Death to the spreadsheet
If you're in security engineering, chances are good that you're tracking misconfigurations in a spreadsheet. This is an incredibly inefficient way to do things, and it's time for a change.
Software like ThreatKey is going to improve the way we track misconfigurations, and it's going to make our jobs a lot easier. We'll be able to see what's going on in real-time, and we'll be able to fix problems before they become serious.
Spreadsheets are slow, and they're often inaccurate because of the time delta between when information is entered and when it is acted upon. They're also a pain to update and maintain — especially as complexity or the number of items tracked grows. Software is going to make all of that a thing of the past.
There are a lot of reasons why people in information security use spreadsheets today. For one, they are a great way to organize data. Spreadsheets can help you keep track of what data is important, and what data is not. They can also help you visualize data, which can be helpful when trying to understand complex security issues. But so can various software, some of which is designed specifically for this purpose. So why do people use spreadsheets?
Perhaps a reason why people in information security use spreadsheets is because they can be used to create detailed models and simulations. This can help security professionals test out different security scenarios to see what might happen. This is a valuable tool that can help prevent serious security breaches. But software can determine these same details in a more automated way.
In general, people in information security use spreadsheets because they are a versatile tool that can be used for a variety of tasks. They can be used to track data, create models and simulations, and even help forecast the impact of security breaches. But there are other, more specialized tools that can do these things in a more automated way. Custom software exists which can streamline and automate many of the tasks that people use spreadsheets for in security.
In particular, there are several advantages to using custom software over spreadsheets when it comes to tracking data. First, custom software can be designed to track data in real time, which is not possible with a spreadsheet. This means that you can get an up-to-date picture of what is happening in your environment at all times. Second, custom software can be designed to track data over time, so you can see trends and patterns that might not be apparent from looking at a single snapshot. Finally, custom software can be designed to reference data across different types of applications and networks, which may simply not be possible within a spreadsheet.
Spreadsheets are just plain handy. They can be used for a variety of tasks, from keeping track of passwords to creating reports. They are a versatile tool that can help make your job as a security professional a lot easier. But what if we could deliver that value in a product, rather than having to create it ourselves?
Software like ThreatKey is going to make our jobs as security professionals a lot easier. We'll be able to track misconfigurations more effectively, and we'll be able to do our jobs better — and everyone will benefit.
© Jonathan Haas.RSS