| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Information Security has an ingrained fear of new technology, which brings
with it new complexity. This fear spills over into our own unwillingness to use
these 'new-fangled' technologies to make our lives easier, leaving security
professionals still working with CSV sheets, trying to locate the APT in the bar
chart and struggling to make sense from monolithic SQL databases while the rest
of the world shoots forward with AJAX-enabled workflows, advanced visual
analytics and distributed expert systems. We justify our luddism with a mix of
insistence that our problems are unique and unsolvable outside of the field,
willfully dismissive of the possibility that some of the fundamental issues
facing Infosecurity today have already been solved in other areas in more
elegant ways than we have the time to even imagine today. We'll cover some of
the more interesting technologies that could revolutionize information security
knowledge and workflow management and drag us from the dark ages of the
temporary solutions that we've forgotten were only meant to be temporary.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast