Internal IT Security Threat

July 10, 2010 SecurityOrb_Staff 0

Security Administrators should apply the “Defense in Depth” security model when it comes to protecting the network. This mean network firewalls, IDS, HIDS, host-based firewalls, patch management, security policies and vulnerability scanning. […]