News & Press

Damage Limitation

February 9, 2026

Computing Security spoke to industry experts to learn how best to implement and manage incident response (IR) following cyberattacks and security breaches. Ben Ward, Recast Field CTO UK&I, weighed in on the importance of controlling the software estate. He points out that weak spots are often found in third-party apps that haven’t been updated or have drifted out of governance.

Originally published in Computing Security.

Excerpt: “The strongest footing I’ve seen is to run IR from an application workspace that treats software as a managed service, not a collection of one-off installs.”

decorative stock imageof people at office gathered

Get in touch

As you explore what’s happening at Recast, we’d love to hear from you! Let us know what type of information we can provide or how we can help.