|C-Level: Fan Boy, XEB

In 1999, I was extremely busy. I had just started a company, my second, in the network security field, which was new and unknown. Sales were slow, hacking was deep, deep inside campuses like Stanford and MIT, and was considered sport. I was getting traction with banks and was in SF for a meeting. I remember walking down Mission, past a guitar shop, and hearing this song. The guitar was hitting the tonic breaking into cool background riffs, a little vocal falsetto opening then breaking into versebroken and then backWTF. Reminiscent of a cello piece I knowinspiredI stopped dead in my tracks — stunned. Who are these guys!?!

I was walking with a tech guy, a financial guy, and a professional services exec, each were oblivious to the music; so I said, let's go in here. WHAT? The song continues, gets more interesting with each beat. I asked the kid at the counter what he was playing. He told me, we left, though I dawdled at the door hanging on ever note. Sing it: 'losing a whole year…'!

That night on the peninsula, I bought the CD, did not have a player in the hotel, sat in the car, listening over and over'losing a whole year'. I gave the CD to a friend who was a pretty good guitar player, not sure if he ever got to listen to it. I should send him a not'losing a whole year'.

I cannot explain why I lost track of these guys, I am always looking into the corners for something to read, a new scientific theory, a tasty guitar riff — tear it back, is there anything more there? Too often the answer is noone-hit-wonder.

In 1970, Duane Allman heard a guitarist and his band play in northern Florida, and promptly told the president of Capricorn records, Alan Walden, to sign them. At the time, Dwayne had just played with Eric Clapton and George Harrisonof course you do what Duane asks, and the result was a band called Captain Beyond. The Third Eye Blind debut is put together in the same manner. Nothing is wasted, perfectly crafted. Pure art.

YEARS roll by ('losing a whole year,' one at a time for 20) from time to time I hear something new, dig into itsigh, not much there. Fate during March found me in a coffee shop, I heard something amazing within the music they were playing and asked the barista to check her playlist (Pandora) for the title…Third Eye Blind. So, I went home punched into Spotify the band and was absorbed by the playing. Every cut put together with precision, care and inventiveness. And my old favorite; losing a whole year.

Google showed me the players, hyperbole as to band breakups, etc. But then, the great Salazar and Cadogan together again? A mile from my house in Somerville, MA? I am SO there! So with my darling bride of 25 years, no kids in tow, we go to the show. I set my expectations low, this is very complex music. After 20 years, could a bass player still fly over the frets? Keys and tuning changes are all over the place, could the guitarist come close? Their opening of the tour in Somerville (just outside Boston) was amazing. I could tell you about the show, bass amp blew up — no problem, new one was found (great techs at the club — they had a spare!).

My mother is 84, a true patron of the arts — all of the arts — and is excited about the ninth of June. We will be at the XEB show in Hermosa. She will be the oldest person there and she will be screaming the lyrics…..'losing a whole year…..'

Comments

To add a comment, please login or register.

Related

C-Level Security: Bank security and the egg timer (how good management trumps technology)
The development of technology for securing information has been advancing at a pace that is truly astounding. In 20 years the security industry has evolved from Sun Micro Systems' Sunscreen and the Cisco PIX (yes I know there were a few others) to over a thousand security products of which nearly 700 are currently VC funded. All are trying to generate business from within this ever advancing market currently called Cyber Security. There are few tech markets growing at the rate of Cyber Security and as a result we are seeing investors, in a near desperate attempt to gather slivers of this market, throwing money at companies with Rube-Goldberg-inspired technology. We now have a flood of technology solutions that no one person can understand and the customers that consume this technology struggle daily with supporting and operating these systems. Many of the C-Level executives reading this may want to consider a management solution for the next expensive problem your engineering team presents to you.
What to Say to the C-Level, get your security project funded today!
In near every business adding costs to Information Systems will be seen, by the people running the business, as a cost first, benefit second. Remarkably this still holds true despite a constant pulse of security events hitting the C-Level desks. So let's, as security professionals, develop an understanding of the C-Suite and the C-Levels as to their priorities.
C-Level Security: When your team uses military analogies, are they using the wrong narrative?
For years, I have bristled when people would use medieval military descriptions in an attempt to convey concepts within the Network Security business. Bastions, Firewalls, Moats, Drawbridges, Countermeasures; all of these descriptions give way to a more accurate and detailed explanation of what was really taking place.
C-Level: Is your business secure enough to survive open firewalls?
The most expensive firewall is pretty dumb. It can keep external probes from seeing what your Security Team wants to hide. In some cases, they are also configured to protect people within your company from wasting time or violating your network policies. There are no guarantees that these devices will protect your network, quite the opposite, near every network hack of note, was conducted through a firewall. The information assets that Firewalls protect are also secured in a variety of dissimilar ways so in a perfect world the Firewall is your front line of defense, information access policies are a secondary line of defense. In a very simple sense, firewalls are about noise reduction, blocking out a nearly infinite number of probes from an ever increasing number of probers. So, ponder for a minute, if you opened this electronic front door to the world what would happen? Would the damage be limited to only an increase in network noise?