From the back room to the boardroom – making IT security a business partner
/In my previous post in this series, we discussed the more persistent type of defending we need to do. This ‘persistent defense’ model yields more valuable intelligence and a deeper level of understanding of the attackers. It can help take the guess work out of attribution and attacker objectives. But the ultimate question is: how can you use this intelligence to influence business decisions?
Read More