These days, securing corporate data is more than having a firewall. Information security as a holistic approach encompasses risk analysis, technical controls, administrative controls, personnel issues, physical security, and business continuity. Addressing these information security facets requires money, and in many cases the facet that requires the most money is the implementation and support of technical controls.
If You Are Paying for Information Security Technology, You Have Paid Too Much
By Robert Kerby
Posted April 30, 2002 | |
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.