Community Member
Community Member
kudos icon +

4.Adopting a Threat-Aware Proactive Defense

Adopt content-centric security of data

Adopt content-centric security of data using digital rights management techniques to protect data at the source and track exfiltrations of data that depart from pre-set boundaries.

Add tags and help us assess and classify your idea. Pick from the list below or type in a new tag.

Voting

3 votes
Public Input
Idea No. 62