboration
Ringling Bros. and the Asian Elephant: A Lifetime of CollaborationRingling Bros. and the Asian Elephant: A Lifetime of Collaboration
Ringling Bros. and the Asian Elephant: A Lifetime of Collaboration
 
DTEK50 by BlackBerry Spec Sheet
DTEK50 by BlackBerry Spec SheetDTEK50 by BlackBerry Spec Sheet
DTEK50 by BlackBerry Spec Sheet
 
OpenStack Day Taiwan 2016 -Shintaro Mizuno
OpenStack Day Taiwan 2016 -Shintaro MizunoOpenStack Day Taiwan 2016 -Shintaro Mizuno
OpenStack Day Taiwan 2016 -Shintaro Mizuno
 
Identifying terminology
Identifying terminologyIdentifying terminology
Identifying terminology
 
Bab 1 Persamaan diferensial
Bab 1 Persamaan diferensialBab 1 Persamaan diferensial
Bab 1 Persamaan diferensial
 
Final research vegan
Final research veganFinal research vegan
Final research vegan
 
Fertilization in plants ( Double fertilization, syngamy, triple fusion.
Fertilization in plants ( Double fertilization, syngamy, triple fusion.Fertilization in plants ( Double fertilization, syngamy, triple fusion.
Fertilization in plants ( Double fertilization, syngamy, triple fusion.
 
Fashion Market in China
Fashion Market in China Fashion Market in China
Fashion Market in China
 

Similar to profile_and_editorial

ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust modelCristian Garcia G.
 
Information Technology Security for Small Business (.docx
 Information Technology Security  for Small Business (.docx Information Technology Security  for Small Business (.docx
Information Technology Security for Small Business (.docxMARRY7
 
mbiz122710_bitsec
mbiz122710_bitsecmbiz122710_bitsec
mbiz122710_bitsecbitsec
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the YearTripwire
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 
Marketing the Law Firm - October 2016
Marketing the Law Firm - October 2016Marketing the Law Firm - October 2016
Marketing the Law Firm - October 2016Social Sweet Spot
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 

Similar to profile_and_editorial (20)

TME0212-49
TME0212-49TME0212-49
TME0212-49
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
 
Information Technology Security for Small Business (.docx
 Information Technology Security  for Small Business (.docx Information Technology Security  for Small Business (.docx
Information Technology Security for Small Business (.docx
 
mbiz122710_bitsec
mbiz122710_bitsecmbiz122710_bitsec
mbiz122710_bitsec
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Disrupt or be disrupted
Disrupt or be disruptedDisrupt or be disrupted
Disrupt or be disrupted
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
Marketing the Law Firm - October 2016
Marketing the Law Firm - October 2016Marketing the Law Firm - October 2016
Marketing the Law Firm - October 2016
 
Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 

profile_and_editorial

  • 1. Main players position themselves for VoIP By Derek Abma Voice over Internet protocol (VoIP) has captured the attention of those in the technology and communications industry. It’s a process that transforms voice into packets capa- ble of being transmitted over Internet protocol net- works, and there are new business opportunities being created by it. Network equipment vendors are using it to build more multipurpose infrastructure for carriers. www.svn.ca Bridging innovation gap for renewable energy Pg. 8 Life sciences the winner for VC activity Q1 2004 Pg. 9 Angels vs. VCs: No competition for start-ups Pg. 12 TELECOM: WHAT DO THE VCS LOOK FOR? WE ADVISE ENTREPRENEURS . . . Fortune 1000 or start-up, the entrepreneurial spirit lies at the heart of your company. Practical Legal Strategy . . . Timely Issue Identification . . . Efficient Execution . . . www.weirfoulds.com To find out more, contact David Brown in Toronto at 416-947-5046 or dbrown@weirfoulds.com. Volume 10, Number 5Volume 10, Number 5 June 28, 2004June 28, 2004 By Andrea Zoe Aster Every venture capitalist prowls for the next “disruptive technolo- gy,” a breakthrough which pulls the plug on a standard applica- tion. It’s debatable whether music downloads will ever replace CDs, or if e-commerce will ever replace shops—but dig- ital cameras and mobile phones are prime examples of the term. Indeed, a recent round-up of prominent VCs reveals common enthusiasms. They were all asked the same question: What telecom or technology ventures are inspiring your major invest- ments? “There are people under 30 who’ve only ever owned mobile phones,” says John Piercy, man- aging director at BCE Capital. Indeed, mobile is the buzzword which causes jaded VC ears to perk up. What’s first on the wish list? Young companies with the brains to build diagnostic software for smart phones. That’s because, as mobile phones get smarter, call-centre reps are increasingly perplexed by service requests. continued on page 10 Don’t sit on the fence when taking risks Michael Calyniuk, technology market analyst, PwC continued on page 7 Jeffrey Posluns Chief Innovations Officer WhiteHat Inc. A serial entrepreneur who never loses his focus. See page 4 Jeffrey Posluns Chief Innovations Officer WhiteHat Inc. A serial entrepreneur who never loses his focus. See page 4 PHOTOBY:JohnCarson/AndreaCivichino
  • 2. 4 • Silicon Valley NORTH June 28, 2004 By John Carson “They won’t be too happy if I break my leg!” quips Jeffrey Posluns as he hands over his jacket and clambers up a rickety fence for our photo shoot. But then again, he’s not averse to taking risks, having founded eight technology companies, investing in two dozen more, authoring three IT books, helping the RCMP bring an infamous teen hacker to justice—and becoming a mil- lionaire in the process. He’s still only 26. The “they” he refers to is WhiteHat Inc., a Burlington, Ont.-based IT security provider that Posluns works for three days a week as its chief innovations officer, a position he accepted in April along with a percentage of the company and a develop- ment team of 20 staff. Some people are born with an entrepre- neurial gene. He started his first tech company at 14, designing computer networks for small businesses in Montreal. Five years later Posluns founded Top-Five Inc. a Web site- development company specializing in e- commerce initiatives. He sold that in 1999 for “a bunch of money” from which he allocated 15 per cent to share amongst the staff. “I make a point of doing that with every company I’m involved with,” he explains. “If not for the employees, I wouldn’t have got to where I am.” The next venture was a slight blip on the resume. He co-founded information secu- rity services firm SecureOps Inc. at 21 with personal seed money of around $75,000 and some business loans. “We went to a bunch of VCs, but the problem at the time was the security mar- ket was very young; few people understood it,” he recalls. “I would have preferred a strategic partner, as opposed to someone putting in money for a percentage of the company and then taking a lot of the con- trol away from me.” Motorola took 10 per cent of the com- pany for $1 million, but about a year later “the company started going in a direction I disagreed with,” explains Posluns. He got bought out, bounced back and founded SecuritySage Inc. in 2002, a firm offering custom security solutions to cor- porate, government and law enforcement agencies. In two years he grew the compa- ny from five employees to over 100 in three countries: “Canada, the US and London, UK. The ‘fish and chips’ London,” he says with a laugh. It was during this period that he put on his “white hat” (a slang term for a hacker who, upon discovering a vulnerability in a computer system, alerts the system vendor to the problem) and assisted the RCMP in catching one of the most infamous “black hat” (think Mad Magazine’s Spy vs. Spy) hackers in computer history: Mafiaboy. Major Internet sites like Amazon and Yahoo were crippled by the black hat hack- er, causing an estimated US$1 billion in damages. “We wouldn’t know what the case was, who was being investigated or what for,” says Posluns. “Having had security clear- ance for quite a while, they brought me two pieces of code and asked me to analyse them. Code like that would make its way public quite quickly. It took us about a month to find a location from where it could be retrieved on the ‘Net.” He explains that one of the tools found in the code could be used to compromise a specific type of server; the other sends out tons of