As regular readers of this blog know, I frequently talk about my experiences performing security assessments. These assessments typically cover an organization’s network infrastructure and application portfolio, and are driven by both regulatory requirements (SOX, PCI, HIPAA, etc) and internal requirements arising from governance, risk and compliance policies.
0 Comments