{"title":"网络安全的整体整合和自动化时代","authors":"Tim Wallen","doi":"10.12968/s1361-3723(22)70571-4","DOIUrl":null,"url":null,"abstract":"Solution saturation is plaguing the cyber security market. Technology has driven the security strategy for security teams for far too long, which only compounds the problem, leaving them with too many tools, and with cross-functionality and gaps remaining in their security posture. Organisations need to shift the way they think about their cyber security challenges and how they can overcome them.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"2012 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The age of holistic consolidation and automation of cyber security\",\"authors\":\"Tim Wallen\",\"doi\":\"10.12968/s1361-3723(22)70571-4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Solution saturation is plaguing the cyber security market. Technology has driven the security strategy for security teams for far too long, which only compounds the problem, leaving them with too many tools, and with cross-functionality and gaps remaining in their security posture. Organisations need to shift the way they think about their cyber security challenges and how they can overcome them.\",\"PeriodicalId\":35636,\"journal\":{\"name\":\"Computer Fraud and Security\",\"volume\":\"2012 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Fraud and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1361-3723(22)70571-4\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(22)70571-4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
The age of holistic consolidation and automation of cyber security
Solution saturation is plaguing the cyber security market. Technology has driven the security strategy for security teams for far too long, which only compounds the problem, leaving them with too many tools, and with cross-functionality and gaps remaining in their security posture. Organisations need to shift the way they think about their cyber security challenges and how they can overcome them.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.