Modernizing Authentication — What It Takes to Transform Secure Access
As 2009 came to a close, EnterpriseITPlanet.com contributor, Sonny Discini compiled a list of the "Four Unreasonable Security Practices You're Probably Following."
The article looks at security in the enterprise a bit differently than most commonly accepted wisdom, and it was a tad controversial. You may not agree with Discini (yet), but we found Discini's perspective thought-provoking, and we expect you will too.
The four unreasonable security practices you're probably following include: Antivirus; Intrusion Detection Systems; Security Information and Event Management Systems; and Data Leakage Protection.
To learn more about why Discini includes each one--and what constitute reasonable security practices, read the full article at our sister site, EnterpriseITPlanet.com.https://o1.qnsr.com/log/p.gif?;n=203;c=204634421;s=15939;x=7936;f=201702151714490;u=j;z=TIMESTAMP;a=20304455;e=i