A Balanced Approach to Performing a Security Assessment

By on

Fundamentally, there exist just two basic approaches to performing security assessments: vulnerability priority and asset priority.

While these two approaches will eventually (if taken to their ultimate conclusion) converge to the same result, it is rare for an organization to hold the line and make the investment required to follow the process to its finale. More commonly, IT and business managers will request a more ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?