{"id":3593,"date":"2016-10-02T11:21:13","date_gmt":"2016-10-02T15:21:13","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3593"},"modified":"2016-10-02T11:21:13","modified_gmt":"2016-10-02T15:21:13","slug":"todays-cybersecurity-management-requires-a-new-approach","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/02\/todays-cybersecurity-management-requires-a-new-approach\/","title":{"rendered":"Today&#8217;s Cybersecurity Management Requires A New Approach"},"content":{"rendered":"<p>In this article\u00a0Samuel Visner &amp; Beth Musumeci discuss that the management of cyber security in organizations today are not able to keep up with zero-day vulnerabilities that can cripple\u00a0them. With the increase of devices on the internet today more of an organization&#8217;s customer information is available to hackers to infiltrate. Over the past six years cyber terrorism has increased with hacks that included organizations like JPMorgan Chase, Adobe, Target and Walgreens. According to Gartner research\u00a0&#8220;44% of reference customers for endpoint protection solutions have been successfully compromised.&#8221; This shows that even though security is present on an organization that new vulnerabilities play a major role. Visner &amp; Musumeci propose that a new approach is the only way to prevent these vulnerabilities. They propose that white-listing certain &#8220;known good&#8221; applications is the only way to effectively protect against malware. Any untrusted or unknown applications are put in an isolated container away from the network and tested before being allowed on the network. A new model like this needs to be proposed among organizations to prevent such attacks from happening in the future.<\/p>\n<p>Article:\u00a0<a href=\"http:\/\/www.darkreading.com\/vulnerabilities---threats\/todays-cybersecurity-management-requires-a-new-approach\/a\/d-id\/1327011\">http:\/\/www.darkreading.com\/vulnerabilities&#8212;threats\/todays-cybersecurity-management-requires-a-new-approach\/a\/d-id\/1327011<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article\u00a0Samuel Visner &amp; Beth Musumeci discuss that the management of cyber security in organizations today are not able to keep up with zero-day vulnerabilities that can cripple\u00a0them. With the increase of devices on the internet today more of an organization&#8217;s customer information is available to hackers to infiltrate. Over the past six years [&hellip;]<\/p>\n","protected":false},"author":9410,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715997],"tags":[],"class_list":{"0":"post-3593","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-06-project-portfolio-management","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/9410"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3593"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3593\/revisions"}],"predecessor-version":[{"id":3595,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3593\/revisions\/3595"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}