1 of 2
George Catlinâs 1832 drawing of âBall-play of the ChoctawâBall Upâ in Oklahoma (Permission Smithsonian Institution)
Ha-tchoo-tuck-nee, the Snapping Turtle (Peter Pitchlynn); The Snapping Turtle (Permission Smithsonian Institution) featured
By Mike Cathey Guest columnist Apr 10, 2021 1 of 2
George Catlinâs 1832 drawing of âBall-play of the ChoctawâBall Upâ in Oklahoma (Permission Smithsonian Institution)
Ha-tchoo-tuck-nee, the Snapping Turtle (Peter Pitchlynn); The Snapping Turtle (Permission Smithsonian Institution)
When George Catlin, a young Philadelphia lawyer and struggling painter, saw a delegation of Native Americans from the Far West in the late 1820s, he was inspired to embark on a new career. Admiring their grace and dignity â âarrayed and equipped in all their classical beautyâ â and believing that their way of life was fas
Quarterbacking Vulnerability Remediation
It s time that security got out of the armchair and out on the field.
Traditional vulnerability remediation occurs in silos the security team detects vulnerabilities, prioritizes which ones need to get fixed first, and punts the list over the cubicle wall for the IT operations team to handle.
But that approach is no longer tenable. The rate and pace at which vulnerabilities occur requires the strategic alignment of IT functions across the enterprise. Since the security team owns vulnerability management, it should be accountable for creating and maintaining that alignment. Rather than approaching vulnerability remediation as a game of hot potato, they must play a much longer game and drive the process. Security teams need to assume the role of a quarterback one who s gunning for a touchdown.