In the last few months, a few cyber-attacks have successfully stolen important data. Just recently, a supply-chain attack has figured out serious gaps in U.S. cybersecurity strategy. With all of these attacks that have stolen thousands or millions of important data, a reorientation of the U.S. cyber strategy is a must. And the inky way to do it is to use the “assumption of breach” approach. The assumption of breach approaches operates because an adversary has already gained access to their sensitive networks.
The Crossroads of Special Operations