Security-In-Depth Using Integrated Risk-Conscious Controls

Most organizations take a perimeter-centric approach to security, assuming most attacks come from outside the organization. Yet there's no longer a clear boundary between what's inside or outside the organization, and attackers range from unhappy employees to well-funded, state-sponsored hackers. Organizations need a new approach to IT security.

Provided by: Tripwire Topic: CXO Date Added: Jun 2012 Format: PDF

Read more

Find By Topic