Carolyn and Seth walk through the highlights of CompTIA's new State of Cybersecurity 2025 report. This annual study explores attitudes, strategies, and tactics around cybersecurity. This year's report uses the enterprise architecture model to lay out an organizational approach, starting with establishing priority at the business level, then moving through workflow considerations that include risk management and AI integration. At a more tactical level, companies then have to work through a process for data management and the details of securing all assets.State of Cybersecurity 2025: https://www.comptia.org/content/research/cybersecurity-trends-research
Carolyn and Seth walk through the highlights of CompTIA's new State of Cybersecurity 2025 report. This annual study explores attitudes, strategies, and tactics around cybersecurity. This year's report uses the enterprise architecture model to lay out an organizational approach, starting with establishing priority at the business level, then moving through workflow considerations that include risk management and AI integration. At a more tactical level, companies then have to work through a process for data management and the details of securing all assets.State of Cybersecurity 2025: https://www.comptia.org/content/research/cybersecurity-trends-research
Carolyn and Seth walk through the highlights of CompTIA's new State of Cybersecurity 2025 report. This annual study explores attitudes, strategies, and tactics around cybersecurity. This year's report uses the enterprise architecture model to lay out an organizational approach, starting with establishing priority at the business level, then moving through workflow considerations that include risk management and AI integration. At a more tactical level, companies then have to work through a process for data management and the details of securing all assets.
State of Cybersecurity 2025: https://www.comptia.org/content/research/cybersecurity-trends-research