What has been labelled as one of the most advanced intrusion attacks in the past 20 years, has brought more questions than answers, but it has also given organisations a chance to reorient their security policies and move to an approach that embraces protection of identity and applications, while ensuring that their data is accessible, at its core, only to them.
The brings to light several new findings everyday, even as federal agencies and corporate. teams continue scurrying to strengthen their architecture and prevent such attacks in the future. What has been labelled as one of the most advanced intrusion attacks in the past 20 years, has brought more questions than answers, but it has also given organisations a chance to reorient their security policies and move to an approach that embraces protection of identity and applications, while ensuring that their data is accessible, at its core, only to them.