This post stated out as a technical post about commonalities found in the field that vary based on business operating model, IT capability and vectors used by threat actors. Whilst writing this it led more into business leadership, governance and investment risks. How do these two subjects’ interface? Well to be honest they are the same thing from a different lens.
In this post we are going to look at:
- Common Technology Deployment Models and the associated threats/risks/vulnerabilities
- Common challenges I find in organisations
- And finally, a question… is this the business outcome that you want
This is not meant to be an essay, but simply a rapid-fire view of things that I see that are major challenges with digital security in today’s age. So, without any further delay let us hit it:Read more “5 Major Challenges with Business Digital Security”