In 2015, almost every CIO will be tasked with assessing their organizations and technology to ensure data and confidential information is protected. Current Situation Target, Home Depot, Staples, who’s next? These are just the most recent retail outlets that made the news. What is not making the headlines are the multitude of private- and public-sector organizations that have been hacked and lost data and information — many times totally unaware until after the fact. Pain Why is security so important for IT leaders in 2015? Because it cost a LOT of money once you have your network and systems breached! South Carolina recently lost large and significant quantities of data from its Department of Revenue Read more
Posts Tagged 'privacy'
The “Internet of Things” will take further hold and become more fully embedded as a reality in our society. However, a tipping point is likely to be reached in 2015 as public awareness of the potential for these technologies to violate personal privacy increases. This will lead to an associated public outcry for stricter controls and government legislation regarding how people, organizations and government collect and use this information. The public will no longer be satisfied to leave technology companies and users to self-police their uses of their personal data. Surveillance and other technologies that permit the collection of data about people will continue to proliferate. Analytical tools are emerging to interpret this information, and Read more
I’m excited about the Internet of Things (IoT), and I expect it to create incredible opportunities for companies in almost every industry. But I’m also concerned that the issues of security, data privacy, and our expectations of a right to privacy, in general — unless suitably addressed — could hinder the adoption of the IoT by consumers and businesses and possibly slow innovation. So, with all the hype of the IoT, I’m going to play devil’s advocate, because these issues tend to receive limited coverage when considering the impact of new technology developments on society. First of all, I am amazed at all the connected products and services that are starting to appear. These include, Read more
If you wear the CIO hat of a very large retail company, what could be worse than to have your site broken into and tens of millions of customers’ information records stolen and … right at the peak of the holiday season? Well, I suppose it could be worse if your organization had recently spent millions to buy the latest in security equipment and software and set up a large, 24×7 monitoring center halfway around the world to monitor the critical alerts from security software … and then when someone 12 time zones away did notice that the organization’s networks had been breached and sent a notice to their overlords in the US, nothing much Read more
Here are my predictions for 2014: 2014 will bring exponential expansion and evolution of the Internet of Things (IoT). This will also bring new opportunities for information security trailblazers unlike any we’ve seen before. The potential benefits of the IoT will be huge, but just as large will be the new and constantly evolving information security and privacy risks. We will see some significant privacy breaches resulting from the use of IoT devices as a result. New IoT risks, and resulting security incidents and privacy breaches, will bring a significant need for technology information security pros to also understand privacy concepts so they can implement privacy protections within all these new devices, and into the Read more
For 2014, I see an increasing convergence of two trends that may not overjoy many of us. The first is that bring-your-own-device (BYOD ) to work will be increasingly embraced by employers as well as other organizations, such as schools and universities. Earlier this year, it was predicted that half of all companies will mandate BYODs as a condition of employment by 2017. While I think that is an aggressive target, given not only the security issues involved, but the application/data/OS integration issues as well as the rapidity of device turnover, it is a trend that is already taking hold. Companies such as Cisco and VMWare have mandated BYOD, and universities (and now high schools) Read more
Starting in 2011, a new type of Cloud is rising in the distance. This cloud isn’t about enterprise class computing or the data center: it’s about information; information about you. Today, every individual has information about him/herself — relationships, digital devices under our control, etc. — spewed across the Internet. Often this information is automatically generated; it’s a form of digital exhaust trailing us as a by-product of how we interact with the Internet. Today, we have little or no control about how this information is used. We are each subject to lopsided and confusing “terms and conditions” for every consumer service. The concept of privacy is continually re-interpreted by Internet-based service providers. The concept Read more