Get a Pentest and security assessment of your IT network.

News

Securosis

Four years ago I wrote the initial Data Security Lifecycle and a series of posts covering the constituent technologies. In 2009 I updated it to better fit cloud computing, but I have never been happy with that work. It was rushed and didnt address cloud specifics nearly sufficiently. This update should better reflect the more complex environments and use cases we tend to see these days. The Lifecycle includes six phases from creation to destruction. In the first post we will revisit the basic lifecycle, and the next post will add locations and access devices.”]

Source: http://www.securosis.com/blog/data-security-lifecycle-2.0

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months