Security Basics
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
RE: Security design methodology Nov 05 2012 06:59AM
Dave, Manish, R. - ESIL \(MUM\) (Manish Dave essar com)
I feel it's not more than a marketing gimmick to sell UTM device. I fully agree with Terence that vendor recommendations are biased. I would recommend adherence to a framework custom designed for your organization's business type. Take feeds from 'Cobit 5 for Information Security' and SANS Top 20 co...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus