1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Mind the gaps: A holistic approach to securing the network

Discussion in 'CSO' started by RSS, Jun 10, 2015.

  1. RSS

    RSS New Member Member

    Securing a network becomes more challenging when the enemies are deceptive, clever, and savvy snakes, but recognizing the gaps in their security strategies before the criminals do can help organizations minimize detection and response times.

    I’m reminded of Macbeth whose valor in war against Norway was rewarded with the title of Thane of Cawdor. In gratitude, Lady Macbeth encourages her husband to kill the king. She advises him, “Your face, my thane, is as a book where men/May read strange matters. To beguile the time/Look like the time. Bear welcome in your eye/Your hand, your tongue. Look like th' innocent flower/But be the serpent under ’t.” (Shakespeare, I.v.53-57)

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page