Risk Assessment Gets to the Bottom of Security Basics

Posted June 30, 2009 | Technology |

In recent Advisors, I have talked about data security and perimeter security (see "Are You at the Controls? Do You Know Where Your Data Is?" 10 June 2009 and "Is Your Perimeter Secure?" 17 June 2009).

About The Author
Mike Rosen
Mike Rosen is a Cutter Expert and a member of Arthur D. Little's AMP open consulting network. He is an accomplished architect, analyst, and technical leader with extensive experience in digital transformation, enterprise architecture, business architecture, service-oriented architecture, product strategy and development, software architecture, consulting and mentoring, distributed technologies, and industry standards. Mr. Rosen has 40 years'… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.