It’s no secret that we’re facing a critical cybersecurity talent shortage. Despite persistent outcry from security leaders and experts, it’s only getting worse.
Board members are often entrusted with sensitive data and information, which ensures they can be effective in their roles. But if that data gets into the wrong hands, the organization could run into costly legal trouble and reputational damage.
With ransomware and distributed denial of service (DDoS) attacks on the rise, the average number of focused cyberattacks per organization has more than doubled this year compared to the previous 12 months.
Only about half of all countries have a cybersecurity strategy or are in the process of developing one, the International Telecommunication Union reported in its second Global Cybersecurity Index.
Mark Zuckerberg recently made headlines when, in a picture he posted in celebration of an Instagram milestone, it was observed that his laptop’s camera and microphone were taped over in an attempt to mitigate the threat of remote monitoring.
Starting last August, we began the current series of articles to provide our readers with a deep dive into the NIST Framework and its approach to Identify, Protect, Detect, Respond to and Recover from cybersecurity incidents.
The character Don Quixote became legendary tilting at imaginary giants that were ultimately just windmills dotting an expansive countryside. His cause was noble, but his efforts were fruitless and completely misguided.