Yes, of course it is! It is not however simple to design information systems with privacy in mind […]
vulnerability management
It is very disappointing for an information security professional to repeatedly discover how organizations neglect security basics. Vulnerability […]
In November 2013 I have published an article in the CSO Journal titled “The quest for weak links […]