
Security at the Crossroads: Cybersecurity Fundamentals (eBook, ePUB)
PAYBACK Punkte
0 °P sammeln!
The absence of a universally accepted set of security best practices has given rise to a prevailing perspective that characterises cybersecurity as a 'market for lemons'. This viewpoint is ardently embraced by a number of high-profile executives and influential analysts, sparking an organised initiative that actively calls for decisive action. Similar to the concept of a market for lemons, cybersecurity solutions are perceived as lacking transparency, leading to concerns about their efficacy and prompting a collective push for comprehensive reforms in security practices. This endeavour is unmi...
The absence of a universally accepted set of security best practices has given rise to a prevailing perspective that characterises cybersecurity as a 'market for lemons'. This viewpoint is ardently embraced by a number of high-profile executives and influential analysts, sparking an organised initiative that actively calls for decisive action. Similar to the concept of a market for lemons, cybersecurity solutions are perceived as lacking transparency, leading to concerns about their efficacy and prompting a collective push for comprehensive reforms in security practices. This endeavour is unmistakably reminiscent of the magmatic burbles that announced the eruptive changes in enterprise design when the digital transformation was eerily introduced. Unfortunately, in the cybersecurity industry, extracurricular initiatives seldomly pick outside daily routines. The community simply does not feel obliged to provide a constructive written response. This non-inquisitive, if not dogmatic industry attitude is most likely one of the traits that allows industry analysts and influencers to superimpose their own beliefs and consequently course-correct the evolution of cybersecurity practice, outside industry-specific drivers. Several years ago, I responded to the most radical change in enterprise architecture and coined it as the Copernican revolution in enterprise design; the market calls it SASE Secure Access Service Edge. Today, I strongly believe that a clearing exercise around the question of cybersecurity is warranted, especially if somehow cybersecurity microcosmically reflects some of the wider problems that our global village suffers from. The market ironically does not expect technological professionals to master suprastructural arguments, but I believe that when it comes to security, cybersecurity professionals are in fact in a better position than anyone else to ask what its sublime object is. Security professionals navigate complex terrains, where understanding nuances and contexts is as important as deciphering broader technical implications and potential engineering risks.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.