Cybersecurity Builders

Frontlines.io

GTM conversations with founders building the future of cybersecurity technology.

  1. How BlueRock identified three distinct buyer personas by asking "How would you describe what we do to your peers?" | Bob Tinker ($25M Raised)

    11/07/2025

    How BlueRock identified three distinct buyer personas by asking "How would you describe what we do to your peers?" | Bob Tinker ($25M Raised)

    BlueRock is building an agentic security fabric to protect organizations deploying AI agents and MCP workflows. With a $25 Million Series A, founder Bob Tinker is tackling what he sees as a 10x larger opportunity than mobile's enterprise disruption. Bob previously scaled MobileIron from zero to $150 million in five years and took it public in 2014. In this episode of Category Visionaries, Bob shares the strategic mistakes that cost MobileIron its category positioning, why go-to-market fit is the missing framework between PMF and scale, and how B2B marketing has fundamentally transformed in just 18 months. Topics Discussed: Taking a company public: the killer marketing event versus the unexpected team psychology challenges of daily stock volatilityWhy agentic AI workflows create unprecedented security challenges at the action and data layer, not just promptsThe strategic timing of category definition: MobileIron's cautionary tale of letting Gartner define you as "MDM" when customers bought for securityWhere enterprise buyers actually get advice now that Gartner's influence has diminishedAEO (Answer Engine Optimization) replacing SEO as the primary discovery mechanism for B2B solutionsWhy 1.0 categories have fundamentally unclear ICPs versus 2.0/3.0 products with crisp buyer personasThe "high urgency, low friction" framework for prioritizing what to build in nascent marketsGo-to-market fit: the repeatable growth recipe that unlocks scaling post-PMFUnlearning as competitive advantage for second-time founders GTM Lessons For B2B Founders: Time your category noun definition strategically: MobileIron focused exclusively on solving the problem (the verb) but waited too long to influence category nomenclature. Gartner labeled it "Mobile Device Management" when customer purchase drivers were security-focused, not management. Use customer language as category discovery, not invention: Bob's breakthrough on BlueRock positioning came from asking prospects: "How would you describe what we do to your peers?" One prospect distinguished their focus on "the action side - taking AI and taking action on data and tools" versus prompt inspection and AI firewalls. Engineer for the "high urgency, low friction" intersection: Bob's filtering criteria for BlueRock's roadmap requires both dimensions simultaneously. When a prospect revealed they were building their own MCP security tools - a signal of acute, unmet pain - they also asked BlueRock to add prompt security features. Accept ICP ambiguity as a feature, not bug, of 1.0 markets: In 2.0/3.0 categories, you can target "VP of Detection & Response" with precision. In 1.0 markets like agentic security, Bob finds buyers across three distinct orgs: agentic development teams building secure-by-default systems, product security teams inside engineering (not under the CISO), and traditional security organizations. Shift content strategy from SEO to AEO immediately: Bob identifies the clock speed of marketing change as "breathtaking" - what worked 18 months ago is obsolete. The specific shift: ranking above the fold in Google search is now irrelevant. Treat go-to-market fit as a distinct inflection point: Bob observed a consistent pattern across MobileIron, Box (Aaron Levie), Citrix (Mark Templeton), Palo Alto Networks (Mark McLaughlin), and SendGrid (Sameer Dholakia) - all hit PMF, hired salespeople aggressively, burned cash, and stalled growth while boards grew frustrated. Build community as primary discovery in fragmented buyer markets: Bob's most different GTM motion versus five years ago: "We're just out talking to prospects and customers - individual reach outs, hitting people up on LinkedIn, posting in discussion boards, engaging with the community." Practice systematic unlearning as second-time founder discipline: Bob's most personal insight: "What really got in my way wasn't what I needed to learn. It was what I needed to unlearn."

