|By David Canellos||
|May 13, 2014 11:15 AM EDT||
Last month, the Information Security Forum released their annual prediction of the top 10 information security threats they foresee for the next two years - through 2016. While I found the entire list insightful, half of the list resonated strongly with me as someone who is working with large enterprises as they wrestle with security and compliance challenges as they embark on cloud adoption. I believe this group of five predictions is particularly relevant for anyone utilizing the cloud over the next two years and I've added a few of my own thoughts on each.
1. Service Providers Become a Key Vulnerability
I find this first prediction especially valid and timely because of some recent headlines. Service providers, given the nature of their business, are a prime "aggregation" for all types of sensitive/valuable data. Cyber criminals and hackers realize this, which puts a big target on the backs of service providers. Think about it - a successful breach equals a treasure trove of coveted information from potentially multiple tenants. And the reality is that service providers acting as a central storage point for large amounts of sensitive data will continue to increase over the next two years, so the prize will only become richer. In response and in preparation, enterprises need to takes steps to protect their most sensitive and important data and decide which data they truly need to send to public cloud service providers.
2. Mobile Apps Become the Main Route for Compromise
Mobile apps, deployed on bring your own device (BYOD) technologies (tablets, cell phones, etc.) make it extremely difficult for IT departments to control where and how their sensitive data is accessed and by whom. BYOD means many heavily used employee devices will be actively in use and the reality is that this equipment does not have the same security in place as corporate owned devices. This, when combined with the proliferation of cloud applications (used for both personal and business), creates a perfect storm for compromising corporate data. Because of this scenario, IT and security should deploy security techniques that treat subsets of their data differently, with different levels of restriction and more security for the most sensitive data and Intellectual Property.
3. Encryption Fails
This is a very broad and provocative statement, as encryption use is increasing in the marketplace and many enterprises are becoming dependent on it for some of their data security needs. If someone asked me if this statement is true - Will encryption fail? - I would have to say that - Yes, some encryption will fail. That's because not all encryption is created equal. Enterprises need to understand that some encryption is much stronger than others; there are differences in how the technology is deployed. At Perspecsys, we allow customers to deploy the most secure, FIPS 140-2 validated encryption techniques. We also have the enterprise maintain physical ownership of the encryption keys. Both of these points are critical for successful deployment. And we support tokenization, another security method that many in the industry find has unique strengths when compared to encryption. (More information on tokenization is available here on our website.)
4. The CEO Gets It, Now You Have to Deliver
We are now hearing that cloud security is a board-level issue, so I agree that the CEO must "get it" since the CEO reports into this group. We are now starting to see generous budgets being allocated for cloud protection and security projects and IT and security teams have more resources than in the past to help combat operational risks to the business. It's now up to the IT and security teams to find the best technology and solutions for their enterprise's unique needs.
5. Information Security Fails to Work with New Generations
This is perhaps the most critically important observation. Clearly security solutions that interfere or inhibit with the way workers need to engage with the cloud will be unsuccessful. Why? Well, because employees will always find a way to work around them. Or, in a perhaps another scenario, there will be end-user pushback and operational issues that will land in the lap of IT and Security teams, creating organizational divisiveness (e.g., "those guys are stopping me from being able to do my job") and a significant productivity hit. This is why we have done a tremendous amount of original research to figure out ways in our cloud data control gateway to remain transparent/invisible to end users, meaning they can utilize cloud applications as needed and still perform functions such as search/sort on data, even when data has been tokenized or encrypted.
I commend the authors of the piece for their predictions and foreword looking insights that will help provoke the right conversations among many enterprise IT and Security teams. It sounds like the Information Security Forum is talking to some of the same people that we talk to and undoubtedly their predictions will help organizations think about how to improve and solidify their corporate IT and Security policies over the next couple years.
Perspecsys Inc. is a leading provider of cloud data tokenization and cloud encryption solutions that enable mission-critical cloud applications to be adopted throughout the enterprise. Cloud security companies like Perspecsys remove the technical, legal and financial risks of placing sensitive company data in the cloud. Perspecsys accomplishes this for many large, heavily regulated companies across the world by never allowing sensitive data to leave a customer's network, while maintaining the functionality of cloud applications. For more information please visit perspecsys.com or follow on Twitter @perspecsys.
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, will discuss how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a prac...
Sep. 4, 2015 06:00 PM EDT Reads: 272
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Sep. 4, 2015 05:30 PM EDT Reads: 498
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
Sep. 4, 2015 04:15 PM EDT Reads: 529
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products. In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, will discuss how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the ...
Sep. 4, 2015 04:00 PM EDT
Contrary to mainstream media attention, the multiple possibilities of how consumer IoT will transform our everyday lives aren’t the only angle of this headline-gaining trend. There’s a huge opportunity for “industrial IoT” and “Smart Cities” to impact the world in the same capacity – especially during critical situations. For example, a community water dam that needs to release water can leverage embedded critical communications logic to alert the appropriate individuals, on the right device, as...
Sep. 4, 2015 04:00 PM EDT
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing thes...
Sep. 4, 2015 03:45 PM EDT Reads: 143
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Sep. 4, 2015 03:30 PM EDT Reads: 979
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
Sep. 4, 2015 03:30 PM EDT Reads: 469
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
Sep. 4, 2015 03:30 PM EDT Reads: 544
While many app developers are comfortable building apps for the smartphone, there is a whole new world out there. In his session at @ThingsExpo, Narayan Sainaney, Co-founder and CTO of Mojio, will discuss how the business case for connected car apps is growing and, with open platform companies having already done the heavy lifting, there really is no barrier to entry.
Sep. 4, 2015 03:00 PM EDT Reads: 227
To assist customers with legacy Windows Server 2003 that is no longer supported by Microsoft, Racemi has introduced fixed price packages for upgrading and migrating Windows Server 2003 servers to either Windows 2008 R2 or Windows 2012 R2 and the choice of Amazon Web Services (AWS) or SoftLayer cloud. "We're extending a lifeline by upgrading the legacy servers to more modern Windows Server platforms while taking advantage of cloud computing," said James Strayer, vice president of product managem...
Sep. 4, 2015 02:12 PM EDT
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Learn what is going on, contribute to the discussions, and e...
Sep. 4, 2015 02:00 PM EDT Reads: 232
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
Sep. 4, 2015 02:00 PM EDT Reads: 271
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
Sep. 4, 2015 01:45 PM EDT Reads: 653
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Sep. 4, 2015 12:30 PM EDT Reads: 121