By Rutrell Yasin, GCNSoftware applications are easily exploitable by adversaries, because many organizations are not applying the proper measures and due diligence to discover and patch vulnerabilities, especially prior to use. Agencies must protect systems from both software vulnerabilities and unintended software processing that compromise availability, integrity and other security properties.
That’s the message government and industry representatives attempted to drive home at the recent CISQ IT Risk Management and Cybersecurity Summit held in Reston, Va., in conjunction with the Object Management Group’s Technical Meeting.
Visit http://gcn.com/articles/2015/04/08/cyber-resilience.aspx to view the full article online.