The Beginning

For years in my Technology Security or Admin job, I have been performing different types of analysis pertaining to vulnerabilities and breaches. Along those same lines, I have been presenting breach news to management in a way that usually gives them the short news as to what happened and are we “vulnerable” in such a […]