Blog 2 in cybersecurity series: Who has access?

Blog 2 in cybersecurity series: Who has access?

In the second in our blog series demonstrating what we can learn from historical events and how to apply them to future technologies, David Rogers discusses some aspects of access control, showing that even the places with the most expensive defences can be...