If you're in IT and your job involves securing your organizations' infrastructure, you've probably spent a good deal of time thinking through control selection -- in other words, picking the controls that most directly help you accomplish the goal of securing your environment.



Source: http://ectnews.com.feedsportal.com/c/34520/f/632000/s/2080913a/l/0L0Stechnewsworld0N0Crsstory0C754150Bhtml/story01.htm
IOMEGA INTUIT
No comments:
Post a Comment