Towards optimal triage and mitigation of context-sensitive cyber vulnerabilities

S Hore, F Moomtaheen, A Shah… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cyber vulnerabilities are security deficiencies in computer and network systems of
organizations, which can be exploited by an adversary to cause significant damage. The …

A review of cybersecurity strategies in modern organizations: examining the evolution and effectiveness of cybersecurity measures for data protection

TO Abrahams, SK Ewuga, SO Dawodu… - Computer Science & IT …, 2024 - fepbl.com
In an era where digital threats are increasingly pervasive, understanding the evolution and
efficacy of cybersecurity strategies in modern organizations is paramount. This study …

Enterprise cyber risk management

PL Brockett, LL Golden, W Wolman - Risk management for the …, 2012 - books.google.com
Cyber risk represents an ever-growing threat to public and private institutions alike due to its
potentially disastrous effects on organizational information systems, reputational risk, and …

Managing information technology security in the context of cyber crime trends

DE Neghina, E Scarlat - International journal of computers …, 2013 - univagora.ro
Cyber-attacks can significantly hurt an organization's IT environment, leading to serious
operational disruptions, from simply damaging the first layers of IT security up to identity …

NIST cybersecurity framework and MITRE cybersecurity criteria

DPF Möller - Guide to Cybersecurity in Digital Transformation …, 2023 - Springer
Today cyberattacks continue to evolve and are highly complex. They are also very
expensive by the average cost of a breach-in cyberattack. The top ten most common …

Mitigating cybercrimes in an evolving organizational landscape

A Yeboah-Ofori, FA Opoku-Boateng - Continuity & Resilience Review, 2023 - emerald.com
Purpose Various organizational landscapes have evolved to improve their business
processes, increase production speed and reduce the cost of distribution and have …

A dynamic and adaptive cybersecurity governance framework

HM Melaku - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Cybersecurity protects cyberspace from a wide range of cyber threats to reduce overall
business risk, ensure business continuity, and maximize business opportunities and return …

From information security management to enterprise risk management

M Stoll - Innovations and advances in computing, informatics …, 2015 - Springer
Organizations are faced with increasing complexity, uncertainty and enhanced threats from
a wide range of forces. Depending on how this situation is handled, it can become risk or …

Enterprise computer security: A literature review

DC Acuña - Journal of the Midwest Association for Information …, 2016 - aisel.aisnet.org
Abstract Information technology (IT) is a global phenomenon that provides organizations of
all types the ability to achieve enterprise objectives. One IT component is computer security …

PRISM: a strategic decision framework for cybersecurity risk assessment

R Goel, A Kumar, J Haddow - Information & Computer Security, 2020 - emerald.com
Purpose This study aims to develop a framework for cybersecurity risk assessment in an
organization. Existing cybersecurity frameworks are complex and implementation oriented …