A blog on Information Security Leadership, primarily targeting decision makers. Common topics include discussion of current cybersecurity events, as seen from the perspective of applied cryptography, enterprise architecture, risk management and privacy.
Monday, October 16, 2006
I was just writing a fairly extensive entry for this blog when I "got help". Needless to say, the entire story is gone, and I do not feel like doing it again. So in summary: we are still here, unpacking is progressing and work is good.