Lately, the most common question I get when doing briefings and presentations about the growing threat of cyber attacks is: What is the answer?
I have been giving that a fair amount of thought and have solicited input from others who are active in the field and have a good understanding of the current state of this threat. So I am going to try and address this question for the first time publicly. Keep reading →