Tag: Reactive
-
Reactive cybersecurity prevails in US healthcare
Healthcare organizations across the U.S. continue to be more reactive than proactive in cybersecurity, as evidenced by their adherence to …
-
Stop Playing Catchup: Move From Reactive to Proactive to Defeat Cyber Threats
Breaches are now happening with such frequency that a reactive response is no longer the correct answer. Historically, a breach would …
-
Moving Threat Identification From Reactive to Predictive and Preventative
In a previous post, we focused on organizations’ characteristics, such as sector, geography, risk and impact, when discussing the pillars …
-
From Reactive to Proactive: Security as the Bedrock of the SDLC
Secure code development should be a priority, not an afterthought. The benefits are significant and well worth the additional time and …
-
Presentation: Reactive Spring Security 5.1 by Example
Rob Winch demos applying Spring Security to a reactive application, highlighting some of the new features in Spring Security …
-
Reactive Spring Security For WebFlux REST Web Services
In this series of posts, we’ll dive into how exactly to configure Spring Security for reactive and stateless WebFlux REST APIs. …
-
Reactive or Proactive? Making the Case for New Kill Chains
The kill chain model is not new to most security professionals. Created in 2011 by Lockheed Martin, the model highlights the seven stages …
-
Software Composition Analysis: Reactive Maturity Model
Technology is constantly transforming how your organization is run for the better. You empower stakeholders to make smarter, data-driven …
-
Presentation: Spring Security 5: The Reactive Parts
Rob Winch demonstrates using the reactive support in Spring Security 5, starting with a simple application and incrementally securing it, …
●●●