Cyber-security fortresses built on quicksand

被引:0
|
作者
Flexera Software, United States [1 ]
机构
来源
Netw. Secur. | / 8卷 / 5-8期
关键词
D O I
10.1016/S1353-4858(15)30068-4
中图分类号
学科分类号
摘要
The recent spate of cyber-security breaches, such as those suffered by Sony, Office and Anthem/BlueCross Blue Shield, underscores just how vulnerable enterprises are to malware and hacker attacks.1-3 CEOs at organisations of all sizes are well aware of the risks and are taking unprecedented interest in the measures that their IT and security teams are putting into place to fend off potentially catastrophic intrusions into their systems by hackers and other malicious actors. Organisations are building security fortresses to defend against cyber-security threats. But while extremely sophisticated, they are often being built on quicksand. The ability to inventory hardware and software is critical to building a strong cyber-security foundation. But while most organisations have multiple sources of software and hardware inventory data, they usually do not have a means to consolidate that data from across all their systems and environments. This renders the very foundation of their cyber-security fortress vulnerable, explains Vincent Smyth of Flexera Software. © 2015 Elsevier Ltd.
引用
收藏
相关论文
共 50 条
  • [31] Strategic Communication for Supporting Cyber-Security
    Kuusisto, Tuija
    Kuusisto, Rauno
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 72 - 79
  • [32] Physical Cyber-Security of SCADA Systems
    Bichmou, Ahmed
    Chiocca, Joseph
    Hernandez, Leonarndo
    Hoffmann, R. Wade
    Horsham, Brandon
    Huy Lam
    McKinsey, Vince
    Bibyk, Steven
    PROCEEDINGS OF THE 2019 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2019, : 243 - 248
  • [33] The cyber-security challenge at the connected industry
    Garcia-Bringas, Pablo
    Angulo, Ignacio
    Goti-Elordi, Aitor
    Pastor, Iker
    DYNA, 2019, 94 (03): : 258 - 261
  • [34] A genetic epidemiology approach to cyber-security
    Santiago Gil
    Alexander Kott
    Albert-László Barabási
    Scientific Reports, 4
  • [35] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [36] Plugging the cyber-security skills gap
    Caldwell, Tracey
    Computer Fraud and Security, 2013, 2013 (07): : 5 - 10
  • [37] Fuzz Testing for Automotive Cyber-security
    Fowler, Daniel
    Bryans, Jeremy
    Shaikh, Siraj Ahmed
    Wooderson, Paul
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 239 - 246
  • [38] Cyber-security initiative now underway
    Jevtic, N
    CHEMICAL PROCESSING, 2003, 66 (02): : 17 - 17
  • [39] European Cyber-Security Research and Innovation
    Maggi, Federico
    Zanero, Stefano
    Markatos, Evangelos
    ERCIM NEWS, 2015, (100): : 43 - 43
  • [40] The Effects of Cyber-Security on Healthcare Industry
    Alharam, Aysha K.
    El-madany, Wael
    2017 9TH IEEE-GCC CONFERENCE AND EXHIBITION (GCCCE), 2018, : 689 - 694