Abstract

This column will examine directions in security —trends that are likely to affect the protective strategies and tactics of your enterprise and your processing partners. In examining security and continuity issues, we'll take an extended-enterprise view, giving due consideration to the impact of security technologies on all aspects of business management and operations. We'll look to the future, certainly, but with at least one foot planted firmly in the here and now. And where opinion might become confused with fact, every effort will be made to identify which is which. Which brings me to the subject of this first column— which I'll admit is strongly opinionated.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.