You are here: Home » News » Market » Text

Customers Has Been The Victim of a Successful Cyber Attack in The Past 19 Months

放大字体  缩小字体 Release date:2016-11-30  Views:61
Core Tip: RSA,the security arm of storage corporation EMC,today claimed that not one of its customers has been the victim of a successful cyber att

RSA,the security arm of storage corporation EMC,today claimed that not one of its customers has been the victim of a successful cyber attack in the past 19 months.

Speaking at RSA Conference Europe 2012,RSA president Tom Heiser said that the firm had learned a lot from the successful breach of its own security back in March 2011,and had passed on this knowledge to its customers.

Further reading

Coviello:Security inertia and skills shortage holding enterprises back Huawei responds to US Congressional Committee report RSA conference:US to ramp up international fight against cyber crime RSA 2012:Trustworthy Internet Movement aims to boost security,privacy and reliability online

"I'm proud to say that since then,there has been no evidence of any successful attacks but this does not mean we rest,"he said.

Heiser went on to make several further recommendations for improving security:

-Adopt a risk-based approach to security;

-Rethink detection strategies and deploy continuous monitoring;

-Tighten access controls to combat the risks of consumerisation and BYOD;

-Invest in advanced analytics tools to"find the unknown";

-Avoid squandering security professionals'skills on other tasks;

-Educate and re-educate staff on cyber security to stop complacency.

RSA chief Art Coviello had earlier outlined how enterprises still displayed"four levels of security maturity".

The first level includes enterprises that just want the problem to go away,and are generally uninformed,he said.The second level includes those enterprises that are just attempting to be compliant and check tick boxes such as that of security certification ISO27001.

"What they don't understand is that a good governance model would create compliance as a by-product of doing the right thing in the first place,"Coviello said.

The third level comprises organisations that focus on"IT risk",while the most most mature security strategies are designed to minimise"business risk"by enabling business models to adjust to new security challenges.

 
 
[ NewsSearch ]  [ Add to Favorites ]  [ Tell a friend ]  [ Print ]  [ Close the window ]

 
Total0bar [View All]  Related Comments

 
Recommended Graphic
RecommendNews
Click Ranking