Ross, thank you for sharing your insights regarding this topic. As a CISO, I resonated with many of the challenges you eloquently outlined in the article. While reading through the article, I kept wondering where are the myths coming from. Have you looked into the sources of these myths? If not, do you think it’s worth looking into?
Good question. Frankly - no idea. I think it's just one of these lazy statements that we like to repeat in the industry, and because they're said so often we just don't question it? Hard to say.
Thank you for your response. I appreciate it and look forward to reading your other posts. I’m new to this platform. I decided to join it after reading your article.
Ross, thank you for sharing your insights regarding this topic. As a CISO, I resonated with many of the challenges you eloquently outlined in the article. While reading through the article, I kept wondering where are the myths coming from. Have you looked into the sources of these myths? If not, do you think it’s worth looking into?
Good question. Frankly - no idea. I think it's just one of these lazy statements that we like to repeat in the industry, and because they're said so often we just don't question it? Hard to say.
Thank you for your response. I appreciate it and look forward to reading your other posts. I’m new to this platform. I decided to join it after reading your article.
Welcome, Guy! Happy to have you on board!