Cyberwarriors Doing Battle with Themselves

By on

All too often, we shoot ourselves in the foot as information security professionals by the language we use with executives.

Certainly, the military intelligence backbone that resonates through much of our profession has given us a language that is rich with military and aggressive overtones. We use terms like attack and penetration, compromise, DMZ and perimeter defense. We buy intrusion detection systems and ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?