Christopher McDougall’s 2009 book Born to Run: A Hidden Tribe, Superathletes, and the Greatest Race the World Has Never Seen paints a damning picture of an industry dedicated to a profitable but harmful product line. With each successive product generation, the extent of the damage caused by reliance on the product grows, driving purchases of newer versions that promise new solutions to alleviate the pain. But, what if, as McDougall posits, the problem is not one of product technology, but of the underlying premise behind the product? While Born to Run speaks to the physiological . . .
TABLE OF CONTENTS
United States Cybersecurity Magazine
- Hacking Humans: Are You Safe? Addressing Vulnerabilities in the Advancing Medical Device Landscape
- We Hear The Problems, But What Are The Solutions?
- IT Governance to Streamline and Strengthen Your Cybersecurity Posture
- DoD Contractors Prepare for CMMC Assessment and Certification in 2020
- Data Subject Access Requests (DSAR) Under CCPA (California Consumer Privacy Act): Challenges and Solutions
- Practical Advice for DoD Contractor Cybersecurity Compliance