Cyber-security fortresses built on quicksand

被引:0
|
作者
Flexera Software, United States [1 ]
机构
来源
Netw. Secur. | / 8卷 / 5-8期
关键词
D O I
10.1016/S1353-4858(15)30068-4
中图分类号
学科分类号
摘要
The recent spate of cyber-security breaches, such as those suffered by Sony, Office and Anthem/BlueCross Blue Shield, underscores just how vulnerable enterprises are to malware and hacker attacks.1-3 CEOs at organisations of all sizes are well aware of the risks and are taking unprecedented interest in the measures that their IT and security teams are putting into place to fend off potentially catastrophic intrusions into their systems by hackers and other malicious actors. Organisations are building security fortresses to defend against cyber-security threats. But while extremely sophisticated, they are often being built on quicksand. The ability to inventory hardware and software is critical to building a strong cyber-security foundation. But while most organisations have multiple sources of software and hardware inventory data, they usually do not have a means to consolidate that data from across all their systems and environments. This renders the very foundation of their cyber-security fortress vulnerable, explains Vincent Smyth of Flexera Software. © 2015 Elsevier Ltd.
引用
收藏
相关论文
共 50 条
  • [1] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [2] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [3] Cyber-security threat
    Klebba, Jesse
    CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [4] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    ERCIM NEWS, 2015, (100): : 10 - 11
  • [5] ZONESEC: built-in cyber-security for wide area surveillance system
    Pasic, Aljosa
    Martinez-Salio, Jose-Ramon
    Zarzosa, Susana Gonzalez
    Diaz, Rodrigo
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [6] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [7] CYBER-SECURITY RISKS OF FEDWIRE
    Bilger, Mark J.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2019, 14 (04)
  • [8] Challenging confidence in cyber-security
    Strand, Chris, 1600, Elsevier Ltd (2014):
  • [9] On Cyber-security of Augmentation Networks
    Neri, Alessandro
    Baldoni, Sara
    Capua, Roberto
    PROCEEDINGS OF THE 2019 INTERNATIONAL TECHNICAL MEETING OF THE INSTITUTE OF NAVIGATION, 2019, : 408 - 422
  • [10] On Cyber-Security of Information Systems
    Sneps-Sneppe, Manfred
    Sukhomlin, Vladimir
    Namiot, Dmitry
    DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211