« Integrate First | Main | Information Security Debt Clock »

Comments

Rob Lewis

A problem we see with defense in depth is that it should start at the core where the crown jewels are, rather than the perimeter, and govern where data is released to. Your comments on reference monitors and integration provide a foundation for this.

The comments to this entry are closed.