The cold war may be over, but not all of the spies came in from the cold. They bought computers. One might be a mole in your organization, stealing information assets for a competitor or foreign government. Another could be sneaking through your network firewall as you read this.
↧