Read more" />

How To Protect Yourself From DDoS Attacks

In a series of recent articles, I’ve compared a company’s need for a cybersecurity portfolio to an individual’s investment portfolio. The same rules apply to both, with the wisest strategy being a spread of investments, diversified across asset classes, that are aligned with your present needs but adaptable to change as your needs change.

As part of that series, I’ve also been profiling individual cybersecurity solutions that can fit into a larger corporate portfolio. I’ve framed these products in terms of how they fit into the National Institute for Standards and Technology’s cybersecurity framework, which has five categories for dealing with threats: identification, prevention, detection, response, and recovery. To figure out how much your business needs to invest in each of these categories, I proposed a five-step strategic planning process for creating a balanced cybersecurity portfolio.

Read full news article on