Analysis | January 26, 2022 Bridging 18y Studying Cyber Risk in Supply Chains /wp-content/uploads/cybersupplychain.png 302 705 Wade Baker /wp-content/uploads/[email protected] Wade Baker2022-01-26 12:09:542022-06-14 12:32:58Bridging 18y Studying Cyber Risk in Supply Chains
Analysis | January 3, 2022 Cisco Security Outcomes Study Methodology Post II: The Rise of Item Response Theory /wp-content/uploads/bump_difficulty.png 1500 2100 Ben Edwards /wp-content/uploads/[email protected] Ben Edwards2022-01-03 13:51:232022-01-20 21:51:23Cisco Security Outcomes Study Methodology Post II: The Rise of Item Response Theory