    31 min
  2. How Nightfall AI uses CISO dinners to generate pipeline | Rohan Sathe

    11/07/2025

    How Nightfall AI uses CISO dinners to generate pipeline | Rohan Sathe

    Nightfall AI is pioneering AI-native data loss prevention (DLP) for enterprises navigating cloud, SaaS, and AI application proliferation. Founded in 2017 by former Uber engineers who witnessed data breaches firsthand, Nightfall addresses the architectural limitations and false positive problems plaguing legacy DLP solutions. By leveraging machine learning and large language models across three distinct layers—content classification, risk assessment, and forensic investigation—Nightfall delivers 10x accuracy improvements while enabling secure AI adoption. In this episode of Category Visionaries, I sat down with Rohan Sathe, Co-Founder & CEO of Nightfall AI, to explore their strategy for displacing entrenched incumbents and positioning as the security enabler for organizational AI deployment. Topics Discussed: Nightfall's founding thesis addressing DLP coverage gaps created by cloud and SaaS migrationThree-layer AI architecture: content classification, behavioral risk analysis, and agent-assisted forensicsPositioning against legacy DLP's rules-based approaches and exact data match workaroundsMarket education shift post-ChatGPT: from "don't use AI" to "enable AI securely"Purple brand differentiation strategy in security's dark-themed visual landscapeConference ROI reallocation: executive suite meetings versus booth presence at RSA and Black HatMid-market to enterprise expansion pattern through peer-to-peer word-of-mouthFounder-led LinkedIn strategy balancing market education with competitive displacement narrativesSales team composition: domain practitioners versus traditional sales profiles GTM Lessons For B2B Founders: Structure POVs to prove quantifiable superiority on one dimension: Rohan revealed Nightfall benchmarks against Google and Microsoft DLP APIs, demonstrating 10x accuracy improvements during proof-of-value cycles. When challenging mature categories, identify the single metric where you demonstrably outperform and architect evaluations to surface that gap. Deploy AI across three workflow layers, not as a monolithic feature: Nightfall applies AI distinctly at content classification (identifying sensitive data with high precision), behavioral analysis (distinguishing risky data movement from standard workflows), and investigation assistance (helping analysts focus forensic efforts). Replace field marketing spend with curated CISO access: Nightfall redirected budget from RSA and Black Hat booths to private suites hosting scheduled executive meetings. Rohan emphasized engaging "chief information security officers who sign the checks" in intimate settings rather than booth traffic. Design 8-person dinners as vendor-neutral industry forums: Nightfall hosts 3-4 annual dinners with 5-7 prospects and 2-3 team members (founders, head of product) structured around industry developments—like OpenAI's agent workflow builder and security implications—not product pitches. Hire former practitioners into quota-carrying roles: Rohan identified hiring former DLP security operations analysts as account executives or solutions architects, mirroring trends in legal tech and HR tech. Use LinkedIn for two narratives: market education and competitive wins: Rohan posts thought leadership on DLP evolution and AI security implications alongside selective announcements of competitive displacements at enterprise AI companies and top 10 banks. He noted role postings also drive engagement, signaling growth momentum. Leverage AI adoption mandates as your demand generation engine: Post-ChatGPT, Rohan noted "board mandate and CEO mandate from every company to use as much AI as you can" created new security requirements. Challenge category conventions through education, not assertion: Rather than simply claiming exact data match (EDM) is obsolete, Nightfall explains EDM emerged as a workaround for rules-based approaches' false positive problems—and ML eliminates the need for workarounds entirely.

