Managing the Security Wall of Data


This article is quite different from other articles published in basic training; rather than focus on a specific security-related technology, I want to focus on another important topic: how to be more effective as a security person.

DOI: 10.1109/MSP.2009.127

Cite this paper

@article{Howard2009ManagingTS, title={Managing the Security Wall of Data}, author={Michael Howard}, journal={IEEE Security & Privacy}, year={2009}, volume={7} }