How it works...

As organizations navigate the evolving and ever-changing technology landscape, they must also navigate and prepare for escalating and more targeted cybersecurity threats. These are threats faced by every organization; however, the nature of threats that are specific to some organizations differs from those for other organizations. For example, a manufacturing firm may focus on protecting its programmable logic controllers and factory line assets, while a financial services firm may focus on protecting confidential client transaction records and other data. Given these differences in focus, organizations across verticals share the common and fundamental need to secure their applications and devices. A set of rules was therefore ...

Get Microsoft Operations Management Suite Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.