Why? There is no deployment of advanced cybersecurity measures that are capable of handling evolving threats without human intervention.
Why? The advanced cybersecurity systems were not readily available when the organization’s network was put in place and there has only been piecewise additions to the network.
Why? The design and approval of advanced cybersecurity systems was still in progress and could not be implemented.
Why? Natural process of technological evolution.