CDSA

Applying the 80-20 Rule to Cybersecurity (Dark Reading)

[svg-table-content]

Information risk has multiple components. With too many threats to assess individually, too many vulnerabilities to patch all at once, and many choices among controls, where should security leaders start? What’s the priority?