ISTOCKPHOTO

A Better Way to Conduct Security Vulnerability Assessments

By Luke Bencie

Why is it that progress comes quickly in some areas of our lives and slowly in others? Consider for a moment that we lived for decades with household items that did not evolve much and were simply viewed as utilitarian goods. Think vacuum cleaners, thermostats, hairdryers, and coffee makers. These were all mundane appliances, which could be found in any middle-class home across America since the 1950s. Yet, these very same items have recently been reinvented and rebranded as luxury accessories (dare we say status symbols) that are priced several times more than their predecessor models.

Have we reached a tipping point where any product, especially those considered no-frills (even drab) can be “sexed up” and re-packaged as the exclusive must-have gift of the year? The days of the $900 vacuum cleaner are upon us. And, while product evolution is pricey, it is also widely appreciated by those who utilize them to make their everyday tasks easier to perform.

Finally, the security industry has found its version of the Nespresso Coffee Maker minus George Clooney as a spokesperson. It’s a technology that has been way overdue and when incorporated will immediately enhance your security posture. In fact, it’s hard to believe that we in the security profession have gone so long without this innovation tool. But, instead of being an appliance upgrade for the housewives found on the television series Mad Men, it is a modern solution to an old problem tha...