Security at the Crossroads: Cybersecurity Fundamentals

Par : Claudiu Enache
Offrir maintenant
Ou planifier dans votre panier
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • FormatePub
  • ISBN8232582890
  • EAN9798232582890
  • Date de parution19/01/2024
  • Protection num.pas de protection
  • Infos supplémentairesepub
  • ÉditeurHamza elmir

Résumé

The absence of a universally accepted set of security best practices has given rise to a prevailing perspective that characterises cybersecurity as a 'market for lemons'. This viewpoint is ardently embraced by a number of high-profile executives and influential analysts, sparking an organised initiative that actively calls for decisive action. Similar to the concept of a market for lemons, cybersecurity solutions are perceived as lacking transparency, leading to concerns about their efficacy and prompting a collective push for comprehensive reforms in security practices.
This endeavour is unmistakably reminiscent of the magmatic burbles that announced the eruptive changes in enterprise design when the digital transformation was eerily introduced. Unfortunately, in the cybersecurity industry, extracurricular initiatives seldomly pick outside daily routines. The community simply does not feel obliged to provide a constructive written response. This non-inquisitive, if not dogmatic industry attitude is most likely one of the traits that allows industry analysts and influencers to superimpose their own beliefs and consequently course-correct the evolution of cybersecurity practice, outside industry-specific drivers.
Several years ago, I responded to the most radical change in enterprise architecture and coined it as the Copernican revolution in enterprise design; the market calls it SASE - Secure Access Service Edge. Today, I strongly believe that a clearing exercise around the question of cybersecurity is warranted, especially if somehow cybersecurity microcosmically reflects some of the wider problems that our global village suffers from.
The market ironically does not expect technological professionals to master suprastructural arguments, but I believe that when it comes to security, cybersecurity professionals are in fact in a better position than anyone else to ask what its sublime object is. Security professionals navigate complex terrains, where understanding nuances and contexts is as important as deciphering broader technical implications and potential engineering risks.
The absence of a universally accepted set of security best practices has given rise to a prevailing perspective that characterises cybersecurity as a 'market for lemons'. This viewpoint is ardently embraced by a number of high-profile executives and influential analysts, sparking an organised initiative that actively calls for decisive action. Similar to the concept of a market for lemons, cybersecurity solutions are perceived as lacking transparency, leading to concerns about their efficacy and prompting a collective push for comprehensive reforms in security practices.
This endeavour is unmistakably reminiscent of the magmatic burbles that announced the eruptive changes in enterprise design when the digital transformation was eerily introduced. Unfortunately, in the cybersecurity industry, extracurricular initiatives seldomly pick outside daily routines. The community simply does not feel obliged to provide a constructive written response. This non-inquisitive, if not dogmatic industry attitude is most likely one of the traits that allows industry analysts and influencers to superimpose their own beliefs and consequently course-correct the evolution of cybersecurity practice, outside industry-specific drivers.
Several years ago, I responded to the most radical change in enterprise architecture and coined it as the Copernican revolution in enterprise design; the market calls it SASE - Secure Access Service Edge. Today, I strongly believe that a clearing exercise around the question of cybersecurity is warranted, especially if somehow cybersecurity microcosmically reflects some of the wider problems that our global village suffers from.
The market ironically does not expect technological professionals to master suprastructural arguments, but I believe that when it comes to security, cybersecurity professionals are in fact in a better position than anyone else to ask what its sublime object is. Security professionals navigate complex terrains, where understanding nuances and contexts is as important as deciphering broader technical implications and potential engineering risks.