Why a 'Near-Miss' Database Is Key to Improving Information Sharing
Organizations disclose attack details, though information may be limited, following a breach, but what if they did the same with close calls?