There is no shortage of hype in the information security world. But how can an organization cut through the hype to identify the people, process, and technology necessary for them to improve their security posture? My latest piece in DarkReading discusses an approach: http://www.darkreading.com/attacks-breaches/the-matrix-reloaded-security-goals-v-operational-requirements/a/d-id/1323796?.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment