February 9, 2026
Computing Security spoke to industry experts to learn how best to implement and manage incident response (IR) following cyberattacks and security breaches. Ben Ward, Recast Field CTO UK&I, weighed in on the importance of controlling the software estate. He points out that weak spots are often found in third-party apps that haven’t been updated or have drifted out of governance.
Originally published in Computing Security.
Excerpt: “The strongest footing I’ve seen is to run IR from an application workspace that treats software as a managed service, not a collection of one-off installs.”