data with falsified source locations making it look like millions of systems are being used in an attack. “That’s called Distributed Denial of Service today—at the time it was just six university computers,” recalls Posluns. “The public was told it was a distributed attack, but following the pathways on the Internet from router to router, it’s deter- mined that all the traffic is coming from one particular spot.” Shortly after, Mafiaboy—a 17-year-old Montreal male—was arrested and sen- tenced to eight months in a youth deten- tion centre. Robert Currie, the RCMP staff sergeant handling the investigation, pub- licly thanked Posluns after the trial ended for his code analysis expertise. Currie elaborates: “Don’t be fooled by Jeff’s calm veneer. He might appear calm, cold and calculating, but underneath there is a storm brewing; in fact, one of his nick- names is Tempest. The driving force behind him is doing things that no one else has done before, or better... things that someone tells him cannot be done. “A technology challenge for Jeff is like a red flag for a bull. I doubt we will see him sitting in the same chair for more than a few years,” he adds. By necessity, the secretive and often deceptive world of IT security has a large presence in Posluns’ life. He has to keep abreast of all major new threats, technolo- gies and trends. “Most people in the security area will have a number of different aliases; less peo- ple will talk to you if you’re a big corporate type,” he says.“Some of my friends call me by my alias as opposed to my real name! “For example, a really great coder is called Rainforest Puppy and very few peo- ple know his real identity.” It’s noticeable that Posluns refers to him as a“great coder” while some Web sites refer to him as“hack- er.” What shade of hat is he wearing when showing admiration? “There’s a large group of industry pro- fessionals that get together once a month over a beer and think of new ways to take over the world. We’re all on the good guys’ side,” he reassures me. So, was the Sasser worm good for busi- ness? “The only reason that viruses and worms can be considered good is that they raise public awareness. There’s only a lim- ited number of mechanisms for security exploits,” he replies. “The biggest problem in security will always be the users; the lack of desire of non-IT personnel to conform to common policies. Their job is to come into work, provide a function, work on their comput- er, communicate, write or whatever, and then leave. It’s not their job to worry about security, patching or whether their virus definitions are up-to-date. “I believe an added job function should be to check for updates every morning. Without enterprise-level software, that will take under a minute. But it’s difficult to get people to do so. The problem will continue to be user- or policy-related for the next few years,” he predicts. Posluns also does some work for the government, but is understandably vague on the specifics. “We set up the secure communications facilities between a num- ber of different groups in government, and intrusion detection systems. We’ve done security policy work and audits. “SecuritySage has had 15-20 large proj- ects. There are also a lot of little ones. For example, we may get a call such as: ‘In the- ory, if there were a situation like this... what would you do? It doesn’t exist, but in theo- ry, what would you do?’”he says with a wry smile. What’s next on the horizon for a serial tech entrepreneur? Surprisingly, it’s non- security related. He started Dev/Null Industries Inc. in January to develop an online mall solution. Some may see this as a risky project con- sidering the plethora of e-shopping Web sites, but Posluns is typically upbeat about it. “I wasn’t sure if this would be successful, but decided to throw a little bit of money at it because it’s interesting,” he says. “The mall template is automatically generated, you pick colours and graphics, and collect a commission on every product sold. It’s been doing phenomenally well in the few months it’s been around. It’s still in beta stage and we’re looking at a fall launch. Right now we have Montreal, Toronto, London, Boston and New York.” Apart from that, where does Posluns see the next opportunity coming from? “I think there’s going to be a very big overhaul in communications over the next few years,” he says. “We are seeing the beginning of a widespread deployment of VoIP technologies. There’s a company [in VoIP] that I’m in the process of finalizing an investment in, taking a good percent- age.”It’s worth watching where this modest guy puts some cash—he seems to have the knack of picking winners. Next on his whirlwind itinerary is a con- ference in Athens, business meetings in Copenhagen, some well-deserved R&R in Rome and to London for some fine dining. Not fish and chips. Jeffrey Posluns Chief Innovations Officer WhiteHat Inc. “There’s a large group of industry professionals that get together once a month over a beer and think of new ways to take over the world. We’re all on the good guys’ side.” Jeffrey Posluns CIO, WhiteHat Inc. PHOTOBY:JohnCarson/AndreaCivichino
