Workload mobility and the need to maintain SLAs will be a defining feature of Unbounded IT and it is in the sphere of Cyber and Information security where I think the business will first force IT to reevaluate some its most deeply held dogmas and static thinking.
Category: Information Security
IT Next Generation of Cyber Security The traditional forms of security SAST, DAST and WAF which are reactive and focus on treating symptoms rather than affecting a cure will, in a perimeterless world, result in fast diminishing returns. Some of these...
All digital transformation initiatives introduce new problems, software bugs, guaranteed network vulnerabilities, new competitors; new business challenges and new stresses. The elimination of all negative consequences and vulnerabilities are impossible, so our focus should be on limiting and containing it, not eliminating it.
Managing software development whilst also ensuring a high security standard is a difficult job for anyone in the security teams. Read this article to understand how the development, opps and security teams can be aligned in order to get the best result all round.