From the Winter 2014 Issue
Protecting Your Data
Maintaining IT Security Threat Monitors
Author(s):
Benjamin Shelton, , Nangwik Services
David Wean, ,
A few years ago the majority of our work focused on pen tests, security assessments and compliance audits. Most of our clients didn’t have giant networks but they were still of a respectable size, most between two and ten thousand network nodes. At the time, few if any of these businesses were using any method … Read more