This debate has been going on for two decades. The 2000s exposed fundamental problems with security organizations deploying emerging networked-based technologies that often were significantly beyond the security team's technical capabilities. Interestingly, the 2020s are reducing the technical expertise that security organizations need. But who should be in charge? Security? IT? Neither?
**************** *** *** * **** ** LinkedIn***** **** ****:
*** ************* ******** ********* ******** ****** or **** *** ** ** ** in ****** ** ******** ********* ***** that ** ***** ** **** ********* more ** ********* ******** ****** **** security ********** **** *** **** ******* is **** ** *** ********.
*'** ********* **** ********* ***** ** running ******** ** ******* ** *********, etc. ****, *** ********** ******* **** technology, *** ***'* ** ******* ******* technology *** *** ***** *** **** IT ****** ******* *******. ** ****** are *** ******* ** ******* ** marketing ** ********.
*'* **** ***** **** **********, ***** makes ** ****** ** ****** *** involvement ** **, ***** ** *** "old ****", ** *** ** ** more ******* ******** **** *******, ******* arrays, *** ***** ****** ***** *** being ******* ** ********** **** *****.
********?
********, **** ** *********** *** ***** make ********* ***** ****** ** ********** security. ** ****** *****'* ****** *** is ********** ** ****** - *** have ** **** **** ****** ** other ******* ** **** **** **** they *** *** ***** *** ****.
**** ** ********* **** **** ** and ******** **** ** **********. ****, we'd****** ******* ******** ** ******* **, but **** ****** ************ ******* ******* 7. **'******* *********** ******* *********, *** ***** in *** ******** ********** *** ***** to **** ********* ***** **** ***** in *** ********** **********.
**'* *** ***** ************* *** ***** of *** ******* *** ******* * way ** **** ****** ** ********* and ****** ** ******** ****** ***** limitations. ** ******** *** *** **** for ********* ****** - * ***** application ** ******** ********* ** *** better ********* - *** ******* *** have ** **** **** ***** ****'** at.
**** ******** ****** *** ** ****** dictators *** ****** **** ********* ****** the "******" *** ** ***** ******, that ***** *********. *** *******, ******* passwords ************ *** **** ****** ******************, ******* **** ******** ** ******** them.****'* **** ** *********: "******** ** *** ******* ** usability ***** ** *** ******* ** security."