    20 min
  3. How to Win with Rapid Response: GitGuardian's Media Playbook

    10/17/2025

    How to Win with Rapid Response: GitGuardian's Media Playbook

    In this episode of The Marketing Front Lines, we speak with Carole Winqwist, CMO of GitGuardian, a cybersecurity company specializing in secret detection and code vulnerabilities. Carole shares how her team approaches rapid response marketing during major security breaches, the evolution from traditional SEO to answer engine optimization (AEO), and how AI is fundamentally reshaping marketing team structures and capabilities. From navigating Reddit's strict moderation policies to leveraging AI for accelerated content production, Carole provides tactical insights on staying ahead in B2B cybersecurity marketing while building agile, technically-savvy teams. Topics Discussed: Rapid response marketing vs. newsjacking in cybersecurityTransitioning from SEO to answer engine optimization (AEO)Building technically-savvy marketing teams with engineering backgroundsNavigating Reddit as a content distribution channel for B2B companiesAI's impact on marketing team structure and content production velocityEnabling team innovation through experimentation and early adoptionStructuring content strategy for LLM indexing and discovery Lessons For B2B Tech Marketers: Execute Rapid Response, Not Newsjacking: GitGuardian only responds to security breaches within their core expertise (secret detection and code vulnerabilities). Rather than simply commenting, they conduct original research, analyze breach data, and provide best practices based on actual findings. This positions them as experts rather than opportunists and resonates with sophisticated security audiences who can spot ambulance chasing.Invest in Deep, Data-Rich Content for AEO Success: The shift from SEO to answer engine optimization rewards marketers who were already creating substantive content. Long-form articles with original research, data, and proof points perform well with LLMs because they demonstrate legitimate expertise. This "back to basics" approach means writing for intelligent systems rather than gaming algorithms with keyword repetition and link schemes.Build Marketing Teams with Technical DNA: GitGuardian includes team members with engineering and technical backgrounds who can quickly evaluate new tools and tactics with a testing mindset. Navigate Reddit Through Value, Not Promotion: Reddit's moderators are highly sensitive to commercial content, but original research and genuine insights can break through. The key is ensuring content provides real value independent of company affiliation. GitGuardian struggles with this balance—their vulnerability research is valuable but gets flagged because it lives on a company blog. Structure AI Adoption Around Velocity Gains, Not Headcount Reduction: GitGuardian didn't eliminate positions due to AI but rather increased output with the same or smaller teams. Their content strategist can now handle work that previously required multiple technical writers. One product marketing manager now serves a sales team double the size. Create "Divide and Conquer" Specialization Across Emerging Channels: Rather than having everyone monitor everything, GitGuardian assigns team members to focus on specific emerging areas—one person owns AEO, others focus on intent data, AI tools, etc. Enable Horizontal Skill Development Through AI Tools: AI is allowing marketers to become more transversal, handling end-to-end campaigns rather than narrow specializations. Someone without deep technical expertise can now produce technically accurate content by using AI as an assistant.Reward Experimentation Through Internal and External Visibility: GitGuardian's philosophy is to let team members test new approaches unless completely off-strategy. When experiments succeed, team members gain visibility internally and speaking opportunities at conferences. Use AI for Rapid Onboarding and Intern Productivity: New team members and interns become productive much faster when fed solid source content to work with through AI.

    23 min
  4. How Shush differentiated against competitors by solving business operations, not just deploying technology | Eddie DeCurtis, Co-Founder & CEO of Shush Inc.

    10/09/2025

    How Shush differentiated against competitors by solving business operations, not just deploying technology | Eddie DeCurtis, Co-Founder & CEO of Shush Inc.

    With over 30 years in wireless—from helping pioneer intercarrier SMS to running mobile identity operations across Americas and Asia Pacific — Eddie DeCurtis saw what others missed: 967 of 1,000 global mobile network operators lack the infrastructure to monetize CPNI data while protecting customers from fraud. The technical challenge isn't building APIs. It's that operators spent billions on 5G infrastructure and now lack capital, internal expertise, and operational frameworks to launch authentication services. In 18 months, Shush went from PowerPoint to 30 employees, supporting 47 network APIs with full GSMA Open Gateway compliance. Eddie shares how understanding regulatory frameworks by jurisdiction, not just deploying technology, became their competitive moat—and why hiring the executive who built T-Mobile USA's authentication platform gave them credibility no competitor could match. Topics Discussed: Why operators repeatedly said "we want to do it, we have no idea how, we have no money, we don't have a platform"Validating the thesis with former AT&T Communications CEO John Donovan before launchingSecuring a POC with a major operator pre-incorporation—with only a PowerPoint deckThe three-legged stool: technology, network integration, and business operations (where competitors fail)Why knowing privacy regulations for CPNI data sharing by country became a deal-closerReducing network integration from dozens of touchpoints to three specific network elementsSupporting 8 Linux Foundation Camara APIs and TS.43 GBA AKA authentication standardGoing from 3 to 30 employees and launching at Mobile World Congress on a $75/night Airbnb budget GTM Lessons For B2B Founders: Validate with the person most likely to kill your idea: Eddie deliberately chose John Donovan—former CEO of AT&T Communications, board member at Lockheed and Palo Alto Networks—specifically because "he's going to be rough, he's going to totally ask the really hard questions." When Donovan's response was "go raise $40 million and own this space...you're not going to be alone for long," . Convert pre-product conviction into design partner commitments: Eddie secured a POC agreement with a major operator before Shush incorporated. "I had nothing. I didn't have software. We had an idea, we had a PowerPoint presentation." This only works when you've spent decades building domain expertise and relationships. The enterprise moat is operational knowledge, not technical capability: Eddie's thesis: "Anybody can come up with the technology. You walk down the street in the Bay Area, 10 developers will develop it for you." Shush differentiated by answering questions competitors couldn't: How do you price SIM swap detection per query? What are CPNI data sharing regulations in Indonesia versus Brazil? When Eddie told an operator "here's the privacy rules for your country" after they admitted "I have no idea,". Target the ambition-capability gap in capital-constrained buyers: Operators told Eddie the same story: eager to launch authentication services, zero clarity on execution, budgets decimated by 5G spending. This created perfect conditions for a full-stack solution. "Mid-market is hard because you have a buyer with problems that are not basic anymore, but they lack the ability to execute."Hire the operator who ran your exact use case at scale: Eddie cold-called John Morrowton, who "built this actual product and service offering at T-Mobile USA, from its inception to its execution and ran it for four years." His pitch: "I'm Eddie DeCurtis, how are you? You want a job? You're Chief Product Officer." Minimize integration surface area to accelerate deployment: Mobile operators run highly secure networks with limited external access points. Shush "narrowed it down to three network elements that we can communicate with to provide all 47 APIs." Fewer integration points means faster deployment, lower implementation risk, and reduced operator IT overhead.

