After land, sea, air, and space, warfare has entered the fifth domain: Cyberspace. That's what this book "The Fifth Domain" sheds light on. Resilience is the capacity of any "entity... to prepare for disruptions, to recover from shocks and stresses, and to adapt and grow from a disruptive experience. One of the recommendations was that when the NSA finds a hole in widely used software, it should tell the manufacturer, with rare exceptions. Those exceptions would be approved at a high level by the government. If we have data, let's look at data. If all we have are opinions, let's go with mine. There are two kinds of companies: those that have been hacked and know it; and those that have been hacked and don't. Needs to do to protect itself fits into one of five core "functions": Identify, Protect, Detect, Respond, and Recover. Software was not built to be used, it was built to be bought by someone at the top. Cybersecurity Framework's five fun...