O'Reilly logo

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices by Jeremy Wittkop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_10

10. Deja Vu

Jeremy Wittkop

(1)Boulder, Colorado, USA

Everything that is old is new, and everything that’s new is old.

—Stephanie Mills

Since the Target breach of 2013, there have been a relentless stream of highly publicized cyber-attacks against and vulnerabilities in systems, applications, organizations, processes, and even people. Many times, the victim organizations release statements designed to make it appear as if nothing could have stopped the attacks from happening. The combination of these attacks and the claims that there was no possible defense for those attacks make it easy for organizations to see the situation as hopeless, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required