Working as a consultant or CISO in the information security sector, I have witnessed several revolutions in technology and IT practices. Several business processes now rely on applications that automatically receive and transmit data from and to computer networks belonging to suppliers, customers, or partners. In order to have full…