

You may think of them as hackers, but those who breach networks, steal intellectual and other property, and commit espionage are usually referred to as bad actors and adversaries. While I was driving the other day, I started thinking about how those who aren’t cybersecurity professionals might wonder, “What’s the…