Slider by IWEBIX

Wellington Research

Intelligence and insight that transforms capabilities into results

Featured Research

Spend on Security

Is your organization underspending on information security? If you’re like most, spending on information security lags far behind other priorities. Only during the past few years has spend on information security started to increase, but it still lags behind. In this Research Report, Wellington summarizes findings from research conducted with thousands of organizations to highlight

Can You Say Security as a Service?

Security as a service is the future of security and it's future is now.

In the old days we used to code a lot. "What's that", you say? It was the day when we tweaked toggles on the front-end of the machine to bootload the system image, or loaded a paper tape to a memory location, loaded a card deck that had been punched at a teletypewriter, and used PDP LA 36 DEC Writers with a modem to type in programs.

We used vi, emacs, notepad, and XEDIT among many other editors. We invented many different assemblers, microcode, Fortran, Basic, Algol, Forth, C, APL, and Java among many other programming languages. And we learned how to manipulate and move data from one state to another, from one repository to another, and developed business workflwo software applications to automation business functions an d then later automate end-to-end business processes. And although we still code a lot today, what we do is changing from writing algorithms to move date, to using algorithms that operate on data to develop more predictive algorithms for interpreting data in this virtuous ML cycle that builds on past breakthroughs in ML.

And therein lies the rub for security. The future of security lies not in more whack-a-mole alternatives - although there are still a few breakthroughs to be made - but in where its code runs. In the old days security code ran on the local network. That's where real men ran security after all. Today it doesn't.  In fact, if security code is running on the local network it means the mediation the security control is implementing is one that cannot easily be scaled, inspected, analyzed, replicated, debugged, updated, modified, upgraded, or replaced.

read more »

Latest News