

Information Security: Do Your Systems Serve You or Your Adversaries?
We have read the news stories: an attacker gains access to a networked system at some company or hospital or government agency. The system owner has lost control. That system now serves the...