===================================================
The Internet of Things is now becoming a reality. This will mean the Internet as we know it today, will dramatically change in many ways. There is no better a person who has the information to see future developments. Here is a great article by him.
===================================================
From The World Economic Forum - Future of the
Internet
What does the Internet of
Everything mean for security?
Jan 21 2015
There are two types of companies:
those who have been hacked, and those who don’t yet know they have been hacked.
Major players in every industry
were plagued by security breaches or incidents in 2014, though only the most
high profile attacks made their way into the headlines. We found that 100% of
business networks have traffic going to websites that
host malware, and the number of cybersecurity incidents involving
U.S. government agencies jumped 35%
between 2010 and 2013. There is no indication that this is going to
subside, and trends show that attacks continue to evolve in their
sophistication and frequency. Because of this, it’s no longer a question of if
– but when – cybercriminals will get into our networks or data centers.
Last year at the World Economic
Forum, I wrote about
how the Internet of Everything (IoE) – a global nervous system of networks
connecting people, process, data and things – would change the world. Now, one
year later, we have already seen the impact. Wearable health and performance
monitors, smart cars, smart grids, connected oil rigs, and connected
manufacturing have begun to revolutionise the way we work, live, play, and
learn.
A new approach to security
The Internet of Everything
presents a $19 trillion global opportunity to create value. However, in the era
of ubiquitous connectivity, security will be an even bigger concern. Simply
extending existing IT security postures to the Internet of Everything will not
be enough. A new approach to security, disruptive thinking and innovation is
critical.
I urge today’s leaders to
consider the following:
By design, threats take advantage
of trust in systems, applications, people and businesses. The reality is that
there is no such thing as a trusted network or device, and oftentimes, people are
the weakest link when it comes to threats entering an environment.
While this might sound insurmountable, it’s actually an opportunity for
companies to approach security as a growth engine, by designing strategies that
leverage technology and security expertise. We must look at security across the
attack continuum – before, during and after an attack.
Every company is a security
company
To maintain a strong level of
trust with customers, partners and employees in this environment, businesses
must think of themselves as security companies. While there is no such thing as
a trusted network or device, a strategy that focuses on the core security issue
– threats – will allow network defenders to advance beyond the abilities of
attackers to address the extended network and evolving business environments.
Good leaders need to be
unrelenting in their self-assessments of security: What controls do we have in
place? How well have they been tested? Do we have a reporting process? What
else should we know?
Security is no longer just a
technology issue – it applies to everyone. It’s necessary for technology and
business leadership to align and discuss potential risks and work
together to find solutions that protect intellectual property and financials
alike.
Global vigilance
Global vigilance and
collaborative intelligence are crucial. With no common set of standards in
place, the debate over Internet security is heightening around the world.
Cybercrime is already
flourishing in areas with weak cyber governance like in Eastern
Europe. Eventually, this varied approach to security could lead to restriction
of the flow of data across borders. A global dialogue among governments,
society, and the private sector, can help create agreement on how to secure the
Internet economy. Progress of the Internet
Engineering Task Force (IETF) and other standards bodies are making
the future look promising through collaboration, but ultimately, it’s up to
today’s leaders to come together to solve cyber governance problems.
The Internet of Everything can
transform our world, but to create meaningful change, we must rethink how we
are going to make sure everyone can capture opportunities in a secure way. We
must do this in a way that strategically positions security as a growth engine
not only for each individual business, but also for the global economy. If
everyone in the global community looks at security as a common cause that can
bring us closer together, then we can also move forward together to address the
technological and economic problems of our world.
=================================
**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
www.amazon.com/author/paulbabicki
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
www.amazon.com/author/paulbabicki
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I
am the founder and president of Tabula
Rosa Systems, a company that provides “best of breed” products for network,
security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT
product information for virtually anyone.
==============================================
No comments:
Post a Comment