Skip to content

Lawrence Hecht

Transforming Information Into Knowledge

  • Home
  • Categories
    • Events and panels
    • Miscellaneous
      • Miscellaneous (personal)
      • Miscellaneous (professional)
    • The New Stack
      • Published in The New Stack Update
      • Full article from The New Stack
      • Snippet of The New Stack article
      • No longer in TNS site
  • About the Author
Search
Close menu
  • About the Author
  • Events and panels
  • Miscellaneous
  • The New Stack
work@lawrencehecht.info +1 646 734 3242

Lawrence Hecht

Transforming Information Into Knowledge

Search Toggle menu

Tag: Information security

primary barriers to automating end to end incident response
June 28, 2024February 14, 2025Snippet of The New Stack article

Customer-Facing Incidents on the Rise, IT Leaders Say

Fifty-nine percent of IT leaders said they saw more incidents that affected customers than in the previous year. Even more, 69%, said their organization is not investing in reducing such incidents.

japanese and french use of-infrastructure as-code lags
October 18, 2023February 14, 2025Snippet of The New Stack article

US Leads in Many DevSecOps Practices, France and Japan Trail

Both Japanese and French organizations are far behind the U.S. and global benchmarks for several practices associated with modern DevSecOps teams. For example, while 46% of U.S. respondents said their organizations use infrastructure-as-code, only 22% of French and 15% of Japanese respondents said likewise.

Average Number of Days It Takes Organizations to Resolve Security Alerts
April 18, 2023February 14, 2025Snippet of The New Stack article

73% of Organizations Don’t Enforce Multifactor Authentication

On average, it takes IT security teams 145 hours — just slightly more than six days — to resolve a security alert.

effectiveness of cloud computing risk scoring tools
August 22, 2022February 14, 2025Snippet of The New Stack article

IT Pros Trust Open Frameworks and Clouds Over Third Parties

Despite competitors’ claims, cloud service providers and open source frameworks are seen as effective for risk management, reports the Cloud Security Alliance.

is your company running any programs to reskill workers into tech-focused roles?
July 25, 2022February 14, 2025Snippet of The New Stack article

Cybersecurity Apprenticeships Don’t Address Core Issues

There’s a shortage of security professionals, but recent studies show that hands-on experience is more highly valued than academic degrees in the field, and apprenticeships may not lead to cybersecurity roles.

Audit reports that are challenging to produce
May 17, 2022February 14, 2025Snippet of The New Stack article

Cloud Native Security Hasn’t Solved Compliance Challenges

Eight-four percent of participants in a new survey by Tigera said they found it challenging to meet compliance regulations for cloud native applications.

Mechanisms to document and inventory APIs
February 28, 2022February 14, 2025Snippet of The New Stack article

Using APIs with Low-Code Tools: 9 Best Practices

Low- and no-code tools can speed up software development. But how do you make sure they work with the APIs you need, and don’t create new headaches?

supply chain attacks by industry type
January 27, 2022February 14, 2025Snippet of The New Stack article

Burning Down the House: Quantifying the Impact of Log4j

An Anchore survey of 428 IT and security leaders conducted between Dec. 3 and 22 demonstrates that people believe the Log4j vulnerability had an immediate impact.

January 13, 2022February 14, 2025Snippet of The New Stack article

Blame IT and Security, Not End Users, for Password Problems

BitWarden reported that 53% of IT decision-makers shared passwords via email, a big increase from 39% just a year earlier.

Confidence that API inventory is complete
August 5, 2021February 14, 2025Snippet of The New Stack article

Shadow, Zombie and Misconfigured APIs Are a Security Issue

Only 11% of people surveyed for Salt Security’s State of API Security Q3 2021 are greatly concerned about the security risks of shadow or unknown APIs.

Tools and Methods Used to Prevent Cloud Misconfiguration
July 29, 2021February 14, 2025Published in The New Stack Update, Snippet of The New Stack article

Cloud Engineers Try Policy-as-Code to Cure Misconfiguration Woes

Cloud engineers are looking to policy-as-code to prevent cloud misconfigurations, according to “The State of Cloud Security 2021 Report,” which surveyed 300 US cloud engineering and security professionals.

Israeli cyber companies
May 20, 2021February 14, 2025Snippet of The New Stack article

Israeli Cybersecurity Sector Flourishes

Cybersecurity is at the center of Israeli innovation, and with the current Gaza humanitarian crisis unfolding, it’s worth a reminder of the value that has come from Israeli -based security innovation.

Posts pagination

1 2 … 4 >
© 2025 Lawrence Hecht.