How Sutton’s Law Applies to Cybersecurity Today

November 9, 2017

In my previous article, I raised a red flag about the diminishing practical returns of “mom and pop” threat research as a proxy for mitigating vulnerabilities and bad consequences. Threat assessment is often both difficult and incomplete, and sometimes best left to those who have timely access to the best possible data (and the even then, left to those with the military and intelligence means to act on it). In that piece, I also begged an obvious question. If chasing threats are not the best allocation of an organization’s...

Read more...

Previous Article
Fortinet to Demonstrate Broadest Portfolio of Cloud Security Solutions at AWS re:Invent in Las Vegas
Fortinet to Demonstrate Broadest Portfolio of Cloud Security Solutions at AWS re:Invent in Las Vegas

Fortinet is proud to be a Gold Sponsor of the 6th annual AWS re:Invent conference, being held at the Veneti...

Next Article
What Education IT Professionals Can Learn at the 2017 CETPA Annual Conference
What Education IT Professionals Can Learn at the 2017 CETPA Annual Conference

The 2017 CETPA Annual Conference will be held from November 14th– 17th at the Pasadena Convention Center. F...