If you think technology can solve your security problems, then you don’t understand the problems, and you don’t understand the technology.
—Bruce Schneier
Throughout the remainder of this book, we will operate under the central premise that every organization across the globe has too much information flowing throughout their environment for it to be feasible to monitor the content and context of everything that is transferred. Due to the volume of electronic information, should an organization choose to attempt monitoring of every transmission, half or more of the organization’s ...