    22 min
  5. How StrongestLayer achieved 85% meeting-to-POC and 100% POC-to-win rates using transparent one-week pilots | Alan LeFort

    10/01/2025

    How StrongestLayer achieved 85% meeting-to-POC and 100% POC-to-win rates using transparent one-week pilots | Alan LeFort

    StrongestLayer is building AI-native email security architecture designed for threats that defeat pattern-matching systems. The company pivoted from security awareness training after early customers discovered its phishing detection plugin caught advanced threats that legacy gateway solutions missed. In a recent episode of Category Visionaries, we sat down with Alan LeFort, CEO of StrongestLayer, to discuss why architectural generation matters more than vendor reputation in email security, and how they're using transparent proof-of-concept methodology to displace 20-year incumbents.   Topics Discussed: Why AI-generated attacks with n=1 datasets break signature-based detection architecturesThe convergence of legitimate marketing automation and phishing techniques (lookalike domains, intent signals, AI-personalized messaging)How 2% of attack types represent 90% of breach value, forecast to reach 17% of volume by 2027Transparent POC strategy achieving 85% meeting-to-POC and 100% qualified-POC-to-technical-win conversionStage-based ICP selection: targeting 1,000-10,000 seats for sub-6-month sales cycles with enterprise compliance requirementsHarvard Kennedy School research: AI enables 88% employee profiling from public data, 95% cost reduction for targeted campaigns, and 60% click rates versus 12% baseline  GTM Lessons For B2B Founders: Deploy transparent POCs as category displacement weapons: When attacking entrenched incumbents, StrongestLayer runs one-week POCs behind existing email security gateways with zero commercial pressure—just visibility into what's being missed. At a sub-1,000-seat company running behind a top-three market leader, they surfaced 80 advanced threats in one week. This approach converts 85% of first meetings to POC and 100% of qualified POCs to technical wins. Stage-match your ICP to burn rate tolerance, not TAM: Alan deliberately excludes Fortune 500 despite universal email security need: "When their procurement team is bigger than your whole company, not a good scene." Instead, they target 1,000-10,000 seats—enterprises with SOC2/compliance obligations but without Fortune 500 security budgets or staffing. These accounts close in under 6 months. The framework: Define ICP by sales cycle length your runway can sustain, then expand segments as capital position improves. Trade IP opacity for velocity when architectural advantage compounds: Unlike security vendors protecting methodology behind NDAs, StrongestLayer publishes full product demos on YouTube and shares detection logic openly. Alan's thesis: "I'm going all in on velocity. I'm going to transparently share, get it in front of as many customers as we can." This works because their advantage is continuous AI model improvement velocity, not a static algorithm competitors could copy. If your moat is execution speed and iteration cycles rather than a single proprietary technique, transparency accelerates trust-building and shortens enterprise consideration periods.Quantify the shift from volume metrics to value-at-risk metrics: Rather than competing on total threat detection volume, StrongestLayer focuses on the 2% of attack types (BEC, advanced spear phishing) that represent 90% of breach value—and are growing to 17% of attack volume by 2027. They weaponize third-party research (Harvard Kennedy School) showing AI reduces targeted attack costs by 95% while increasing success rates from 12% to 60%. Bifurcate messaging by operational reality, not just title: Alan messages CISOs around risk buying-down and ROI, positioning email security as a solved problem that's becoming unsolved. For security operations teams, the pitch centers on eliminating 70% false-positive user submissions that waste skilled analyst time. Both personas use the same tools, but CISOs face board-level breach risk while SOC teams face daily toil from alert fatigue.

