If You Are Paying for Information Security Technology, You Have Paid Too Much

Posted April 30, 2002 | |

These days, securing corporate data is more than having a firewall. Information security as a holistic approach encompasses risk analysis, technical controls, administrative controls, personnel issues, physical security, and business continuity. Addressing these information security facets requires money, and in many cases the facet that requires the most money is the implementation and support of technical controls.

About The Author
Robert Kerby
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.