Cyber-security fortresses built on quicksand

被引:0
|
作者
Flexera Software, United States [1 ]
机构
来源
Netw. Secur. | / 8卷 / 5-8期
关键词
D O I
10.1016/S1353-4858(15)30068-4
中图分类号
学科分类号
摘要
The recent spate of cyber-security breaches, such as those suffered by Sony, Office and Anthem/BlueCross Blue Shield, underscores just how vulnerable enterprises are to malware and hacker attacks.1-3 CEOs at organisations of all sizes are well aware of the risks and are taking unprecedented interest in the measures that their IT and security teams are putting into place to fend off potentially catastrophic intrusions into their systems by hackers and other malicious actors. Organisations are building security fortresses to defend against cyber-security threats. But while extremely sophisticated, they are often being built on quicksand. The ability to inventory hardware and software is critical to building a strong cyber-security foundation. But while most organisations have multiple sources of software and hardware inventory data, they usually do not have a means to consolidate that data from across all their systems and environments. This renders the very foundation of their cyber-security fortress vulnerable, explains Vincent Smyth of Flexera Software. © 2015 Elsevier Ltd.
引用
收藏
相关论文
共 50 条
  • [41] European Cyber-Security Research and Innovation
    Maggi, Federico
    Zanero, Stefano
    Markatos, Evangelos
    ERCIM NEWS, 2015, (100): : 43 - 43
  • [42] Repercussions of Coronavirus on Cyber-Security Threats
    Pandharipande, Aryan
    Parashar, Ritik
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 45 - 48
  • [43] Scorecard Approach for Cyber-Security Awareness
    Shabe, Tsosane
    Kritzinger, Elmarie
    Loock, Marianne
    EMERGING TECHNOLOGIES FOR EDUCATION, 2018, 10676 : 144 - 153
  • [44] Beyond the Castle Model of cyber-risk and cyber-security
    Leuprecht, Christian
    Skillicorn, David B.
    Tait, Victoria E.
    GOVERNMENT INFORMATION QUARTERLY, 2016, 33 (02) : 250 - 257
  • [45] A Reputation Game on Cyber-Security and Cyber-Risk Calibration
    Han, Kookyoung
    Choi, Jin Hyuk
    APPLIED MATHEMATICS AND OPTIMIZATION, 2022, 85 (02):
  • [46] A Reputation Game on Cyber-Security and Cyber-Risk Calibration
    Kookyoung Han
    Jin Hyuk Choi
    Applied Mathematics & Optimization, 2022, 85
  • [47] A theory of actor-network for cyber-security
    Balzacq, Thierry
    Cavelty, Myriam Dunn
    EUROPEAN JOURNAL OF INTERNATIONAL SECURITY, 2016, 1 (02) : 176 - 198
  • [48] Cyber-security in smart cities: the case of Dubai
    Efthymiopoulos M.-P.
    Journal of Innovation and Entrepreneurship, 5 (1)
  • [49] Impact of Cyber-Security Issues on Smart Grid
    Yang, Y.
    Littler, Tim
    Sezer, S.
    McLaughlin, K.
    Wang, H. F.
    2011 2ND IEEE PES INTERNATIONAL CONFERENCE AND EXHIBITION ON INNOVATIVE SMART GRID TECHNOLOGIES (ISGT EUROPE), 2011,
  • [50] Cyber-Security and a Potential Role for the Maritime Cloud
    Wimpenny, G.
    Safar, J.
    Grant, A.
    Bransby, M.
    Ward, N.
    PROCEEDINGS OF THE 30TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2017), 2017, : 1800 - 1808