    27 min
  6. How the ex-White House CIO turned around a failing cybersecurity company by fixing the product first | Tony Scott

    09/03/2025

    How the ex-White House CIO turned around a failing cybersecurity company by fixing the product first | Tony Scott

    Tony Scott brings an unparalleled perspective to cybersecurity leadership, having served as CIO of the federal government, VMware, Microsoft, General Motors, and Disney before taking the helm at Intrusion during a critical turnaround phase. When Scott joined Intrusion three and a half years ago, the company was in crisis—running out of money, facing SEC investigations, and dealing with shareholder lawsuits after poor leadership decisions. Today, Intrusion has stabilized its technology, raised sufficient capital, and carved out a unique position in the Applied Threat Intelligence category, focusing on real-time packet-level network analysis that stops zero-day attacks and command-and-control communications that bypass traditional security tools. Topics Discussed: Scott's transition from government service to cybersecurity investment and eventual CEO roleThe crisis state of Intrusion when he joined and the turnaround strategy implementedIntrusion's pivot from direct sales to a managed service provider (MSP) go-to-market strategyThe challenge of creating a new category in Applied Threat IntelligenceBuilding and rightsizing the marketing and sales teams during the turnaroundThe realities of running a public company versus private enterprisesIntrusion's unique packet-level network analysis technology versus conversation-based monitoring GTM Lessons For B2B Founders: Do your homework before the meeting: Scott's biggest frustration as a buyer was vendors who showed up unprepared, asking generic questions like "what keeps you up at night?" without understanding the organization or its priorities. He literally had a secret signal with his assistant to escape these meetings. B2B founders must research prospects thoroughly, understand their specific challenges, and craft relevant value propositions before requesting meetings. Generic discovery calls are a waste of everyone's time and destroy credibility.Fix the product before scaling sales: The previous CEO at Intrusion hired dozens of salespeople to sell a product that wasn't ready, resulting in zero sales during his tenure. Scott prioritized fixing scalability, reliability, and feature gaps before rebuilding the go-to-market engine. B2B founders often face pressure to hire sales teams early, but selling a broken product destroys market credibility and wastes resources. Product-market fit must precede sales-market fit.Find the right distribution channel for your product: Intrusion's breakthrough came when they stopped trying to sell directly to end customers and focused on managed service providers and managed service security providers. This channel strategy worked because Intrusion's solution enhances existing security stacks rather than replacing them, making it perfect for MSPs serving SMBs that can't afford enterprise-level security expertise. B2B founders should carefully analyze whether their solution is better suited for direct sales, channel partnerships, or hybrid approaches based on customer buying behavior and implementation complexity.Embrace being in a category of one: Despite pressure from analysts and customers to fit into existing categories, Intrusion discovered they occupy a unique position in Applied Threat Intelligence. While this creates messaging challenges, it also eliminates direct competition. Scott worked with Gartner and other analysts to establish that no other company does exactly what Intrusion does. Leverage legal training for crisis management: Scott's law school background taught him to analyze situations from a 360-degree perspective, understand all stakeholder positions, and develop comprehensive strategies. This skill set proved invaluable during Intrusion's turnaround and his previous crisis management roles. B2B founders facing difficult situations should adopt this approach: clearly define the problem, gather multiple perspectives, identify all stakeholders, and develop a theory of the case for moving forward.

    38 min
  7. Adam Cecchetti, CEO & Co-Founder of Staris AI: $5.7 Million Raised to Build Total Context Security for Application Protection

    07/31/2025

    Adam Cecchetti, CEO & Co-Founder of Staris AI: $5.7 Million Raised to Build Total Context Security for Application Protection

