Last night I got a visit from the #infosec fairy.

She said: "Martin, you have been doing a lot of good security deeds, I decided to grant you a wish."

I replied: "Great, I always wanted a unicorn."

The fairy looked pained: "You know, unicorns are extinct. That is a very difficult wish. Do you have another one?"

I thought long and hard: "How about a working IT security process?"

Now I have a question for the community: What does an unicorn eat?

Follow

the unicorn eats the working IT security process... 

@masek Ok I like the answers on this thread - 🦄

And in addition I offer my answer that the unicorn eats the working IT security process. ❗ 🤯 ❗ 🦄

So as soon as you have a working IT security process the unicorn(s) start eating it... HINT: Unicorns multiply

==================
Other mentioned mentions :thumbsup_hmn_h2:
==================
@fiee "Raising Unicorns” book by Jessica S. Marquis

@Doreen32128 "Glitter! Always glitter!"

@hunspirillen I think they eat broken dreams and good intentions 🦄

⬆️ ⬆️ SIMILAR TO MY ANSWER ⬆️ ⬆️

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.