It’s tempting to think of cybersecurity as an epic battle for control of global electronic resources, something waged between titans of technology, hidden armies of malicious actors and valiant defenders racing against the clock. That is the image portrayed on the big screen, and, not infrequently, at events like Black Hat, DEFCON and the RSA Conference.
It’s unfortunate then, that so much of what is so critical to cybersecurity is so, well, mundane. And, while being mundane has an impact as to how attractive a field is or the extent to which it is resourced, it doesn . . .
Leave a Comment