In Part 1, we discussed cybersecurity, primarily from the defensive point of view, and provided a simplistic explanation of Pareto Optimality. But defense isn’t the only side at play. We tend to think, however, in terms of defense, which leans toward a linear thought process.
It's encouraging that many organizations have become aware of security of their networks and computer resources. This awareness is sometimes triggered by breach or fraud headlines in tech journalism, which leads to concern and curiosity. There is one type of organization, however, that has me greatly concerned.