Any reasonable information security system consists of two fundamental components: (1) a risk assessment; & (2) controls that minimize those risks. In this article I want …
Obviously not. Why is this so obvious? We’ll get back to this in a moment, but first I want to describe how a LinkedIn Invitation to Connect led to this …