Download Now Free registration required
One of the major challenges for today's IT security professional is having a strong awareness of the type of data and value of the data that they are responsible for protecting. No matter how robust their technology is, or how vigorous the monitoring systems are, data and/or Intellectual Property (IP) can find a way to leak out (i.e., data leakage) onto less secure systems and devices for which they are not intended.
- Format: PDF
- Size: 1153.8 KB