|By Greg Schulz||
|March 25, 2014 12:44 AM EDT||
Missing MH370 should remind us, do you know where your digital assets are?
By Greg Schulz
Missing MH370 should remind us, do you know where your digital assets are?
I recently did a piece over at InformationSecurityBuzz called Dark Territories, Do You Know Where Your Information Is?
In that piece (click here), I bring up the topic of dark territories which with the recent missing Malaysian Airlines flight 370 (e.g. MH370) reminds us that even with today's 24x7 Internet of Things (IoT) connected world, there are still dark spot areas lacking in coverage or monitoring.
Some of you might have heard of dark territories as a term used in days of old that refereed to parts of railroads or other transportation that were out of site with no command, control, monitoring or communications.
Perhaps something that the tragedy of MH370 will remind us all is just how big this planet is, and not everything is connected or covered or monitored yet, or, at least that we know about or have access to.
Excerpt from the piece:
It might seem awkward today in this era of instant access to news, information as it happens, or in some cases before it happens how can we not know where something is?
Between traditional media and social media, not to mention public on-line web sites, along with big data powered government (or private) surveillance using radar, cell-phone or other radio based, not to mention satellite tracking.
Thus, how can we not know where things are?
Do you know where your data and information are or have been?
Do you have positive control over where you data and information have been?
Is your data and information exposed to dark territories?
With the recent disappearance of Malaysian Airlines flight 370 (MH 370) a Boeing 777 flying from Kula Lumpur to Beijing China, how can we not know where it is? After all, we all have public access to sites such as FlightAware and FlightRadar among many others, not to mention sites we in the public may not have access to. Same with using Cell phones or other forms of electronics, surely in the 7×24 non-stop, always connected world we should have insight and situational awareness about where things are always at, right?
Wrong!Click here to read more.
Do you have digital dark territory or security surveillance gaps in your environment?
How safe and secure are your digital assets and information resources including data, software applications, hardware and services?
What about tracking where those items including data or hardware and software have been or do you have dark territory points of exposure
Hopefully you are not one of those that I see at airports, coffee shops or at events who leave your computer or other digital assets alone, unattended while going to get a new beverage, or off to the rest room, talking on the phone? No worries, others will watch over your digital assets, right?
Closing comments about MH370
In the meantime condolences to those who lost friends and family including crew members on MH370. I only have flown MH a couple of times including over some dark or almost dark territories between the US and Asia and on to Australia in and out Kuala Lumpur which was a good experience. Also would like to extend thanks and best wishes to all of those involved in the search efforts so that someday we can learn what happened as well as to prevent it in the future.
Ok, nuff said (for now)
In most cases, it is convenient to have some human interaction with a web (micro-)service, no matter how small it is. A traditional approach would be to create an HTTP interface, where user requests will be dispatched and HTML/CSS pages must be served. This approach is indeed very traditional for a web site, but not really convenient for a web service, which is not intended to be good looking, 24x7 up and running and UX-optimized. Instead, talking to a web service in a chat-bot mode would be muc...
Feb. 11, 2016 11:15 AM EST Reads: 273
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud Security Alliance (CSA), developed the Certified Cloud Security Professional (CCSP) certification to address the increased demand for cloud security expertise due to rapid growth in cloud. Recently named “The Next...
Feb. 11, 2016 11:07 AM EST
SYS-CON Events announced today that AppNeta, the leader in performance insight for business-critical web applications, will exhibit and present at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. AppNeta is the only application performance monitoring (APM) company to provide solutions for all applications – applications you develop internally, business-critical SaaS applications you use and the networks that deli...
Feb. 11, 2016 11:00 AM EST Reads: 412
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
Feb. 11, 2016 11:00 AM EST Reads: 118
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Feb. 11, 2016 11:00 AM EST Reads: 240
The Art of DevOps provides a fun overview to help teams understand DevOps. Written in the style of the famous 6th century Chinese manuscript “The Art of War,” this eBook describes DevOps in the form of a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. It’s a fun read with valuable insights.
Feb. 11, 2016 10:33 AM EST
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.
Feb. 11, 2016 10:30 AM EST
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
Feb. 11, 2016 10:15 AM EST
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
Feb. 11, 2016 10:00 AM EST Reads: 394
SYS-CON Events announced today that FalconStor Software® Inc., a 15-year innovator of software-defined storage solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. FalconStor Software®, Inc. (NASDAQ: FALC) is a leading software-defined storage company offering a converged, hardware-agnostic, software-defined storage and data services platform. Its flagship solution FreeStor®, utilizes a horizonta...
Feb. 11, 2016 09:58 AM EST
DevOps is not just last year’s buzzword. Companies with DevOps practices are 2.5x more likely to exceed profitability, market share, and productivity goals. But how do you enable high performance? What can you do right now to start? Find out from DevOps experts including Gene Kim, co-author of "The Phoenix Project," and the Dynatrace Center of Excellence.
Feb. 11, 2016 09:45 AM EST
The Quantified Economy represents the total global addressable market (TAM) for IoT that, according to a recent IDC report, will grow to an unprecedented $1.3 trillion by 2019. With this the third wave of the Internet-global proliferation of connected devices, appliances and sensors is poised to take off in 2016. In his session at @ThingsExpo, David McLauchlan, CEO and co-founder of Buddy Platform, will discuss how the ability to access and analyze the massive volume of streaming data from mil...
Feb. 11, 2016 09:25 AM EST
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
Feb. 11, 2016 09:15 AM EST Reads: 193
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
Feb. 11, 2016 09:00 AM EST Reads: 102
CIOs and those charged with running IT Operations are challenged to deliver secure, audited, and reliable compute environments for the applications and data for the business. Behind the scenes these tasks are often accomplished by following onerous time-consuming processes and often the management of these environments and processes will be outsourced to multiple IT service providers. In addition, the division of work is often siloed into traditional "towers" that are not well integrated for cro...
Feb. 11, 2016 08:00 AM EST Reads: 482