Posts Tagged 'security'

Oct 262016
 
IoT-based DDOS Attacks

Last week’s DDoS attack against Dyn Inc. had an impact on many organizations beyond the reported hits to PayPal, Twitter, Amazon, Spotify, and others. Even Cutter’s website search function was out of commission for a short while! Experts have warned that at some point, smart versions of devices such as refrigerators, televisions and thermostats could be manipulated to alter their basic functions, but did anyone foresee that these devices would be used to launch a third-party attack? This isn’t the first time it’s happened, and it’s not likely to be the last. In the July 2016 Cutter article Securing the IoT: It Takes the Global Village, author David Tayouri discusses the threats Internet of Things Read more

Apr 222016
 
Call for Papers: Cyber Threats in the Era of the Internet of Everything

This upcoming issue of Cutter IT Journal seeks articles on new approaches, strategies, and solutions to help IT professionals address and prevent the possibility of cyber attacks stemming from IoT related devices. Cyber threats have been on the rise, and more so with the advent of the Internet of Everything (IoE). Common appliances are now featuring intelligent processing and real-time connections to the Internet. Health measurements are now collected in real-time by smart wearables, including general purpose smart watches. The latest models from automobile manufacturers feature cloud connectivity for enabling remote software updates, tracking fuel consumption, and streaming dashcam activity. On a larger scale, the smart grid ensures seamless and dynamic allocation of energy where Read more

Apr 052016
 
Protecting Your Sensitive Data During a Security Breach

At the recent RSA Security Conference in San Francisco, data-centric security and protection received a lot of attention. Several trends account for this. The main one, of course, is the large number of high-profile data breaches and other cyber attacks continually making the news — a trend that shows no sign of subsiding. In addition to this constantly lurking threat, we can add growing compliance and regulatory requirements as well as the advent of new (difficult to protect) technologies, applications, and architectures. Throw in all the revelations about hacking by various government intelligence services, and it’s easy to see why organizations and security solutions providers have made data-centric security and protection a top priority. The Read more

Mar 222016
 
Forecast for Security: Beware the Headwinds

“Never make forecasts, especially about the future.” — Sam Goldwyn This is particularly good advice for those with the courage (temerity? foolhardiness?) to forecast trends in technology. We can safely predict that technologies will get better/faster/cheaper/smaller, but which ones? Who will use them? How? For what? Back in the days when fairly standard IT was just bought by organizations with cost-conscious and risk-averse CFOs, the only question was how much technology would be bought, which depended largely on the overall economy. Starting in the 1980s, when ordinary people began buying IT, much of it from brand-new companies, predicting consumers’ tastes and quantifying their demand presented a whole new challenge. Add in the Internet, and what Read more

Dec 152015
 
Looming Threats in Cloud Computing

A lot has changed in a few years. When I talked about cloud three years back, I got frownie-faces from my peers. Skeptical looks that belied a deeper-seated fear or trepidation, probably having more to do with their internal image of what a CIO should be than the promise or peril in the new technology. Now, enthusiasm runs ebulliently through the vendor community, animating the animal spirits and spurring on entrepreneurs in search of profits and glory. Cloud has been elevated to high strategy on the billionaire chess board. Mergers and acquisitions are abuzz. Amazon, armed with an overly energetic workforce, gets hypercompetitive in all ways good and ill, supplanting Oracle as one of our Read more

May 142015
 

Cloud computing, data analytics, sensors and the Internet of Things, robotics, mobile and social computing, “super-intelligent” systems and advanced cognitive systems are merely a few of the technologies that have moved from the realm of being an interesting idea into the main stream. Just over the horizon are not only improvements to each of these technologies but also virtual/augmented reality systems, autonomous vehicles, private drones, 3D printing, quantum computing, gesture control systems and wearable computing, among others that promise to change our daily routines in a myriad of ways. High tech companies like to tout the many benefits of these technologies — for example, it is believed that moving to autonomous vehicles will not only Read more

Feb 132015
 

When you read technology news, security (or lack thereof) dominates many of the headlines. When you scan the titles of talks at Agile conferences, or you skim blog posts about Agile, you don’t see as much discussion about security. Agilists aren’t indifferent to security, but there are few clear guidelines for how to incorporate security into Agile practices. Fortunately, the ways to address security within Agile practices are not too hard, but as with anything related to security, the earlier you deal with it, the better. Security often fits into the work of an Agile team in the following ways: Tasks needed to implement a story. Security often appears within implementation tasks (“When I write Read more