« An Introduction to Data aliasing, AKA “tokenization” and “pseudonymization” | Main | Security in Context – Take 2 »

February 19, 2010

TrackBack

TrackBack URL for this entry:
http://www.typepad.com/services/trackback/6a00d8341e76b553ef0120a8b84153970b

Listed below are links to weblogs that reference Beyond the Tipping Point: Responding to Operation Aurora :

Comments

The comments to this entry are closed.

  • Burton Group Free Resources Stay Connected Stay Connected Stay Connected Stay Connected


Blog powered by Typepad