The Product Person
Subscribe
Sign in
Home
Archive
About
New
Top
Discussion
On Security, Part 1
A brief history of major vulnerabilities in the past decade
May 18
•
Richard
Auth0: Product-led Authentication
How Auth0 leveraged content and PLG to success
May 9
•
Richard
1
VGS: Security and branding
The story behind VGS and how they built one of the strongest brands in the security space
May 1
•
Richard
1
April 2023
Drata: Viral Audits
How Drata came to the forefront with changing software purchasing decisions
Apr 24
•
Richard
and
Dan Bogachek
Snyk: Shift left security
Catching the shift-left security wave and building a generational security platform
Apr 17
•
Dan Bogachek
and
Richard
4
Wiz: Visible Vulnerabilities
Breaking down how Wiz went from COVID idea to $10 billion
Apr 13
•
Richard
1
January 2023
Nirav Tolia on Growing Nextdoor and the Path to Monetization
Inside are 5 actionable insights from former CEO and co-founder of Nextdoor, Nirav Toilia
Jan 4
•
Nick Borsh
2
December 2022
The Rise and Fall of FTX – Part Three
FTX's presidential tokens, FTX.US, Serum, Blockfolio, and Alameda's risky bets in 2020.
Dec 26, 2022
•
Richard
The Rise and Fall of FTX - Part Two
Building a crypto exchange, the early days of FTX, the magic beans token (FTT), and Binance vs FTX.
Dec 13, 2022
•
Dan Bogachek
1
The Rise and Fall of FTX - Part 1
A history of FTX, from inception to disgrace.
Dec 1, 2022
•
Richard
1
August 2022
The Lean Startup
Inside are 5 key insights from the New York Times Best-Selling Book, The Lean Startup.
Aug 25, 2022
•
Nick Borsh
5
7 Habits of Highly Effective Product Managers
Hey, Nick here! In this newsletter, I curate insights and timeless principles on how to build great products. You’ll improve your product skills with…
Aug 4, 2022
•
Nick Borsh
4
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts