top of page

Half of Security Pros Ignore Some Important Alerts

This article and the associated report point to the need to better correlate data and automate the resultant reporting.  This is an effective way to manage threat data overload and the burden of effective IT security responsiveness.


Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page