ContentPenetration Testing: Thinking outside the Black BoxDiane SeddonJanuary 16, 2004Perimeter security technology such as firewalls, content filtering and anti-virus protection, is paramount to a business's defense against attack but can by no means be assumed to be impenetrable.
ContentManaging the Security of Data FlowDiane SeddonJanuary 12, 2004Customer relationship management (CRM) systems are cited as one of the major technology successes of the last decade.