  • 3. 2 • Silicon Valley NORTH June 28, 2004 Techs and the City “If not for the employees, I wouldn’t have got to where I am. “ “Make it easy for the VC to say ‘yes’ by focusing on his needs, not your wants. “ “We believe that VoIP can become one of the biggest applications on the Internet. “ page 4 page 9 page 10 “There’s a grow- ing tension between angels and VCs. “ page 12 The words “unemployment,”“downsizing” and “layoffs” are unwelcome additions to anyone’s vocabulary, especially in the technology arena where workers can find themselves replaced by automatic production lines, off- shore outsourcing and other business processes. Ottawa has taken a few cold showers in the past couple of years, but local support at the grassroots level and the findings of a Scottish study point to signs of renewed vigour and a strong will to help the region get back on its feet and heal the bruises. Like a prizefighter, the city’s technology morale staggered, bounced off the ropes and has come out fighting. Figures from Statistics Canada show that overall employment in Ottawa- Gatineau stands at just over 607,000 for May, and a Manpower Inc. survey in the second quarter of this year shows that 27 per cent of respondents plan to hire.According to the Ottawa Centre for Research and Innovation’s semi- annual technology survey released this month, the number of tech compa- nies in the region has increased by six per cent to 1,585 while employment levels increased by 500 people to 64,200. Since January 2001, many groups of laid-off technology workers have joined together to create peer networks focused on helping their members. The need to co-ordinate activities led to the formation of the Ottawa Talent Initiative (OTI). The OTI is an organization composed of unemployed volunteers and the community working together to create positive change for the unem- ployed—and underemployed—technology workers in the Ottawa area. I asked Dave Sproule, a founding member of the OTI, what he sees hap- pening to the Ottawa tech employment scene from the grassroots level. Improving or declining? “While there have been some successes by individuals with correspon- ding encouragement to the community, there have also been surprises,” he says.“Due to the nature of the timeliness of statistical data, it is not easy to quantify this into a trend.” He goes on to say that the 18 key recommendations identified in the OTI’s Community Action Plan released in May correspond to three main strategies: grow jobs in Ottawa; immediate support for unemployed and underemployed tech workers; provide assistance for those same people in transitioning their skills to other sectors. That’s the view from inside the ballpark; parties overseas have taken an interest too from a positive stance.A study undertaken by a team of Scottish researchers has highlighted some of the entrepreneurial processes involved in the “emergence of Ottawa as a leading world technology cluster.” The study was undertaken by Colin Mason and Sarah Cooper of the Hunter Centre for Entrepreneurship at the University of Strathclyde in Glasgow, and Richard Harrison of Edinburgh University Management School. It was funded by the Canadian High Commission under its Canadian Studies Program. In the report Ottawa is cited as a world-class technology centre dominat- ed by information and communications technology industries—notably telecom equipment,semiconductors,software and emerging photonics and life sciences clusters.More than 20,000 technology jobs were lost in 2001-02 as a result of redundancies from leading employers such as Nortel, Alcatel and JDS Uniphase. The authors mention the case of an entrepreneur who had been respon- sible for establishing a new facility on behalf of his employer to develop a new product line. Having set it up, he was“basically asked to knock it down again because of a change in direction.”He formed his own small team, got support from an extensive group of financial backers and exploited the technology himself. It’s a great example of seeing opportunity when senior management pull the plug. Success in Ottawa seems to hinge on incestuous business relationships. Who have you worked for? Who do you know? As one VC is quoted in the study:“This is a community where most of the people are spin-outs of spin- outs. Two phone calls and I can find out everything...” A British friend was unfortunate enough to hit the shores of Canada dur- ing the moribund tech landscape of 2001. The timing was totally off; after four months of vainly searching for a network support position he very nearly cashed in his return ticket and left. But 3,500 miles is a long way to come just to throw in the towel. He took a pay cut, joined a small tech start-up, worked the hours and is now considering starting his own enterprise. That’s the attitude that will get Ottawa’s unemployed back to work, but only if the opportunity and will are there. As Denzil Doyle says in his column in this very issue: “If someone can prove to me that the Ottawa area is a net acquirer of high tech companies, I will dance a jig on the front steps of Parliament every Monday morning for the rest of my life.” Why should Ottawa be an acquirer? It should be supporting those branching out on their own, starting new ventures. It takes guts to put your own money—sometimes a redundancy payment—on the line and lay the foundation for a start-up. If that means joining a like-minded community of collaborators, or asking a VC to make those“two phone calls”then that’s the way to go. In its report entitled “Start Me Up: A Look at New Entrepreneurs in Canada”released this month,CIBC Small Business demonstrates that start- ups in Ontario are growing at a rate consistent with the national average, but the graph shows it trailing all the other provinces except Quebec. Why should this be? Is it a lack of motivation or funding? With the report predicting 100,000 small business start-ups over the next five years, I hope that the techs in the Capital region can contribute, play a large role in the community and lead the way. Don’t throw in the towel just yet. There’s still a few more rounds to go... John Carson Editor