Financial Executive. Mar2013, Vol. 29 Issue 2, p36-41.
The article looks at threats to cybersecurity, or computer and Internet security, as of 2013, focusing on what business executives need to know and steps they should consider taking to protect their companies. It notes that cyber criminals have become much better able to carry out cyber attacks in recent years, and says many companies have not developed cyber protection policies to the extent they should. Topics include advanced persistent threats (APTs), or long-term cyber attacks, the assessment of cybersecurity risks, cyberinsurance, and proposed U.S. government regulations on cybersecurity.
Communications of the ACM. Jun2012, Vol. 55 Issue 6, p29-32.
The article discusses cybersecurity and computer-related risks. Topics include how to prevent computer hacking issues, the amount of money spent on computer security research and security program development worldwide, and data theft of sensitive information. Information is provided on the various techniques that computer hackers can use to breach computer security barriers, which includes supply-chain insertion and the breach of authentication layers. It is noted that there is no single solution that addresses the problem of computer security breaches.