Data Insecurity: Flawed Technology Or Outdated Business Process?

Dark Reading | January 06, 2016

When it comes to protecting critical data, Armor CSO Jeff Schilling says legacy processes are just as vulnerable as legacy software. For Dark Reading, Schilling outlines this strategy and why our habits, tendencies and “that’s the way we’ve always done it” attitudes are hindering our ability to improve our security postures.