Dissemination of Information in the Cyber Age

Traditionally, most organizations that took part in offensive and defensive operations from a combatant perspective kept vulnerability information within the confines of a need-to-know classification structure. Yet, the concept becomes reversed when dealing with vulnerability information regarding cyber systems. Any individual with access to the Internet can search for these vulnerabilities and find a….

READ MORE

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s