An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
An information security manager finds a legacy application has no defined data owner. Of the following, who would be MOST helpful in identifying the appropriate data owner?
What is the GREATEST risk when there is an excessive number of firewall rules?
The root cause of a successful cross site request forgery (XSRF) attack against an application is that the vulnerable application: