Читать книгу Corporate Cybersecurity - John Jackson - Страница 28

1.12.4 Corrections

Оглавление

Program managers should strive to speak highly of researchers and the great work that is provided as a service. “Hackers” aren’t malicious by default, and program managers receive first-hand experience of ethical behavior. When hackers are called malicious, program managers should strive to set the record straight and describe the differences between an ethical hacker (security researcher) and a malicious hacker (threat actor).

Corporate Cybersecurity

Подняться наверх