{"title":"HEAT-wave – defining a new era of cyberthreats","authors":"Jonathan Lee","doi":"10.12968/s1361-3723(22)70576-3","DOIUrl":null,"url":null,"abstract":"The acceleration of digital transformation initiatives that have catapulted users, data and business-critical applications to the cloud offers huge opportunities for businesses, but even more promise for threat actors. One of the biggest problems today is the legacy approach to security that many organisations take to protect networks from a strategic and technological standpoint: one that's cemented in ‘detect and respond’.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"63 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(22)70576-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
The acceleration of digital transformation initiatives that have catapulted users, data and business-critical applications to the cloud offers huge opportunities for businesses, but even more promise for threat actors. One of the biggest problems today is the legacy approach to security that many organisations take to protect networks from a strategic and technological standpoint: one that's cemented in ‘detect and respond’.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.