Source |
Fortinet |
Identifiant |
430842 |
Date de publication |
2017-11-09 13:50:59 (vue: 2017-11-09 13:50:59) |
Titre |
How Sutton\'s Law Applies to Cybersecurity Today |
Texte |
In my previous article, I raised a red flag about the diminishing practical returns of “mom and pop†threat research as a proxy for mitigating vulnerabilities and bad consequences. Threat assessment is often both difficult and incomplete, and sometimes best left to those who have timely access to the best possible data (and the even then, left to those with the military and intelligence means to act on it).
In that piece, I also begged an obvious question.
If chasing threats are not the best allocation of an organization's... |
Notes |
|
Envoyé |
Oui |
Condensat |
about access act allocation also applies are article assessment bad begged best both chasing consequences cybersecurity data difficult even flag have how incomplete intelligence law left means military mitigating not obvious often organization piece pop†possible practical previous proxy question raised red research as returns sometimes sutton then the diminishing those threat threats timely today vulnerabilities who “mom |
Tags |
|
Stories |
|
Move |
|