The overused term ‘Cyber’, along with information security and information assurance, can be broken down into five broad categories. These are Compliance, Auditing, Framework based, Actual security, and Continual Monitoring. There is great overlap in many of these, and many are at times construed to mean something else because a lack of understanding or just a lack of manpower to accomplish all the work. Unfortunately, Compliance and Auditing take precedence many times over Actual security and monitoring because the former costs money if found liable, and the other costs money but at times seems to have no tangible monetary benefit.
SOURCE: infosec.markobrien.us
Most Commented Posts
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Most Active Commenters
Recent Comments
Meta’s fine over data privacy breaches underscores the critical challenges…
Hi, Thanks, that is really useful information. I do have…
“This is a very worrying attack that hit T-Mobile and…
“This latest cyberattack against T-Mobile may be smaller than previous…
“Genesis Market is a complex global criminal access marketplace. Buyers…