Tag: Information Security
-
Making the users accountable
We all know that information security relays on a layered approach. It´s about people, process/programs and technology. And we all know about Advanced Persistent Threats. How they work, attack vectors, etc.
Shows the problem well, chooses the cheap way out by saying that resolving it will be specific to each company.