« Decision tree for calculating breach cost | Main | Four Often Overlooked Factors to Give Your Security Team a Fighting Chance »

Comments

Roger

Beware the fox disguised as a chicken! The best way I see to protect against this is detection. Once one chicken is headless to have the process and/or systems to detect this and react to protect the rest is a must. Maybe we should start to think of DMZs as Detect Malicious (activity) Zones?

Scott

"Unchewifying"......I like the term!!

The comments to this entry are closed.