I invite you to imagine a different soccer match. At one side, the Blue Team, in charge of your company’s cyber security protection. In the other, the Black Hats, eager to bypass your company’s cyber defenses and score goals at any cost.
Right now you may be imagining eleven players in each side of the field, properly uniformed, a referee at the center, some coaches, the reserves and so on, like a normal soccer match.
However, the reality may be quite different if we apply to the match the restrictions and challenges faced by cyber security. Let’s take a look:
Let’s consider that it’s enough explanation for our metaphor and update the field image.
Quite unfair, right? Let’s try to balance things a little. Here are some tips for the blues:
Now, with these improvements, let’s see the field again.
This way, chances are the Blue Team will start making beautiful defenses to the point of getting fans and sponsors attention as if they were scoring goals!
About the Author:
Edited by Pierluigi Paganini
(Security Affairs – Black hats, Blue Team)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.