TITLE

Rethink your cyber strategy

AUTHOR(S)
Tavakoli, Oliver
PUB. DATE
March 2015
SOURCE
SC Magazine: For IT Security Professionals (15476693);Mar2015, Vol. 26 Issue 3, p15
SOURCE TYPE
Periodical
DOC. TYPE
Opinion
ABSTRACT
The author reflects on the need for organizations to adopt prevention-focused information security strategies to thwart advanced persistent threats and match the complexities of the malware ecosystem.
ACCESSION #
101436709

 

Related Articles

  • AhnLab Reports 2012 Mobile Security Threat Trends.  // Computer Security Update;Feb2012, Vol. 13 Issue 2, p1 

    The article reports on the major mobile security threat trends in 2011 and threat predictions for 2012 announced by integrated security solutions provider, AhnLab Inc. Mobile security threats in 2011 includes the growth of malicious codes that make direct billing, malware disguised as famous...

  • KÖTÃœCÃœL VE CASUS YAZILIMLAR: KAPSAMLI BÄ°R ARAÅžTIRMA. Canbek, Gürol; Sağiroğlu, Şeref // Journal of the Faculty of Engineering & Architecture of Gazi Uni;Mar2007, Vol. 22 Issue 1, p121 

    As information technologies being developed and becoming widespread, daily routines and works have switched to electronic media and made life easier. As a result, the importance of information and computer security and threats encountered has increased in diversity as well as in quantity. New...

  • Explosion of Connected Devices Exposes Holes in IT Security.  // Appliance Design;Aug2014, Vol. 62 Issue 8, p6 

    The article offers information on BlueCat Threat Protection for DNS/DHCP Server, a solution developed to combat threats of malware, botnets and other information security attacks.

  • Her company's prospects are very secure. FRY, MEG // njbiz;2/2/2015, Vol. 28 Issue 5, p4 

    An interview with Alta Associates founder and president Joyce Brocaglia is presented. She talks about the information security (IS) specialization of her firm and her mission of ensuring gender diversity in the sector. Brocaglia explains the increasing awareness of firms about IS threats in 2015...

  • Detection and analysis of eavesdropping in anonymous communication networks. Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos // International Journal of Information Security;Jun2015, Vol. 14 Issue 3, p205 

    Anonymous communication networks, like Tor, partially protect the confidentiality of user traffic by encrypting all communications within the overlay network. However, when the relayed traffic reaches the boundaries of the network, toward its destination, the original user traffic is inevitably...

  • Automated inference of past action instances in digital investigations. James, Joshua; Gladyshev, Pavel // International Journal of Information Security;Jun2015, Vol. 14 Issue 3, p249 

    As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations. To ensure timely investigation of requests, this work proposes the use of signature-based methods for automated action instance...

  • WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS. Boss, Scott R.; Galletta, Dennis F.; Benjamin Lowry, Paul; Moody, Gregory D.; Polak, Peter // MIS Quarterly;Dec2015, Vol. 39 Issue 4, p837 

    Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to...

  • Reference Ontology for Cybersecurity Operational Information. TAKESHI TAKAHASHI; YOUKI KADOBAYASHI // Computer Journal;Oct2015, Vol. 58 Issue 10, p2297 

    As our cyber society develops and expands, the importance of cybersecurity operations is growing in response to cybersecurity threats coming from beyond national borders. Efficient cybersecurity operations require information exchanges that go beyond organizational borders. Various industry...

  • How Many Malicious Sites Does Google Discover Every Day?  // CIO Insight;6/20/2012, p1 

    The article reports on the prevalence of malicious websites discovered and flagged by Google Inc. everyday. Google's security officer Niels Provos reveals that the company's Safe Browsing initiative has identified thousands of new malicious sites and has issued warnings to Internet users against...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics