Tools – information security is fecund* with them, but it never seems like we have what we need. So what’s a poor security analyst supposed to do? In a recent two-part article, I discussed the built-in security functionalities of many common products in our organizations and how we can use them for security.
Via TechTarget Search Networking**:
If you ask enough pros about security tools, it’s little surprise that most say they believe they don’t have enough or the right ones for the job. Yet the industry is overflowing with them. In fact, today it seems that a career in information security is really more about managing tools than actually solving problems — making an already difficult job overwhelming. Conference expo floors are filled with security products, leaving those of us with finite budgets wondering how we’ll ever get everything we need to solve our problems. But here’s the truth: You probably already own most of the cybersecurity*** tools you need.
* I’ve always wanted to use “fecund” in a sentence after first reading “as fecund as shad” in a book by Tom Wolfe.
** Yes, I know there’s a registration wall. But here’s your chance to get creative.
***I also said “cyber” in this article, but blame my editor. I think he was trying to break up how often I said “tools.”
Today’s post pic is from Publicity Magazine.