“One can only protect something, if they know what is it they need to protect, where is it, who is accessing it and how, how is it being used and to what level should they protect it”. The above principle holds true, more than anything, for Information Security professionals. Primarily, because to secure any information […]