How To Find Cybersecurity Vulnerabilities Across Your Environment

When I was a CTO running a data center, I used to ask my ops team to do the shotgun test. They had to imagine our worst enemy came into the data center with a shotgun with one slug. What could they destroy to do the most damage? (I didn’t realize until recently that this was a modified version of Netflix’s Chaos Monkey testing approach.)

Lately I’ve wondered what the cybersecurity equivalent of the shotgun test is. How could you even do such a test? The fact is, without an understanding of your weaknesses, it isn’t possible to see what your worst enemy would do to you.

Creating a balanced security portfolio

Read more…

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.