A Chief Information Security Officer is concerned that contract developers may be able to steal the code used to design the company’s latest application since they are able to pull code from a cloud-based repository directly to laptops that are not owned by the company. Which of the following solutions would best protect the company code from being stolen?
grelaman
1 year, 7 months agosirpetey
1 year, 7 months agokumax
1 year, 8 months agoChilaqui1es
1 year, 8 months agoBubu3k
1 year, 10 months agoRori791
1 year, 11 months agoRori791
1 year, 11 months agoDany_Suarez
2 years agotutita
2 years agotutita
2 years agoadrian1188
2 years, 1 month agoCyberCEH
2 years, 1 month agokiduuu
2 years, 2 months ago