article thumbnail

Cybersecurity 2030

Haft of the Spear

The risk has shifted from the user’s device to the IoT devices they depend on for authentication. It would take some truly visionary and powerful executives to require the gander to follow the goose with regards to authentication. Yet the leading “solutions” promoted to counter ransomware are not backup drives but security products.

article thumbnail

AoAD2 Practice: Adaptive Planning

James Shore

You’ll track your SIVs with a short phrase on a card in your visual plan, such as “TPS Report,” “sign-up flow A/B test,” or “authentication vendor independence.” If you want to keep more detailed notes, you can, but for most product managers I meet, a short phrase is enough of a reminder. Incremental Requirements. Visual Planning.