How Security Complexity Is Being Weaponized

In my last article, I discussed the trade-offs we often make between complexity and capabilities when adopting new security tools and why there is often a point of diminishing returns in terms of the value derived from these tools as we layer on incremental functionality. In this article, I delve a bit deeper into the various types of complexity that security teams encounter, the nuances that distinguish them, and how the resulting complexity often breeds little more than a false sense of security that can be weaponized against us.

Read full article on Dark Reading: Cloud

 


Date:

Categorie(s):

Tag(s):