Most attacks successfully infiltrate production environments without detection (helpnetsecurity.com)
How To Build Multi-Cultural Security Programs For Global Organizations (informationsecuritybuzz.com)