The systems management imperative: Achieving more effective perimeter security from the inside out
To fend off cyber attacks, organizations must approach security from all touchpoints, including inventory and asset management, patch management and configuration enforcement.