Security: Exception to the Rule? - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Information Management
Commentary
1/13/2010
09:36 AM
Lorna Garey
Lorna Garey
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Security: Exception to the Rule?

In his most recent column, Art Wittmann explained that we're not going to see a "year of the cloud" because cloud is an evolutionary process, and evolution takes time. In general, that's true, but there's one area where the pace tends to be quicker—security. Attackers aren't sitting back waiting for new techs to gain maturity. They're throwing everything they have at our networks, hoping

In his most recent column, Art Wittmann explained that we're not going to see a "year of the cloud" because cloud is an evolutionary process, and evolution takes time. In general, that's true, but there's one area where the pace tends to be quicker—security. Attackers aren't sitting back waiting for new techs to gain maturity. They're throwing everything they have at our networks, hoping something sticks and yields a payoff in stolen data.Remember when perimeter security was still considered a socially acceptable strategy? Seems like not so long ago I edited the NWC "Secure to the Core" cover story where Greg Shipley declared that defense in depth was the way to go. It wasn't so long ago that Mike Fratto covered NAC, and I am now watching with interest the rise of data-centric security and DLP.

This is evolution on steroids that would shame even Mark McGwire, and it got me wondering: What's next?

To find out, InformationWeek Analytics and Dark Reading are looking to highlight the 5 best security innovations that will usher in the new decade. The report will be written by noted corporate security, counterespionage, and cybercrime researcher and DR blogger Gadi Evron. We're not looking for iterative updates of existing technologies. Rather, we want to find out what will be the big guns vendors will deliver to infosec groups as they gird up for the ongoing arms race with sophisticated and well-organized attackers.

If you think you have the Next Big Thing in security, tell me about it at [email protected]

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Commentary
Gartner Forecast Sees 7.3% Shrinkage in IT Spending for 2020
Joao-Pierre S. Ruth, Senior Writer,  7/15/2020
Slideshows
10 Ways AI Is Transforming Enterprise Software
Cynthia Harvey, Freelance Journalist, InformationWeek,  7/13/2020
Commentary
IT Career Paths You May Not Have Considered
Lisa Morgan, Freelance Writer,  6/30/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Special Report: Why Performance Testing is Crucial Today
This special report will help enterprises determine what they should expect from performance testing solutions and how to put them to work most efficiently. Get it today!
Slideshows
Flash Poll