From Mental Models to Computational Models
It used to be that a diligent team of analysts with some programming skills could do a respectable job of protecting an enterprise on their own. They knew enough of the specific threats, the specifics of the enterprise, and the specifics of the enterprise network, that they could monitor for problems and mitigate those problems. Unfortunately, the volume and voracity of the threats has grown. The variety of business models has expanded. The complexity of enterprise network topologies has increased. These factors mandate that cybersecurity solutions evolve. Cybersecurity teams must upgrade to a better strategy.
No longer are one-off scripts and the programming of lookup tables adequate to face the criminal elements. The risks and liabilities are just too high.Read More »