The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2010 vol.8)
pp: 54-55
Bruce Potter , Shmoo Group
ABSTRACT
To deal with targeted, coordinated, and sophisticated attacks on computing systems, security practitioners will need to move beyond the "security throughout the lifecycle" approach. They'll also need to address security concerns related to preexisting software. However, this raises a different set of difficulties.
INDEX TERMS
network security, firewalls, password policy, APT, advanced persistent threat, Aurora, security and privacy
CITATION
Bruce Potter, "Thinking Operationally", IEEE Security & Privacy, vol.8, no. 3, pp. 54-55, May/June 2010, doi:10.1109/MSP.2010.109
37 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool