This resource is no longer available
SCM: Getting Back to IT Security Basics
Cloud computing, virtualization, social networking, and other recent IT trends have given rise to new and alarming threat vectors that drastically increase the likelihood of data breach. Cybercriminals are preying on weakly configured and loosely monitored systems, so a strong defense starts with configuration management.
This resource explores the essential role that Security Configuration Management (SCM) plays in protecting the corporate network and preventing data breaches – read on to get started.