Sun Tzu advises that we should first make ourselves invincible, and then await enemy vulnerability. Does this idea work in the realm of Cyber Security?
Sun Tzu advises that we should first make ourselves invincible, and then await enemy vulnerability. Does this idea work in the realm of Cyber Security?