Assume That Your Network Is Already Breached. What's Next?

Assumption of Breach is the only realistic network defense strategy that governments and corporations should have today. If you agree, then the next question you should ask is - what data can I not afford to lose?

In order to help you answer that question, I've written a paper that was published this month in the Georgetown Journal of International Affairs (International Engagement on Cyber edition).

You can read my article here, although I recommend that you order the journal for its many excellent articles.

Comments