Best to look at security policy using ecological predator-prey models. If you don't, than you fall victim to the assumption a "puzzle" you can't break is unbreakable in general.
Nuisance users don't publish CVE, and a zero trust model shows you something important. =3
Hard pass...
In general, a public security policy is pointless. It is the one layer you want people to trip over when breaking a system. =3
Why do you say so?
Best to look at security policy using ecological predator-prey models. If you don't, than you fall victim to the assumption a "puzzle" you can't break is unbreakable in general.
Nuisance users don't publish CVE, and a zero trust model shows you something important. =3
3 replies →