In the world of e-business, security architectures must be built to address the new risks to security, capacity, performance and even survivability. Traditional information security processes and technologies-such as backup, firewalls and encryption-are improving, effective and necessary. But they're not enough."The environment and the technology are extremely complex, and securing them is a moving target," says Neil Cooper, senior manager of the security practice at New York-based PricewaterhouseCoopers. Furthermore, he explains, the exploits are more and more sophisticated, and the people who are conducting the exploits are becoming more and more sophisticated
As a result, protecting systems and data requires an increasing and continuous level of sophisticated monitoring and testing.
Register or login for access to this item and much more
All Digital Insurance content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access