Cyber-security fortresses built on quicksand

被引:0
|
作者
Flexera Software, United States [1 ]
机构
来源
Netw. Secur. | / 8卷 / 5-8期
关键词
D O I
10.1016/S1353-4858(15)30068-4
中图分类号
学科分类号
摘要
The recent spate of cyber-security breaches, such as those suffered by Sony, Office and Anthem/BlueCross Blue Shield, underscores just how vulnerable enterprises are to malware and hacker attacks.1-3 CEOs at organisations of all sizes are well aware of the risks and are taking unprecedented interest in the measures that their IT and security teams are putting into place to fend off potentially catastrophic intrusions into their systems by hackers and other malicious actors. Organisations are building security fortresses to defend against cyber-security threats. But while extremely sophisticated, they are often being built on quicksand. The ability to inventory hardware and software is critical to building a strong cyber-security foundation. But while most organisations have multiple sources of software and hardware inventory data, they usually do not have a means to consolidate that data from across all their systems and environments. This renders the very foundation of their cyber-security fortress vulnerable, explains Vincent Smyth of Flexera Software. © 2015 Elsevier Ltd.
引用
收藏
相关论文
共 50 条
  • [31] Physical Cyber-Security of SCADA Systems
    Bichmou, Ahmed
    Chiocca, Joseph
    Hernandez, Leonarndo
    Hoffmann, R. Wade
    Horsham, Brandon
    Huy Lam
    McKinsey, Vince
    Bibyk, Steven
    PROCEEDINGS OF THE 2019 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2019, : 243 - 248
  • [32] Cultural and psychological factors in cyber-security
    Halevi, Tzipora
    Memon, Nasir
    Lewis, James
    Kumaraguru, Ponnurangam
    Arora, Sumit
    Dagar, Nikita
    Aloul, Fadi
    Chen, Jay
    Journal of Mobile Multimedia, 2017, 13 (1-2): : 43 - 56
  • [33] A genetic epidemiology approach to cyber-security
    Gil, Santiago
    Kott, Alexander
    Barabasi, Albert-Laszlo
    SCIENTIFIC REPORTS, 2014, 4
  • [34] Plugging the cyber-security skills gap
    Caldwell, Tracey
    Computer Fraud and Security, 2013, 2013 (07): : 5 - 10
  • [35] Fuzz Testing for Automotive Cyber-security
    Fowler, Daniel
    Bryans, Jeremy
    Shaikh, Siraj Ahmed
    Wooderson, Paul
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 239 - 246
  • [36] Cyber-security initiative now underway
    Jevtic, N
    CHEMICAL PROCESSING, 2003, 66 (02): : 17 - 17
  • [37] A genetic epidemiology approach to cyber-security
    Santiago Gil
    Alexander Kott
    Albert-László Barabási
    Scientific Reports, 4
  • [38] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [39] Cyber-Security Considerations for the Smart Grid
    Clements, Sam
    Kirkham, Harold
    IEEE POWER AND ENERGY SOCIETY GENERAL MEETING 2010, 2010,
  • [40] The Effects of Cyber-Security on Healthcare Industry
    Alharam, Aysha K.
    El-madany, Wael
    2017 9TH IEEE-GCC CONFERENCE AND EXHIBITION (GCCCE), 2018, : 689 - 694