Power Laws in Cybersecurity

Great graphic (from the people at Information is Beautiful) but it immediately raises a question of just how we measure severity, extent and consequence in this context. Is there an offset and identifiable boundary between naive analysis that concentrates on common as relatively unproblematic or pragmatic metrics and more detailed (yet broader spectrum) analysis that […]