
The Cybersecurity Playbook for Modern Enterprises
By :

The three triumvirates discussed in this chapter were people, process, and technology; confidentiality, integrity, and availability; and people, data, and threats. (Section: Security triumvirates)
Traditional security models often are techno-centric and do not use the security triumvirates discussed previously. Instead, they focus on the technology used and therefore are vulnerable to change. (Section: Challenges with the traditional information security model)
The information life cycle defines the stages of the life of information in an environment. The stages are creation, storage, use, sharing, and destruction. (Section: Protecting information)
A workload is a program or application that runs on...
Change the font size
Change margin width
Change background colour