As with many information security professionals, I am a proponent of the so-called “defense in depth” approach to security—using multifaceted technologies and approaches to layer defenses and minimize ...