Marc Silver, Head: Information Security at Discovery
Articles
We need to look to emulate our attackers, or rather, to imitate specific characteristics that they display.