Low-Priority Threats: The Achilles Heel of Security Teams
No company has ever been breached as a result of a high-severity alert. There may be a few exceptions, but high-severity alerts are not generally what’s keeping security teams up at night. Organizations are well-prepared to diffuse a threat once it’s identified and deemed a priority. Breaches overwhelmingly occur when ... Read More
Security Analytics: Using Game Design to Improve Visualization and Insights
Although gamification has been widely adopted within enterprises for recruiting, project management and customer engagement, the trend has yet to be widely accepted in cybersecurity. However, many concepts used in game design have the potential to significantly improve today’s security analytics standards and outcomes. My colleague, Sagar Mohite, is on ... Read More

