The current cybersecurity landscape of guerrilla warfare A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.