Abstract
In this chapter, we continue our discussion of technology defenses and cover fighting third-party risk, software vulnerabilities, unencrypted data, and inadvertent employee mistakes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A demo is available at https://vsaq-demo.withgoogle.com/, and you can modify it as per your needs leveraging the open source code at https://opensource.google/projects/vsaq.
- 2.
Gary McGraw, Software Security: Building Security In (Addison-Wesley, 2006).
- 3.
IEEE CSD Home Page, https://cybersecurity.ieee.org/center-for-secure-design/
- 4.
Holm, Hannes & Sommestad, Teodor & Almroth, Jonas & Persson, Mats. (2011). A quantitative evaluation of vulnerability scanning. Inf. Manag. Comput. Security. 19. 10.1108/09685221111173058.
- 5.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 Neil Daswani and Moudy Elbayadi
About this chapter
Cite this chapter
Daswani, N., Elbayadi, M. (2021). Technology Defenses to Fight the Root Causes of Breach: Part Two. In: Big Breaches. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6655-7_13
Download citation
DOI: https://doi.org/10.1007/978-1-4842-6655-7_13
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-6654-0
Online ISBN: 978-1-4842-6655-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)