tag:blogger.com,1999:blog-3173237590648578243.post4179166672063927280..comments2023-07-26T09:07:58.615-07:00Comments on Randy Marchany: Cybersecurity and other stuff: Monitor First - The OriginRandyhttp://www.blogger.com/profile/15650573868196476768noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-3173237590648578243.post-59134303879868333192016-03-11T18:22:17.781-08:002016-03-11T18:22:17.781-08:00Hi Randy, I see this is an old article. I'm cu...Hi Randy, I see this is an old article. I'm currently researching the higher education space as a Product Managerin the AppSec space. I work on a web application perimeter monitoring solution. <br /><br />I realise perimeter monitoring is passe these days and for mature organisations like yourselves, I'd agree. I realise there must be large disparities in the HigherEd space but y'all are much more resource constrained than your enterprise counterparts. <br /><br />To that end, would you consider app focused perimeter monitoring still useful? Secondly, you use the word monitoring in a more DIY context using existing logs and other data sources. However, how have you advised colleagues at less mature institutions to fit that into their already busy schedules? I'm amazed by such appsec pros who are usually dealing with a crisis a day also making the time to dabble in coding/automation pursuits. <br /><br />Cheers, <br />SaiSai Chavalihttps://www.blogger.com/profile/16035996976837092027noreply@blogger.com