Welcome to
A place to release your cyber-stress

All CyberToon strips

Nov 24

Security vs. Compliance - The Great Debate

Compliance officials don’t always agree with security professionals on the enterprise spending priorities.

It’s no secret that a great deal of cyber security decisions are driven by compliance guidelines and regulatory demands. Regulation, as it comes with potential penalties, creates an “instant ROI” when investing in the necessary activities and controls. 

On the flip side - we know that compliance does not equal security and the gap intensifies when new technologies appear. Regulators lag years behind leading-edge technologies that could potentially make compliance 10X cheaper to execute, easier to operate, and increase an organization’s security posture.

Such is the case with Automated Penetration Testing.

  

Compliance officials don’t always agree with security professionals on the enterprise spending priorities.

It’s no secret that a great deal of cyber security decisions are driven by compliance guidelines and regulatory demands. Regulation, as it comes with potential penalties, creates an “instant ROI” when investing in the necessary activities and controls. 

On the flip side - we know that compliance does not equal security and the gap intensifies when new technologies appear. Regulators lag years behind leading-edge technologies that could potentially make compliance 10X cheaper to execute, easier to operate, and increase an organization’s security posture.

Such is the case with Automated Penetration Testing.

  
Oct 26

Your Story Changes With PenTesting

We build our houses with the intention of them surviving the storm. Likewise, we build our IT and security systems with the intention of them withstanding a cyber attack. 

But the question remains - do we test them or make assumptions and live in a false sense of security just like the fable of “The Three Little Pigs”. 

The reality is that the big bad “hacker” wolf will turn up eventually to “huff and puff”. The question is - do you KNOW what that would do to your house. 

Today, with one click pentesting software, you test on-demand. It’s a shame not to give it a go.

  
Pcysys - your story changed with pentesting

We build our houses with the intention of them surviving the storm. Likewise, we build our IT and security systems with the intention of them withstanding a cyber attack. 

But the question remains - do we test them or make assumptions and live in a false sense of security just like the fable of “The Three Little Pigs”. 

The reality is that the big bad “hacker” wolf will turn up eventually to “huff and puff”. The question is - do you KNOW what that would do to your house. 

Today, with one click pentesting software, you test on-demand. It’s a shame not to give it a go.

  
Oct 4

Our IT Security Legacy

What are we leaving for the next generation of security professionals?

Fact - the attack surface is growing. Be it digitization, threat development, hybrid environments, cloud migration dynamics, or the number of resources needed to ensure the environment is secure. 

We have a choice. Our inheritance could either be cyber security “debt”, an assembly of systems without the ability to monitor, track, audit, and control policy enforcement, or an automated security operation that drives constant improvement. 

There’s only one path to gaining back control - automation. True automation does not require more headcount, and should even release a few to do other tasks.

  
Pcysys cybertoon - Attack surface

What are we leaving for the next generation of security professionals?

Fact - the attack surface is growing. Be it digitization, threat development, hybrid environments, cloud migration dynamics, or the number of resources needed to ensure the environment is secure. 

We have a choice. Our inheritance could either be cyber security “debt”, an assembly of systems without the ability to monitor, track, audit, and control policy enforcement, or an automated security operation that drives constant improvement. 

There’s only one path to gaining back control - automation. True automation does not require more headcount, and should even release a few to do other tasks.