Time to Blow Up the SOC?

Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, …

Microservices and Modern Production Environments Are the Achilles’ Heel of SecOps

Microservices and the increasing popularity of service-based architecture have catapulted Linux from the coder’s tinker toy of yesterday to the most popular platform on the planet today. It’s no wonder …

What is Resiliency and How Can We Apply It to All Phases of Attack? Part 1 of 3

The inevitability of your organization being breached is well established. Vulnerabilities are intrinsic to any software just as human fallibility assures us that users are only one bad decision or …

Resiliency Part 2: Using Misinformation and Intentional Failures to Your Advantage

In my last post about resiliency, we explored a number of ways to make a hacker’s life more difficult, including OTP and other forms of multi-factor authentication and related strategies. …

AI Won’t Replace Developers

Last week, a Slashdot article suggested that eventually AI might replace a developer jobs (discussing Microsoft’s DeepCoder). I doubt it. AI techniques will eventually be able to automate some kinds …