Cyber-security fortresses built on quicksand

被引:0
|
作者
Flexera Software, United States [1 ]
机构
来源
Netw. Secur. | / 8卷 / 5-8期
关键词
D O I
10.1016/S1353-4858(15)30068-4
中图分类号
学科分类号
摘要
The recent spate of cyber-security breaches, such as those suffered by Sony, Office and Anthem/BlueCross Blue Shield, underscores just how vulnerable enterprises are to malware and hacker attacks.1-3 CEOs at organisations of all sizes are well aware of the risks and are taking unprecedented interest in the measures that their IT and security teams are putting into place to fend off potentially catastrophic intrusions into their systems by hackers and other malicious actors. Organisations are building security fortresses to defend against cyber-security threats. But while extremely sophisticated, they are often being built on quicksand. The ability to inventory hardware and software is critical to building a strong cyber-security foundation. But while most organisations have multiple sources of software and hardware inventory data, they usually do not have a means to consolidate that data from across all their systems and environments. This renders the very foundation of their cyber-security fortress vulnerable, explains Vincent Smyth of Flexera Software. © 2015 Elsevier Ltd.
引用
收藏
相关论文
共 50 条
  • [21] AI, Connectivity and Cyber-Security in Avionics
    Gatti, Marc
    Damien, Alienor
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 35 - 38
  • [22] Cyber-Security Incidents and Audit Quality
    Rosati, Pierangelo
    Gogolin, Fabian
    Lynn, Theo
    EUROPEAN ACCOUNTING REVIEW, 2022, 31 (03) : 701 - 728
  • [23] Cyber-Security Threats Origins and their Analysis
    Cerget, Maros
    Hudec, Jan
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) : 23 - 41
  • [24] Cyber-security in substation automation systems
    Moreira, Naiara
    Molina, Elias
    Lazaro, Jesus
    Jacob, Eduardo
    Astarloa, Armando
    RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2016, 54 : 1552 - 1562
  • [25] Pennsylvania starts cyber-security initiative
    不详
    COMPUTERS & SECURITY, 2001, 20 (08) : 650 - 650
  • [26] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197
  • [27] Special Issue on Cyber-Security for Development
    Osei-Bryson, Kweku-Muata
    Vogel, Doug
    INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2014, 20 (02) : 93 - 95
  • [28] Self-Healing for Cyber-Security
    Gijsen, Bart
    Montalto, Ruggero
    Panneman, Jeffrey
    Falconieri, Federico
    Wiper, Paul
    Zuraniewski, Piotr
    2021 SIXTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2021, : 84 - 90
  • [29] Strategic Communication for Supporting Cyber-Security
    Kuusisto, Tuija
    Kuusisto, Rauno
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 72 - 79
  • [30] The cyber-security challenge at the connected industry
    Garcia-Bringas, Pablo
    Angulo, Ignacio
    Goti-Elordi, Aitor
    Pastor, Iker
    DYNA, 2019, 94 (03): : 258 - 261