Security: Exception to the Rule? - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Information Management
Commentary
1/13/2010
09:36 AM
Lorna Garey
Lorna Garey
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Security: Exception to the Rule?

In his most recent column, Art Wittmann explained that we're not going to see a "year of the cloud" because cloud is an evolutionary process, and evolution takes time. In general, that's true, but there's one area where the pace tends to be quicker—security. Attackers aren't sitting back waiting for new techs to gain maturity. They're throwing everything they have at our networks, hoping

In his most recent column, Art Wittmann explained that we're not going to see a "year of the cloud" because cloud is an evolutionary process, and evolution takes time. In general, that's true, but there's one area where the pace tends to be quicker—security. Attackers aren't sitting back waiting for new techs to gain maturity. They're throwing everything they have at our networks, hoping something sticks and yields a payoff in stolen data.Remember when perimeter security was still considered a socially acceptable strategy? Seems like not so long ago I edited the NWC "Secure to the Core" cover story where Greg Shipley declared that defense in depth was the way to go. It wasn't so long ago that Mike Fratto covered NAC, and I am now watching with interest the rise of data-centric security and DLP.

This is evolution on steroids that would shame even Mark McGwire, and it got me wondering: What's next?

To find out, InformationWeek Analytics and Dark Reading are looking to highlight the 5 best security innovations that will usher in the new decade. The report will be written by noted corporate security, counterespionage, and cybercrime researcher and DR blogger Gadi Evron. We're not looking for iterative updates of existing technologies. Rather, we want to find out what will be the big guns vendors will deliver to infosec groups as they gird up for the ongoing arms race with sophisticated and well-organized attackers.

If you think you have the Next Big Thing in security, tell me about it at [email protected]

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Commentary
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
News
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll