CNBC reports on a positive mindset change in Japan on entrepreneurship and start-ups:

Moreover, young Japanese workers have grown up in a world where innovation is driven by the likes of Airbnb, Uber and Facebook, according to Riney. Unlike their parents’ generation, they “never saw a world where massive wealth and innovation-drivers were Sony or Nintendo or some of those more traditional folks.”

Government support has been crucial in bolstering the start-up scene, according to Riney.

The quality of entrepreneurs is also increasing as many left their jobs in consulting or banking sectors to either start their own company or join the management teams of existing start-ups, according to another investor.

“Before, I couldn’t really meet founders with certain prestigious backgrounds,” Hogil Doh, investment manager at Rakuten Ventures, told CNBC. “Now, almost 80 percent of the founders have … worked for McKinsey or Boston Consulting Group or Goldman Sachs.”

The key here is a how Japanese society is evolving to no longer view working at a startup as a failure or some kind of plan B. It used to be if you were unable to get a job at a major Japanese company then a startup was essentially the only route for you to go. Nowadays that is no longer the case, and young folks are increasingly being attracted to startups.

Personally, I think the startup culture attracts Japanese millennials moreso than being lost in an ocean of corporate drones dressed in their freshman black suits. Startups generally value capability over the Japanese time honored seniority. They are viewed as potentially better opportunities for growth, even if the work is likely more difficult and riskier than established companies.

Finding the right startup is always the tough part. On the one hand it is important to locate a company that matches your skills, while on the other hand you want to join a startup that has major growth potential and long-term stability. It is a difficult yet exciting proposition for many young folks, who are increasingly steering away from marriage and family life.

Ultimately, a Japanese resident, I am very glad to see the startup scene is finally taking off. Like with so many other things, Japan is about 15-ish years behind the rest of the world. But once that momentum is built, Japan will be hard to stop, and will become a force to be reckoned.

This article about Cylance reads more like an advertisement than an actual objective look at the “product” and its roots:

In 2011, cybersecurity researcher and entrepreneur Stuart McClure spent his last year working at McAfee, as the company’s global chief technology officer, apologizing a lot. McClure said hackers were slipping into McAfee customer networks and each subsequent breach seemed worse than the last.

McClure would have to meet with each of the big McAfee corporate customers to explain why the software failed and at the end of each meeting someone would ask McClure the same question: “‘What type of security software do you use on your machine to prevent cyber attacks?'” The customers would then wait, pens poised above a piece of paper to jot down the long list of layer after layer of high-end software that the global CTO of a multimillion-dollar security company would surely recommend. But McClure would have to tell them his dirty secret:

He didn’t use any security software. Not even his employer’s.

I wont discount this happened, but I do find it hard to believe that McClure encountered a large number of customers who believed McAfee products failed to protect their network. The assumption in the second paragraph is McAfee – now Intel Security – only makes software, as in the anti-virus type, which could not be farther from the truth. The company does write software, but is well known in the corporate and enterprise business markets for network-based hardware security products like firewalls, intrusion prevention, security information and event management, web gateway, and more.

So it is not as if McAfee, at the time, was only an endpoint security provider. More to the point: even if it were, by 2011 DoD had deployed host-based security system – essentially McAfee’s endpoint protection suite – on over five million nodes, and had not (and has not) been breached. This makes me feel as if McClure is indulging for the sake of making his grand idea, and Cylance, much larger than it actually is in reality.

Finally, to address the last point about McClure not using any security software: neither do I. However, that is not because I lack confidence in the product, but because I use a Mac and am much more in tune with what I do online. When I use Windows, I absolutely use security software, and it is always McAfee endpoint protection.

It would have been quite easy for McClure to make a blanket statement about not using McAfee’s security software, especially if he were a Mac user, which I suspect he was at the time.

Disclaimer: I work for Intel Security, a Cylance competitor.

Yahoo News on a new Israeli start-up capable of foiling hackers using a new honeypot-like technique of sorts to deceive the malicious actors into stealing fictitious data:

Israeli said the company’s solution differed from existing “honeypots” that lure attackers into selected traps.

Large networks require an endless number of honeypots to trap attackers, making it hard to keep pace with the level of attacks across an organization, which can have thousands or even millions of devices to protect.

Illusive “paints a deceptive layer of honey over the entire network,” Israeli said.

The false information is only visible to attackers trying to steal information. It is transparent to users and security staff and does not affect the normal functioning of the devices, computer servers and network equipment.

Avivah Litan and Lawrence Pingree, analysts at Gartner — which included Illusive in its 2015 “Cool Vendors in Security Intelligence” — said such deception techniques will become more prevalent because they are more effective than defensive methods and easier to deploy.

There have been many attempts to be successful with these types of algorithmic approaches to cyber defense, all of which have so far failed to captivate the security world. It is currently an exceedingly difficult problem to solve solely with automation but in a few more years this will be quite normal. It has to be otherwise it will be nearly impossible to adequately defend networks from malicious actors.

Maybe, just maybe, Illusive is onto something.

Tim Greene of Network World on new startup Cyber adAPT using predictive threat analysis to thwart cyber attacks:

Cyber adAPT, a startup springing from DARPA funded research, is shipping its first products that detect network compromises and gather data that can be used later for forensic analysis of breaches.

The company’s appliance-based platform monitors network traffic looking for suspicious communications that might indicate a breach and correlates it with threat feeds to improve its accuracy.

The company just landed a $4.1 million Series A round from Alvin Fund, Granite Point Capital Partners, Griffin Fund II, and Fundamental Capital Management. It started work about 15 months ago and grew out of Irvine Sensors, which had done research funded by the Defense Advanced Research Projects Agency.

The goal is for the platform to perform predictive threat analysis in which it would determine where threats are moving, the goals of the attackers, where the attack is likely to pivot and what assets it is likely to pivot to, and what phase the attack is in.

Predictive threat analysis has long been thought of as the holy grail of cyber security since it would allow networks to dynamically modify policy to account for potential new threats. However, throughout the years it has been very difficult to nail down, often-times producing highly spotty results leading to no better security posture than without the technology.

Maybe this startup has a unique and novel method that has cracked the predictive analysis code?