IT Best Practices: Protecting the Perimeter

IT Best Practices: Protecting the Perimeter

Podcast
Podcaster

Beschreibung

vor 11 Jahren
IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins
At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media web sites would have been counterproductive and, in any case, impossible. We realized that if we [...]

Kommentare (0)

Lade Inhalte...

Abonnenten

15
15
:
: