4 Comments
User's avatar
Guy Albertini's avatar

Ross, thank you for sharing your insights regarding this topic. As a CISO, I resonated with many of the challenges you eloquently outlined in the article. While reading through the article, I kept wondering where are the myths coming from. Have you looked into the sources of these myths? If not, do you think it’s worth looking into?

Ross Haleliuk's avatar

Good question. Frankly - no idea. I think it's just one of these lazy statements that we like to repeat in the industry, and because they're said so often we just don't question it? Hard to say.

Guy Albertini's avatar

Thank you for your response. I appreciate it and look forward to reading your other posts. I’m new to this platform. I decided to join it after reading your article.

Ross Haleliuk's avatar

Welcome, Guy! Happy to have you on board!