| http://www.w3.org/ns/prov#value | - What are the limits of Network Security Monitoring?How important a role do you think secure coding and secure software development life-cycle play in defending the enterprise?Have HIPAA, PCI, SOX and other regulations helped reduce risk in the average enterprise?
|