Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Sunday Security Maxim

November 29, 2015 by Marc Handelman in Security Maxim

Methodist Maxim: While vulnerabilities determine the methods of attack, most vulnerability or risk assessments will act as if the reverse were true. Compiled by Roger G. Johnston, Ph.D., CPP, Argonne National Laboratory

November 29, 2015 /Marc Handelman
Security Maxim
  • Newer
  • Older