This con is the first thing I’ve experienced that effectively challenges the discomfort ‘security suits’ can feel when mixing with hackers. I was told that would be the case, but you have to see […]
The why, what, how and what next of security policies. Now with a riposte from Phil Huggins who provoked this post and the linked articles by questioning the value of traditional written document sets
Information security policies this week. Is yours all it’s cracked up to be and what security value is it adding for anyone except lawyers, regulators and auditors?