Beware cybersecurity tech that’s past its prime — 5 areas to check or retire

Beware cybersecurity tech that’s past its prime — 5 areas to check or retire Beware cybersecurity tech that’s past its prime — 5 areas to check or retire

“When we select vendors, we tell them we’re not going to issue a password or even a token or a key, those are all examples of static authenticators,” he says. “But we’re also realistic, so if there is a product we need that requires passwords, then we require passwords to be rotated frequently. For us, the use of static credentials has become the exception, not the rule.”

2. Mandatory scheduled penetration testing

Although not a specific security tool, nevertheless mandatory scheduled pen testing is cited by some as an outdated strategy.

Attila Torok, CISO at tech company GoTo, for one, believes those once- or twice-a-year penetration tests done to satisfy regulatory or vendor requirements don’t effectively evaluate an organization’s true security posture. Rather, he says they capture only a snapshot of the environment’s security at one date in time.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use