Viruses, Trojan horses, worms, time bombs, adware, spyware, keystroke tracking tools, spoofing, snooping, sniffers -- these are some of the most popular examples of malicious code and techniques that modern organizations find themselves fighting. Couple this seemingly unabated tide of new releases and new forms of harmful software with human threats like crackers, thieves, industrial espionage contractors, and your own disgruntled or ill-intentioned employees, and what do you get? You get a complex cocktail of potential security headaches. How big a headache?
Article
Security and Risk Management: The Never-Ending Game of Chess
Posted December 1, 2005 | Leadership | Cutter Benchmark Review
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.