Thứ Sáu, 14 tháng 8, 2015

Data Security Breaches Part 4: Wise-Up to Real-Life Impacts

The buzz: Spelling bee.

Cybersecurity breaches in the headlines continue to strike fear in the hearts of companies, governments and individuals worldwide.

For businesses, the advent of the IoT [Internet of Things] can compromise secure access to critical infrastructures by connecting business applications with process/infrastructure applications – which has been a long-standing no-no.

With today’s Advanced Persistent Threats and Zero Day Exploits, how do you protect access between your 30-year-old sensors that lack modern Internet protocol support?

The experts speak.

Gerlinde Zibulksi, SAP: “What is cybersecurity? C Y B E R S E C U R I T Y – CRY BE SECURITY – SECRET ICY RUBY – ICE CURRY BYTES – I RUT BY SECRECY.” (Anagram generator)

Hillel Zafir, HMS Technology Group: “Let’s start at the very beginning, a very good place to start. When you read you begin with A B C…” (“Do Re Mi” from The Sound of Music, sung by Maria and the Von Trapp Children)

Richard McCammon, Delego: “We will bankrupt ourselves in the vain search for absolute security.” (Dwight D. Eisenhower)

Join us for Data Security Breaches Part 4: Wise-Up to Real-Life Impacts.

via SAP News Center

Không có nhận xét nào:

Đăng nhận xét