Is you security workflow backwards?

Is your security workflow backwards?  Curious what I could be talking about here?  Have a look at my latest DarkReading piece where I discuss this important question:

*** This is a Security Bloggers Network syndicated blog from An Analytical Approach authored by Josh Goldfarb. Read the original post at: