Chapter 3. Enterprise Security Management (ESM)
“The big lie of computer security is that security improves by imposing complex passwords on users. In real life, people write down anything they can’t remember. Security is increased by designing for the way humans actually behave.” | ||
--Jakob Nielsen |
ESM in a Nutshell
There is no piece of technology that once deployed will solve all of an organization’s security problems. Security encompasses people, process, and technology. By finding the right combination of these, an organization can successfully reduce risk.
One key piece of technology needed to address security risk is a central logging and analysis solution that leverages the investment that has already been made in the organization’s technology ...
Get Enemy at the Water Cooler now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.