Posts Tagged 'security'

 
Use Agile To Steer The Post-Sony Security Stampede

The embarrassing hack of Sony’s corporate information, followed by the company’s decision not to release The Interview because of vague online threats, has already resulted in a lot of hand-wringing about how secure corporate information is, and whether companies have done all they can to secure it to the utmost. Owners, shareholders, customers, and partners will want to relieve that anxiety, so 2015 may be the year of a lot of impromptu security projects. Given the scale of the urgency and unknowns, coupled with the potential for a lot of unintended business consequences, 2015 may be the year that many IT departments consider a more Agile approach to security. The worst response to the Sony …

Read more

Dec 082014
 
Major IoT Hack to Come

I predict there will be a major hack to a connected devices, causing havoc and putting a temporary damper on the stampede towards the Internet of Things. It will be widespread, as the hackers will want to show just how vulnerable we are. This will be a temporary setback, and the precise impact will depend on the severity of the damage done — but the Internet of Things development will continue. In a related note, it will be revealed that the government has experimenting with novel ways to conduct surveillance using these connected devices. My biggest bet is that LEDs used to light public areas will be the first discovered, but there may be even …

Read more

 
avatar

As mobile computing has made sophisticated, digitally-mediated interactions possible in both personal/consumer and business-like capacities (BYOD) – the market and the challenges associated with it have exploded. Taking a step back to when the technologies that underpin mobile computing and networking were developed, it was assumed that each user had some level of expertise, that the use cases were quite limited in scope, and that the overall numbers of users were constrained. Fast-forward to present day, the massive scale of mobile computing adoption, the broad scope of supported use cases, and the “naive” user base has created a number of serious issues that the IT industry must grapple with now. Chief among these problems is …

Read more

 
avatar

There are times when major trends intersect. Sometimes they reinforce each other; other times they cancel each other out. In the case of Target’s security problems, there seems to have been a fair amount of interference (to read my earlier Advisor on the Target security breach, see “Cyber Security: Inside and Out“). The FireEye software that was supposed to warn of the kind of exposure that did Target in reacted as it was supposed to: the basic problem was flagged and diagnosed immediately, and a warning message was included in one of the security logs and highlighted by analysts at Target’s Bangalore security center. Unfortunately, the critical message was not deemed worthy of immediate action by the …

Read more

Mar 142014
 
avatar

If you wear the CIO hat of a very large retail company, what could be worse than to have your site broken into and tens of millions of customers’ information records stolen and … right at the peak of the holiday season? Well, I suppose it could be worse if your organization had recently spent millions to buy the latest in security equipment and software and set up a large, 24×7 monitoring center halfway around the world to monitor the critical alerts from security software … and then when someone 12 time zones away did notice that the organization’s networks had been breached and sent a notice to their overlords in the US, nothing much …

Read more

 
Things That Go Bump in the Night

By the end of the decade, self-driving cars will be on the roads in many developed countries. The electric grid will tell our heaters when it is more economical to run, “learning thermostats” will be in many homes, and we will track the movements of people, pets, packages, and many other things. By some estimates, the number of devices connected to this “Internet of Things” (IoT) will pass the number of connected human users by 2016. The question is: will serious accidents be necessary before people take the risks seriously and harden this infrastructure? Because the IoT senses and controls physical objects, serious harm can happen — either accidentally or intentionally. We need devices to …

Read more

 
A Slowdown in IT Developments that Depend on High Performance Internet

In my prediction last year I mentioned: In 2012 practically all electronic devices will be internet based. As people progressively learn to explore and mature the use of this technology, the growing impact on business models and collaborative working models will trigger new rules of survival in the new internet-based global economy. Successful organizations will transform accordingly. I also mentioned a number of factors like “Changes in political systems, environmental concerns and issues, climate changes and natural disasters…” that would create additional pressure for the development and use of internet-based technology and software systems. The year 2012 has confirmed (without a shadow of doubt) that organizations of all types are changing their business models to …

Read more

 
Cloud-Based Collaboration Suites Take Off

Prediction: The ABS Movement Gathers Steam ABS stands for “anything but Sharepoint.” While Sharepoint 2010 added capabilities and fixed others since the 2007 version, it is still a complex, unwieldy, and costly product that often requires add-on software to be really useful. The wiki feature is still deficient, and the term store has too many holes to make it a real enterprise-wide taxonomy tool. In the meantime, a number of cloud-based, highly collaborative, easy-to-use products have emerged that can meet 80% of some users’ needs at 20% of the cost. I’m talking about products like Jive (which hopefully SAP won’t love to death if the rumors of an acquisition are true), Yammer, and IGLOO. IGLOO …

Read more

 
avatar

Some argue that a cyber-Armageddon — or a “digital Pearl Harbor” — may be just around the corner, while others counter that while cybersecurity needs to be taken seriously, the overall cyberthreat and its consequences are vastly overblown and are merely a convenient excuse to sell over-priced security software and consulting. The May 2011 Cutter IT Journal will try to separate the wheat from the chaff as pertains to security threats from current and potential cyberweapons. Proposals of interest are due 2 March 2011. To respond, please visit http://www.cutter.com/content-and-analysis/journals-and-reports/cutter-it-journal/callforpapers02.html

 
avatar

Imagine, if you will, that all owners of data centers and agents representing buyers of computing cycles get together daily and buy and sell commodity computing units (we’ll call them containers) in an open exchange. Now imagine another group of buyers and sellers who are not just exchanging those containers, but buying and selling options on the containers — the right to buy or sell those containers at a future date. This exchange would be trading the 21st-century equivalent to the pork belly. Pork bellies were introduced as a commodity in the early 1960s in the Chicago Mercantile Exchange in tradable units of 40,000 pounds. In a strange way, the world of data center virtualization …

Read more