CXO

Security-In-Depth Using Integrated Risk-Conscious Controls

Date Added: Jun 2012
Format: PDF

Most organizations take a perimeter-centric approach to security, assuming most attacks come from outside the organization. Yet there's no longer a clear boundary between what's inside or outside the organization, and attackers range from unhappy employees to well-funded, state-sponsored hackers. Organizations need a new approach to IT security.