{"id":1501,"date":"2025-01-08T13:07:04","date_gmt":"2025-01-08T13:07:04","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=1501"},"modified":"2025-01-08T13:07:04","modified_gmt":"2025-01-08T13:07:04","slug":"how-cybersecurity-jargon-creates-barriers-and-wastes-resources","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/","title":{"rendered":"How cybersecurity jargon creates barriers and wastes resources"},"content":{"rendered":"<p>Acronyms aren\u2019t unique to\u00a0<a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-online-cyber-security-courses\" data-analytics-id=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-online-cyber-security-courses\" data-url=\"https:\/\/www.techradar.com\/best\/best-online-cyber-security-courses\" data-hl-processed=\"none\" data-custom-tracking-id=\"6167514521488535091\" data-hawk-tracked=\"hawklinks\" data-google-interstitial=\"false\" data-label=\"cybersecurity\">cybersecurity<\/a>, but they\u2019ve become a hallmark of how we communicate with each other. Do we really need to be adding this layer of complexity to an industry which is already complex? Or are they just making our devs more depressed? Let&#8217;s make security accessible and actionable.<\/p>\n<p>The cybersecurity industry is seeing record growth, growing 20% YoY, and built on the promise of increased\u00a0<a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-productivity-apps\" data-analytics-id=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-productivity-apps\" data-url=\"https:\/\/www.techradar.com\/best\/best-productivity-apps\" data-hl-processed=\"none\" data-custom-tracking-id=\"1404812780983910571\" data-hawk-tracked=\"hawklinks\" data-google-interstitial=\"false\" data-label=\"productivity\">productivity<\/a>. And yet developers often struggle to focus on what matters. Instead, they are met with another new acronym that has them reaching for that dictionary every time they want to get something done. We\u2019ve developed something unique in the cybersecurity industry &#8211; a language that no-one natively speaks.<\/p>\n<p>Take \u201cstatic application security testing\u201d as an example &#8211; that doesn&#8217;t really mean anything to people that don&#8217;t know what it is already. But what it actually does is try to secure our code. With that knowledge we can then immediately try to understand what \u201cdynamic application security testing\u201d is. It\u2019s semantics, not guess work. (p.s. The latter is like a hacker trying to find vulnerabilities in our applications.)<\/p>\n<p>My main frustration is that I can\u2019t understand why we actually even need an acronym for those things when we could simply describe what they do. When we&#8217;re building security tools, we should be able to easily describe what they do in non-technical terms, instead of trying to describe what they are.<\/p>\n<p>As this communication barrier moves up the chain and crosses the technical divide, these problems become even more amplified. At the board level, security teams are completely against the wall in terms of funding. We have this catch-22 situation where security teams aren&#8217;t getting enough funding, or at least they believe they&#8217;re not, and we&#8217;re also suffering way more from security attacks. One of the biggest issues is that at the board level, the decision makers don&#8217;t understand a lot of what&#8217;s needed. Because they don\u2019t understand what things actually do. You can\u2019t walk into the boardroom and ask the CEO to part with some cash for a CNAPP.<\/p>\n<p>The cynic in me also sees a lot of these acronyms as money-printing machines. When we create new acronyms that replace the old ones and say we need new tools for them, it just looks like an upsell. And, even when something might be needed, it\u2019s difficult to separate the necessities from the snake oil.<\/p>\n<p><a href=\"https:\/\/www.techradar.com\/pro\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\">Read the Full Story Here<\/a><\/p>\n<p>Source: Tech Radar<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Acronyms aren\u2019t unique to\u00a0cybersecurity, but they\u2019ve become a hallmark of how we communicate with each other. Do we really need to be adding this layer of complexity to an industry which is already complex? Or are they just making our devs more depressed? Let&#8217;s make security accessible and actionable. The cybersecurity industry is seeing record [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1501","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How cybersecurity jargon creates barriers and wastes resources - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How cybersecurity jargon creates barriers and wastes resources - Community\" \/>\n<meta property=\"og:description\" content=\"Acronyms aren\u2019t unique to\u00a0cybersecurity, but they\u2019ve become a hallmark of how we communicate with each other. Do we really need to be adding this layer of complexity to an industry which is already complex? Or are they just making our devs more depressed? Let&#8217;s make security accessible and actionable. The cybersecurity industry is seeing record [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-08T13:07:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2024\/05\/pexels-tara-winstead-8386440.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/\",\"name\":\"How cybersecurity jargon creates barriers and wastes resources - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2024\/05\/pexels-tara-winstead-8386440.jpg\",\"datePublished\":\"2025-01-08T13:07:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2024\/05\/pexels-tara-winstead-8386440.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2024\/05\/pexels-tara-winstead-8386440.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How cybersecurity jargon creates barriers and wastes resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How cybersecurity jargon creates barriers and wastes resources - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/","og_locale":"en_US","og_type":"article","og_title":"How cybersecurity jargon creates barriers and wastes resources - Community","og_description":"Acronyms aren\u2019t unique to\u00a0cybersecurity, but they\u2019ve become a hallmark of how we communicate with each other. Do we really need to be adding this layer of complexity to an industry which is already complex? Or are they just making our devs more depressed? Let&#8217;s make security accessible and actionable. The cybersecurity industry is seeing record [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2025-01-08T13:07:04+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2024\/05\/pexels-tara-winstead-8386440.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/","name":"How cybersecurity jargon creates barriers and wastes resources - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2024\/05\/pexels-tara-winstead-8386440.jpg","datePublished":"2025-01-08T13:07:04+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2024\/05\/pexels-tara-winstead-8386440.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2024\/05\/pexels-tara-winstead-8386440.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/how-cybersecurity-jargon-creates-barriers-and-wastes-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"How cybersecurity jargon creates barriers and wastes resources"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=1501"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1501\/revisions"}],"predecessor-version":[{"id":1502,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1501\/revisions\/1502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/1261"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=1501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=1501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=1501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}