Cyber Ecosystem

Cyber Alliance to Defend our Healthcare

c5-logo

Gula Tech Adventures is pleased to announce we are supporting the Cyber Alliance to Defend Our Healthcare. Multiple companies that we are working with as investors and advisors will be participating in this effort to deliver cyber solutions to healthcare organizations during the COVID epidemic. I would like to thank and acknowledge the team at C5 Capital for launching this initiative. Read More…

COVID and Cyber Security Webinars

Screen Shot 2020-05-12 at 11.20.37 AM

This blog tracks the variety of upcoming and recorded cyber security webinars Ron Gula participated in during the COVID epidemic. This blog is being updated with new webinars as they occur. Read More…

Tribe of Hackers and Working in CyberSecurity

cyber-books
I recently had the chance to participate in two separate book projects that documented what working in the cyber industry was like. Each project interviewed a wide variety of cyber experts and industry leaders and I was honored to be included in each project. Read More…

A Simple Case for more Maryland and Mid-Atlantic cyber product companies

0*ULcFk4lt2MrobMED
Earlier this year I was asked to serve on the steering committee of Governor Larry Hogan’s Excel Maryland Initiative. The initiative focuses on the development of a unique partnership of the private sector, public sector, and academia to craft a plan to support economic growth through the advanced industries, such as cyber security and life sciences, in Maryland. Having worked at the NSA and a number of cyber services and product companies, including Tenable Network Security and having made the switch to being a cyber-security start-up investor, I had a lot to say on this subject.
Read More…

Cyber Security Industry Metrics for the Mid-Atlantic US Region


1*wg0o3M4zpLnpiCUDQdPh-g
I wanted to share some statistics about the mid-Atlantic cyber security industry that were published in a recent joint study by the American University and Amplifier Advisors. The study was called, “ From Service to Product “ and it details in raw numbers the various types of cyber security companies in this region.
Read More…