Cybersecurity - What’s Next?

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Companies hoping to successfully use the IT security technologies of the future need to rethink their strategy and shift their focus from a latent arms race aimed at protection against the outside world to detection within the enterprise. After all, every company needs to remember that an attacker will infiltrate its network sooner or later, as many recent examples have shown. The next step is to identify the attack as quickly as possible and remove the threat. In the future, smart data and artificial intelligence will be needed to provide this protection within organizations. Authorized users must be distinguished from attackers rapidly with easy-to-use or automated tools such as behavior-based analysis systems. Zero impact must be the goal. Yet, to understand how to get their company or any company to this point, executives always need to keep in mind how the current situation evolved.

Cite

CITATION STYLE

APA

Tschersich, T. (2017). Cybersecurity - What’s Next? In Management for Professionals (Vol. Part F602, pp. 101–112). Springer Nature. https://doi.org/10.1007/978-3-319-46529-6_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free