Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Prioritization of work (security)

Feed in a collection of docs about applications in use at an organization including their user guides; summarize what the capability of each application is; identify what capabilities are high risk; prioritize which applications need the most security visibility

Usually this is a classic difficult problem of inventory and 100 meetings.

Perfect? Nope. A huge leap forward? Yes.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: