Implementing a "threat-centric" security strategy means to focus on which one of the following options?
A. defenses
B. attacks
C. company assets
D. compliance regulations
E. security controls
Implementing a "threat-centric" security strategy means to focus on which one of the following options?
A. defenses
B. attacks
C. company assets
D. compliance regulations
E. security controls