One Article Review

Accueil - L'article:
Source Fortinet.webp Fortinet
Identifiant 430842
Date de publication 2017-11-09 13:50:59 (vue: 2017-11-09 13:50:59)
Titre How Sutton\'s Law Applies to Cybersecurity Today
Texte In my previous article, I raised a red flag about the diminishing practical returns of “mom and pop” threat research as a proxy for mitigating vulnerabilities and bad consequences. Threat assessment is often both difficult and incomplete, and sometimes best left to those who have timely access to the best possible data (and the even then, left to those with the military and intelligence means to act on it). In that piece, I also begged an obvious question. If chasing threats are not the best allocation of an organization's...
Notes
Envoyé Oui
Condensat about access act allocation also applies are article assessment bad begged best both chasing consequences cybersecurity data difficult even flag have how incomplete intelligence law left means military mitigating not obvious often organization piece pop” possible practical previous proxy question raised red research as returns sometimes sutton then the diminishing those threat threats timely today vulnerabilities who “mom
Tags
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: