Affiliation:
1. TCS Research, Tata Consultancy Services, India
Abstract
As we increasingly depend on technology, cyber threats and vulnerabilities are creating trust issues for businesses and enterprises, and cybersecurity is being considered as the number one threat to the global economy over the next 5-10 years. In this chapter, the authors explain this phenomenon by first describing the changing cyber ecosystem due to extreme digitalization and then its ramifications that are plainly visible in the latest trends in cyber-attacks. In the process, they arrive at five key implications that any modern enterprise needs to be cognizant of and discuss eight emerging measures that may help address consequences of those implications substantially. It is hoped that these measures will play a critical role in making enterprise security more proactive, cognitive, automated, connected, invisible, and risk aware.
Reference116 articles.
1. Cyber Security. Simply. Make it Happen.
2. Abraham, S., & Nair, S. (2015). A predictive framework for cyber security analytics using attack graphs. arXiv preprint arXiv:1502.01240
3. Amado, R. (2018). How Cybercriminals are using Blockchain DNS: From the Market to the Bazar. Retrieved December 5, 2019, from https://www.digitalshadows.com/blog-and-research/how-cybercriminals-are-using-blockchain-dns-from-the-market-to-the-bazar/
4. Do firms underreport information on cyber-attacks? Evidence from capital markets
5. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., . . . Zhou, Y. (2017). Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 1093-1110). USENIX.