Quote of the week : Security Education
“The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won’t suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully.”
– Kevin Mitnick (Quote of the week : Security Education | Oct 23, 2017)
editor's pick
Embracing Zero Trust Architecture is the future of cybersecurity. Learn why Zero Trust is essential for protecting modern digital environments.
news via inbox
Subscribe to our newsletter and get hot new posts right into your inbox.

