Phishing is no longer some email scams warning you about account dues and foreign princes. Today's threat actors leverage deepfake, advanced detection evasion mechanisms and extensive research to attack you.
Looking at pros and cons of a centralized vs decentralized approach to cybersecurity teams, and how in the end there is no right answer. This is a cycle and we should focus on relationships rather than hierarchies.
Universities host valuable data about vulnerable individuals. They are faced with a barrage of cyber attacks. Cyber espionage is a growing concern. Underfunding of IT is a major obstacle.