Access "Information security threats: Building risk resilience"
This article is part of the June 2012 issue of Five actions to prepare for today’s external security threats
The array and complexity of information security threats is going to rise significantly over the next two years, and businesses that fail to prepare now will struggle to handle the challenges later. While individual threats continue to pose risk, it is the combination of them, along with the speed at which attacks may be launched, that provide the greatest danger. This increasingly complex threat landscape is comprised of: External threats that come from the increasing sophistication of cybercrime, state-sponsored espionage, activism moving online, and attacks on systems used to manage critical infrastructure in the real world. Regulatory threats that come as regulators grapple to implement legislation calling for greater transparency about incidents and security preparedness, all the while increasing requirements for data privacy. Internal threats that come as technology continues to develop at “tweetneck” speed, introducing new benefits but also raising the risk temperature as businesses adopt them without fully assessing the security implications. ... Access >>>
Premium Content for Free.
Cybersecurity information sharing initiatives on the rise
by Robert Lemos, Contributor
Businesses and government agencies work to improve sharing of cyberthreat information.
Security information management systems and application monitoring
by Joel Snyder, Contributor
SIMs aren’t just for network monitoring anymore.
- Cybersecurity information sharing initiatives on the rise by Robert Lemos, Contributor
Challenges with data protection in the cloud
by Dave Shackleford
Capabilities such as encryption and DLP can be complicated in the cloud.
CISPA cybersecurity legislation wins industry support
by Robert Westervelt
Legislation designed to provide the federal government with threat data from the private sector gains steam.
- Challenges with data protection in the cloud by Dave Shackleford
Reporter notebook: SCADA security, Oracle vulnerability, SQL Slammer
by Michael S. Mimoso, Editorial Director
Reflections on the ICS CERT alert, Oracle’s handling of a zero-day and more.
Marcus Ranum chat: Software development practices and security
by Marcus J. Ranum, Contributor
Security expert Marcus Ranum talks with Brian Chess, formerly of HP, about coding practices and security.
Information security threats: Building risk resilience
by Steve Durbin, Contributor
Enterprises need an agile risk management strategy to deal with today’s evolving threats.
- Reporter notebook: SCADA security, Oracle vulnerability, SQL Slammer by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...