Discussion about this post

User's avatar
Guy Albertini's avatar

Ross, thank you for sharing your insights regarding this topic. As a CISO, I resonated with many of the challenges you eloquently outlined in the article. While reading through the article, I kept wondering where are the myths coming from. Have you looked into the sources of these myths? If not, do you think it’s worth looking into?

3 more comments...

No posts

Ready for more?