Advertisment
network security assessment of Hotmail and network security threat in earlier
now they use email security software
Points:
information security and assurance
cyber and network security
cyber threat defense and forensics
intelligence analysis
risk assessment, mitigations, and resilience
security policy development
privacy protection and assurance
security audit and compliance
emergency and security management across multiple venues