28.03.2017 Views

The CEO’s Guide to Data Security

2mRmvHx

2mRmvHx

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Additional reading<br />

• Cybersecurity Insights, vol. 1: What Every CEO Needs<br />

<strong>to</strong> Know About Cybersecurity<br />

www.business.att.com/cybersecurity/archives/v1<br />

• Cybersecurity Insights, vol. 2: <strong>The</strong> <strong>CEO’s</strong> <strong>Guide</strong> <strong>to</strong><br />

Securing the Internet of Things<br />

www.business.att.com/cybersecurity/archives/v2<br />

• Cybersecurity Insights, vol. 3: <strong>The</strong> <strong>CEO’s</strong> <strong>Guide</strong> <strong>to</strong><br />

Cyberbreach Response<br />

www.business.att.com/cybersecurity/archives/v3<br />

• Cybersecurity Insights, vol. 4: <strong>The</strong> <strong>CEO’s</strong> <strong>Guide</strong> <strong>to</strong><br />

Navigating the Threat Landscape<br />

www.business.att.com/cybersecurity/archives/v4<br />

• Executive Abstracts<br />

www.business.att.com/cybersecurity/abstracts<br />

• Know the Terms glossary<br />

www.business.att.com/cybersecurity/terms<br />

• Network <strong>Security</strong> Solutions<br />

www.business.att.com/enterprise/Portfolio/<br />

network-security<br />

Endnotes and sources<br />

1. Morgan, S., Hackerpocalypse : A Cybercrime Revelation, (2016).<br />

https://www.herjavecgroup.com/hackerpocalypse-cybercrimereport/<br />

2. Skycure. Mobile Threat Intelligence Report, Q1 2016. https://www.<br />

skycure.com/wp-content/uploads/2016/06/Skycure-Q1-2016-<br />

MobileThreatIntelligenceReport.pdf<br />

3. CIO/Computerworld. C-Suite 360 Special Report, IT <strong>Security</strong>’s<br />

Looming Tipping Point. (2016, Fall). http://core0.staticworld.net/<br />

assets/2016/09/16/csuite360_security_fall2016.pdf<br />

4. IDG Enterprise. 2016 IDG Enterprise Cloud Computing Survey. (2016,<br />

Nov. 1). http://www.idgenterprise.com/resource/research/2016-<br />

idg-enterprise-cloud-computing-survey/<br />

5. <strong>The</strong> Zettabyte Era—Trends and Analysis. (2016, June 2). http://www.<br />

cisco.com<br />

6. Zetter, K., <strong>The</strong> Ukrainian Power Grid was Hacked Again. (2017, Jan.<br />

10). https://motherboard.vice.com/en_us/article/ukrainian-powerstation-hacking-december-2016-report<br />

7. Kan, M., Android Malware Steals Access <strong>to</strong> More Than 1 Million<br />

Google Accounts. (2016, Nov. 30). http://www.csoonline.com/<br />

article/3146094/security/android-malware-steals-access-<strong>to</strong>-morethan-1-million-google-accounts.html<br />

8. Skycure Mobile Threat Intelligence, Q1 2016.<br />

9. Coles, C., Only 9.4% of Cloud Providers Are Encrypting <strong>Data</strong> at Rest.<br />

(2015, July 16). https://www.skyhighnetworks.com<br />

10. Skyhigh Networks. Cloud Adoption & Risk Report. (2016, Q4).<br />

https://www.skyhighnetworks.com/cloud-computing-trends-2016/<br />

11. Gartner Says 6.4 Billion Connected “Things” Will Be in Use in 2016,<br />

Up 30 Percent From 2015. (2015, Nov. 10). http://www.gartner.com/<br />

newsroom/id/3165317<br />

12. <strong>The</strong> Zettabyte Era—Trends and Analysis. (2016, June 2).<br />

13. IDC. IDC Forecasts Worldwide Shipments of Wearables <strong>to</strong><br />

Surpass 200 Million in 2019, Driven by Strong Smartwatch Growth<br />

(Press release). (2015, Dec. 15). https://www.idc.com/getdoc.<br />

jsp?containerId=prUS40846515<br />

14. Gartner’s Top 10 <strong>Security</strong> Predictions 2016. (2016, June 15). http://<br />

www.gartner.com<br />

15. Palmer, D., <strong>The</strong> First Big Internet of Things <strong>Security</strong> Breach is Just<br />

Around the Corner. (2016, July 1). http://www.zdnet.com/article/<br />

the-first-big-internet-of-things-security-breach-is-just-aroundthe-corner/<br />

16. Linthicum, D., <strong>The</strong> 2016 State of IoT Standards. (2016, Sept. 14).<br />

https://www.cloudtp.com/doppler/state-iot-standards-2016/<br />

17. Varun, K., Telephone interview with Dwight Davis, Nov. 4, 2016.<br />

18. Skycure Mobile Threat Intelligence Group. Unpublished threat data<br />

(2016, Nov.)<br />

19. Skycure. Mobile Threat Intelligence Report, Q2 2016.<br />

20. Brit<strong>to</strong>n, J., Mobile Threats and Where We Are Today. (paper<br />

presented at the 18th Annual AT&T Cybersecurity Conference,<br />

Oc<strong>to</strong>ber 24-25, 2016). https://www.att.com/att/securityconference/<br />

session-replay/vid5000615.html<br />

21. Skyhigh Networks. New Skyhigh Networks Cloud <strong>Security</strong> Report<br />

Finds Growing Risk <strong>to</strong> Critical Business <strong>Data</strong> in the Cloud. (Press<br />

release). (2016, Nov. 17). https://www.skyhighnetworks.com<br />

• More resources available at<br />

securityresourcecenter.att.com<br />

18<br />

att.com/security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!