What is your assessment of DoD’s published strategy?

1 Comment

  • William McMahon - 13 years ago

    Appears to be just a continuation of current policy of waiting until data is stolen before trying to close the breach rather than making sure that the data is not vulnerable in the first place, i.e., too much defense not enough offense in the approach. Don’t wait until the horse is stolen to close the barn door.

Leave a Comment

0/4000 chars


Submit Comment