Defense-in-Policy begets Defense-in-Depth

The majority of companies today focus solely on technical requirements for an information security program. When addressing the legendary AIC triad, companies focus on pulling controls from three categories: Administrative, Technical/Logical, and Physical/Environmental. Often, the Administrative...
By Matthew Greenwell
April 3, 2015

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg