Showing 1 ideas for tag "trust"

4.Adopting a Threat-Aware Proactive Defense

Think Like The Adversary

Community Member kudos icon + Community member
By nature, defensive safeguards place the adversary in control; he need only breach one point of weakness to reach success. In contrast, the defender must attempt to cover all possible weaknesses. Shoring up these weaknesses becomes a costly enterprise and the economies of scale help ensure the attacker maintains the advantage.

Current security tools independently address weaknesses; suites of tools offer more complete... more »


1 vote
Public Input