    Staris AI is pioneering a new approach to application security, moving beyond traditional vulnerability scanning to create what they call "total context security." With $5.7 million in funding, the company is building an AI-powered platform that doesn't just find security issues but provides complete context about business risk and automated fixes. In this episode of Category Visionaries, I sat down with Adam Cecchetti, CEO and Co-Founder of Staris AI, to learn about his transition from bootstrap founder to venture-backed CEO and his vision for creating an immune system for applications on the internet. Topics Discussed: The evolution from bootstrap companies to venture-backed scalingHow 200+ customer discovery conversations shaped Staris AI's product directionCreating the "total context security" category in a crowded application security marketThe impact of AI on both security threats and solutionsBuilding founder-led sales processes before transitioning to broader marketingLong-term vision of creating an immune system for internet applications GTM Lessons For B2B Founders: Conduct extensive customer discovery before building: Adam and his co-founder talked to over 200 CISOs, CTOs, and CIOs before finalizing their product direction. The key insight: "People do not need more to do. They do not need more work, they do not need more bugs. They don't need bugs cheaper or better or faster. They really need this problem to start shrinking." This extensive research revealed that the market didn't need another tool to find vulnerabilities—they needed solutions that actually reduced their security workload.Define what you don't do to clarify positioning: Adam shared a powerful insight from his previous company: "I sold more work telling people what I didn't do versus what we did do." In crowded markets like security, clearly articulating what you don't do helps prospects understand your unique value proposition. For Staris AI, being explicit about not being "an ASPM" or other specific security categories helps differentiate their total context approach.Leverage founder networks for initial traction: Rather than launching broad marketing campaigns, Adam is using his 25 years of industry relationships for initial customer acquisition. "We're going back to a lot of our people we had talked to initially when we started the company, as well as some old customers and colleagues and friends to be able to say, hey, let's do some proof of concepts." This approach allows for rapid iteration and product refinement based on trusted customer feedback.Create category names that are immediately understandable: While evaluating options like "next gen pen testing" and "AI security co-pilots," Adam chose "total context security" because it clearly communicates value. The name immediately conveys what the solution does—providing complete context at every step of the security process. In technical markets, clarity often beats cleverness in category naming.Time market expansion carefully: Despite having funding and proven traction, Adam is deliberately waiting until Q4 to ramp marketing efforts. "We've been really laser-like focused on building a great product, getting a good story for our customers, understanding what truly provides them value before we kind of went out and mass broadcasted that message." This disciplined approach ensures product-market fit before scaling go-to-market efforts.

    15 min
  8. Itzik Alvas, CEO & Co-Founder of Entro Security: $24 Million Raised to Build the Future of Non-Human Identity Management

    06/13/2025

    Itzik Alvas, CEO & Co-Founder of Entro Security: $24 Million Raised to Build the Future of Non-Human Identity Management

    Welcome to another episode of Category Visionaries — the show that explores GTM stories from tech's most innovative B2B founders. In today's episode, we're speaking with Itzik Alvas, CEO & Co-Founder of Entro Security, a non-human identity management platform that has raised $24 Million in funding. Here are the most interesting points from our conversation: Military Experience Taught Perseverance: Itzik credits his time in the Israeli Defense Force, specifically in the cyber intelligence unit, for shaping his approach to perseverance. This has been crucial in overcoming challenges as an entrepreneur.Non-Human Identity Management Innovation: After multiple cybersecurity breaches in his previous roles, Itzik identified a massive gap in managing non-human identities and secrets. This personal experience directly led to the creation of Entro Security.Early Days Post-Seed Raise: The first few months after securing seed funding were highly operational—setting up offices, building the team, and finding early design partners to provide feedback on their solution.Creating a New Market Category: Entro Security is pioneering the non-human identity management space, addressing the growing issue of programmatic credentials that are often mishandled by DevOps teams, posing significant security risks.Unique, Memorable Branding: Unlike traditional cybersecurity companies, Entro’s branding is youthful, fun, and memorable, a conscious choice to stand out in an industry that often feels sterile and overly serious.Go-To-Market Approach: Entro’s sales efforts are focused on direct sales and channel partnerships, with a primary focus on the US market. Itzik emphasizes the importance of aligning go-to-market strategies with event participation based on specific goals like lead generation or brand awareness.  //   Sponsors: Front Lines — We help B2B tech companies launch, manage, and grow podcasts that drive demand, awareness, and thought leadership. www.FrontLines.io The Global Talent Co. — We help tech startups find, vet, hire, pay, and retain amazing marketing talent that costs 50-70% less than the US & Europe.  www.GlobalTalent.co

    14 min

About

GTM conversations with founders building the future of cybersecurity technology.