At regular intervals over the past years, I have referred to the 1970s Ware Report. In my opinion this document remains required reading for any cyber security specialist. While Willis Ware and his partners focused on the risks associated with the move from single user computing to multi-user computing, the threat model documented in the report and its associated conclusions remain relevant today.

Cyber Security can be represented as a continuous improvement loop that starts with the identification of threats, followed by the operationalisation of exploitation tactics, and ending with the development of controls to mitigate the impact. During all phases of this process, massive amounts of data are generated that need to be processed, analysed, and turned into actionable information. As both offence and defence are moving faster and faster, this takes a lot of resources for each and every company. This is exactly why we decided to create Spotit Insights.

At spotit, we want to support our customers – and the world – with expertise and vision. With Spotit Insights, we break down the latest and greatest from both sides of the cyber security world and provide you with the information you need in four main categories:

Boardroom Briefings

Cyber Security has quickly moved from being a technical specialty to becoming an executive’s responsibility. In this category of posts we aim to inform executive audiences as well as cyber security professionals that report to them. Go here to find the latest information on cyber security regulation, board communication for CISOs, and efficient cyber security program management.

Connectivity Corner

The network has rapidly evolved from connecting computers with each other to moving data and computing workloads efficiently to wherever they are needed. This category will cover everything from facilitating remote work, over delivering innovative application performance, to connecting cloud infrastructure.

Risk Resilience Realm

Risk is a key driver for running an efficient security program, for communicating about cyber security horizontally and vertically, and to build resilient infrastructures. In this category we are covering a mix of industry or regulatory risk management requirements, risk assessment and management methodologies, and associated do’s and don’ts. If you are a CISO, Security Manager, or generally interested in how risk economics impact organizations, this will be your cup of tea.

Security Spotlight

Cyber Security comprises many domains. From deeply technical, over regulatory compliance, to building an ISMS. This category covers all topics that are directly related to cyber security in all its complex beauty and diversity. If you are a technical or cyber security expert, this category will help and guide you through your daily work with relevant information and guidance.

Tech Talk Hub

We can not talk about connectivity and security without talking about technology. This category was created as a place where solutions, products, and methodologies can be discussed and documented. We aim to provide you with details of where certain functionality fits in a well-designed architecture, how to get the most out of them, and how to ensure their efficiency. From the desktop to the cloud, we cover it all for a deeply technical audience.

There are a few basic rules for Spotit Insights that I believe we need to explicitly lay out and that will help you find the content that matters for you:

  • All content is created and redacted by our spotit engineers.
  • The aim for each post is to be relevant, informative, and actionable.
  • Each post fits in at least one of the above categories.
  • External sources are referenced and linked.

As we kick off 2024, spotit looks forward to continue creating value for our customers and the broader security and connectivity communities in Belgium, Europe, and the world. As your partner for security and connectivity we’re here to curate, inform and support.