What are some tips for creating an effective information security strategy?
Content you might like
Is the Double Diamond Design Model Still Relevant? In today’s world where code can be pushed multiple times a day, and prototypes quickly tested, the rigid phases of the Double Diamond can feel constraining. The model’s omission of execution for three-quarters of the process could create significant risk. Do you think is it time to reconsider this design approach?
Proactively seeking ways to integrate them18%
Evaluating their potential but proceeding cautiously75%
Not actively considering them in architecture8%
Does the risk of Ransomware and malware propagation bother you? Is IoT security a top of mind for you? To protect against many risks, we have witnessed success of micro-segmentation in the data center. Would you be willing to deploy similar solution for the campus? I am very curious to get your feedback?
Read More Comments