This article describes how some federal and state IT managers are dealing with cybersecurity with limited funding available. http://www.fcw.com/supplements/homeland/2003/sup4/hom-solutions-12-01-03.asp
Article formerly posted at https://www.hsdl.org/blog/newpost/view/s_154