Enterprise Security Landscaping

What To Do First Quadrant quadrantChart title Core Security Controls Maturity Assessment x-axis Low Implementation Complexity --> High Implementation Complexity y-axis Low Impact --> High Impact quadrant-1 Strategic Projects quadrant-2 Essential Foundation quadrant-3 Supporting Controls quadrant-4 Specialized Needs Basic IAM: [0.2, 0.8] SIEM/SOC: [0.9, 0.9] Email Security: [0.3, 0.9] Network Controls: [0.4, 0.6] XDR Platform: [0.8, 0.8] Zero Trust: [0.9, 0.7] Vulnerability Scanning: [0.3, 0.4] Asset Management: [0.2, 0.3] Security Awareness: [0.1, 0.6] GRC Platform: [0.7, 0.4] CASB: [0.6, 0.3] Threat Intel: [0.6, 0.2] Pen Testing: [0.9, 0.3] API Security: [0.5, 0.5] The quadrant is a visual aid to help assessing and prioritizing security risk mitigation activities. Below you will find a more exhaustive overview of what needs to be prioritized. Use that and other information from your own organization to build your own quadrant. ...

November 13, 2024 · 18 min · 3781 words · Security Architecture Team

Git vs Blockchain: A Comparison

When discussing version control and distributed ledger technologies, it’s possible to think of Git and blockchain and get confused on where they overlap and where they go their own way. Both use hash chains to maintain data integrity. However, their fundamental purposes and ideal use cases are different. In this post, we explore what each technology was designed to solve and when blockchain actually offers capabilities that Git cannot provide. ...

September 2, 2023 · 3 min · 608 words