Discussion about this post

User's avatar
Guy Albertini's avatar

Ross, thank you for sharing your insights regarding this topic. As a CISO, I resonated with many of the challenges you eloquently outlined in the article. While reading through the article, I kept wondering where are the myths coming from. Have you looked into the sources of these myths? If not, do you think it’s worth looking into?

No posts

Ready for more?