An in-depth look at the latest trends and technologies in enterprise networking.
As a judge on the Tech Trailblazers awards, I can assure you of two security-related actuality wotsits:
So, it is fair to say I’ve had my fill of “unique approach”, “the only product in the world that…”, “AI is at the heart of…”, “based around machine-learning”, “integrates every aspect of”, “according to Gartner”, “automation is the only way” (even though it is for certain security scenarios – see previous blog entry 😊) and other tarnished golden oldies that continually cropped up in each and every entry. And I mean EACH AND EVERY ENTRY…
It was with some relief, then, that I caught up with a company that is completely BS free, and bases its approach to security on a resource called “people”. These aren’t cyber bots with “personalities” or even those very clever Japanese ‘humanesque’ robots that I have mates who seemed alarmingly attached to, but actual humans – brains, bodies, that kind of thing. The company is Bugcrowd, if you haven’t heard of them, and the focus is firstly on penetration (pen) testing and, on a general basis, 24×7 attack surface management and vulnerability analysis. As it notes on the website, attackers don’t take a day off, so why should you? “Ethical” hackers have been widely used in identifying security issues since Alan Solomon attempted to discover one of his first computer viruses (I was in his house at the time – it involved a 5.25″ floppy disk), so the idea of bringing a crowd of humans together with all the skillsets from both side of the security divide is simple common sense: here I must refer back to my suggestion at a Netevents back in 2014, that CSaaS (Common Sense as a Service) was surely the best security platform to deploy, and nothing has changed my mind since.
Chatting and meeting up with Bugcrowd EMEAs James Clegg (top guy, even if he is from the wrong side of the Pennines – as in Saddleworth – and, no, I didn’t ask if he was related to Myra Hindley) merely reinforced the idea that, for all the bot-based attacks, security threats stem from actual people, not AI working independently of the human race, so the best way to fight the proverbial fire with fire is to actually utilise that human resource that knows how to expose security vulnerabilities in the first place.
I’m hoping to have a chat with the Bugcrowd founder in the near future, to dig deeper into the approach of the company and how it “integrates” with other product/service aspects of a security strategy, so watch this space on that topic. Meantime, I’m bracing myself for the second round of judging…
Experts argue that the European Commission’s Digital Markets Act, which aims to curb the influence of powerful tech giants, might…
To lead transformation and meet business goals, CIOs must work with other C-level executives. With an ever-expanding C-suite, the…
Economist Carl Shapiro said to get big tech regulation right, Congress can’t lump Google, Apple, Amazon and Facebook into the …
Security researchers have spent the week attempting to break into network-connected hardware and other devices in hopes of …
In response to data breaches involving third-party vendors, Google worked alongside vendors to developed what it refers to as a ‘…
Organizations need to prioritize privacy now more than ever. Follow these steps, and use our checklist to create a privacy …
Aruba is launching the 1960 series, the latest addition to its small business-optimized Instant On portfolio. The new switch …
Cisco’s SASE platform, Umbrella, has all the components of a SASE architecture, but it has a lot of integration complexity and a …
Juniper Networks’ latest Mist AI-enabled product uses private pre-shared keys to secure IOT devices and unify their management. …
Kyndryl, the IBM services spinoff, debuted this week amidst varying analyst opinions as to how it would fare. Kyndryl CTO Antoine…
Use these 50 Unix commands to manage and modify files, navigate directories, monitor your network and users, gather data, and …
Keeping edge devices powered constantly can present challenges in sourcing and managing it. Learn the basics of getting and …
Reltio now has a valuation of $1.7 billion as it raises new funding to help grow its cloud connected data platform to enable …
The startup continues to build out its namesake platform with new capabilities to provide organizations with visibility into how …
NoSQL document-based databases store information in documents with specific keys, similar to a key-value store, but with …
All Rights Reserved, Copyright 2000 – 2021, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info

source

Leave a Reply

Your email address will not be published.