This pieces focuses on how IT security folks can use the same method to identify vulnerabilities in our own IT environments so we can fix them and stay ahead of the bad guys. Note that you’ll need to register and log in to read the paper:
About The Author
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.