How are you diversifying threat intelligence sources? Have you been able to reduce reliance on CISA for TI?
Are you concerned that generative AI tools will make it harder to spot phishing attacks?
Extremely concerned: we need a mitigation strategy ASAP!17%
Somewhat concerned72%
Slightly concerned: it’s on my radar but not a key focus10%
Nope! Not at all concerned
View Results
How valuable to reducing change/fail % is it if a sys admin is able to predict the impact of a kernel or glibc change before applying the change to their Linux systems?
Highly valuable30%
Moderately valuable68%
Not valuable at all.1%
View Results
How are companies doing Unified Vulnerability Management? The idea is bringing all inputs (AppSec, DevSecOps, VM scanning, asset discovery etc) into one platform. Instead of creating a homegrown solution, are there vendors that do this well?