Information Security vs. Product Security: Who’s to Navigate, Who’s to Steer?
In a recent Ed TALKS, I had the distinct pleasure of hosting three prolific industry thought leaders in cybersecurity: Matthew Rosenquist, Shira Rubinoff, and John Yeoh. Our discussion was broad-ranging and included everything f…
In the two decades I’ve spent in cybersecurity, I’ve observed and experienced the fighting spirit of security professionals: When tasked with safeguarding information assets, we envision ourselves erecting defenses to keep threat actors at bay, or we emulate malicious actions to find flaws in the organization’s security measures before attackers exploit them. We fight. Let’s…