| |||||||||
| |||||||||
Current Filter: Security>>>>>> The security challenges ahead for 2014 Editorial Type: Opinion Date: 11-2013 Views: 2659 Key Topics: Security Software-Defined Networking The Internet of Everything Cybercrime Two-factor Authentication Key Companies: Lancope Key Products: Key Industries: | |||
Tim 'TK' Keanini, CTO at Lancope, has put together his thoughts on some promising, as well as some concerning, innovations that will shape the way we secure our networks in the coming year Incident response finally matures to a business process Headline after headline we see companies reporting a cyber incident and hanging their heads in shame. While it is disappointing, strong businesses have strong leaders that show us how to operate in times of crisis. Responding to an information security incident is not just an IT thing anymore - it is a business thing. 2014 is the year businesses will finally realise that leveraging the Internet for business growth also means that responding to incidents is par for the course. I’m certain that in 2014 we will see certain companies step up and show everyone else in the world how to excel at incident response. Successful businesses are the most attractive to the adversaries, so it is fitting that these companies will have no choice but to step up and lead. They will show us how business continuity is job one, and they will no doubt execute their incident response processes as well as a world-class sports team on game day – interfacing with legal, PR, marketing and external crime fighters to get the job done. Software-Defined Networking (SDN) and the adaptive perimeter Security experts have been saying recently that the network perimeter is dead, and that the boundaries that firewalls have established between “inside†and “outside†are disappearing. What they are really saying is that static and physically established boundaries are dead because they cannot adapt quickly to changing threat and business requirements. This all changes with Software-Defined Networking (SDN). In 2014, we will see an adaptive perimeter or intelligence-based enclaves that are dynamic and both serving the business needs as well as defensive against advanced threats. While there are many examples, I will share one that mimics the biology of the human body. Our bodies at a cellular level “live†because we are able to replicate cells without error on an ongoing basis. When errors occur at this cellular level, we have cancer. The difference between it being life threatening or not depends on the body’s ability to encapsulate this error and stop its replication – the successful result is a benign tumor that in most cases can be removed. This form of containment on a network is completely attainable with SDN as long as some intelligent system is monitoring for and detecting anomalies. Self-forming enclaves are also proactive in that they can dynamically partition the network in such a way that no one threat can have a life-threatening effect on the business. SDN is one of the most exciting capabilities to ever present itself to a security architecture, and in 2014, SDN innovation will emerge, making it harder for bad guys to operate.
Increase in two-factor authentication
New Security Challenges for 2014
The “Internet of Everything†requires the “Security of Everythingâ€
Physical authenticity weakens with 3D printing
Tracking devices If some of this technology sounds more suitable for “The Matrix†than for consideration in your 2014 security strategy, then it is time for you to realise that there are virtually no limits to today’s technology innovations. And unfortunately, that also means that there are hardly any limits to the opportunities for today’s online attackers either. Attackers’ inroads to your corporate and personal data and assets continue to multiply, while their skills and resources are also growing. The good news is that this same innovation is also feeding the security solutions we have available to us today. It is time to look beyond your firewalls, antivirus and other conventional tools and embrace new, more progressive means of securing your network in 2014 and beyond. | |||
Like this article? Click here to get the Newsletter and Magazine Free! | |||
Email The Editor! OR Forward Article | Go Top | ||
PREVIOUS | NEXT |