Monday, December 9, 2013

Change: an essential factor in cybersecurity

“If you do not change direction, you may end up where you are heading” (Chinese philosopher, Lao Tzu). Therefore change is essential in redirecting our path.

With this thought in mind, eight of the leading Internet companies have formed a bloc to ask a Global Surveillance Government Reform to the U.S. administration. AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Yahoo and Twitter say in a public letter that "it's time for a change". It is their way of pressuring Washington after the news on surveillance that were released last summer.

Meanwhile, in Spain, the change on the path we follow regarding information security could come from the National Cybersecurity Strategy (NCS), adopted by the Council of Ministers last Friday. Under the premise of eight lines of action, such as the culture of cybersecurity or the international commitment it contains over sixteen national cyber strategies and one European directive.

The future of online security has also forced the metamorphosis of some secret agents. This is the case of Michael Adams, who infiltrated for more than four years as an undercover agent in a fraud scheme which sold fake documents on the Internet and caused losses for more than $ 50 million.

Without leaving the United States, you will find another sign of change. The Department of Defense has found a new way to search for vulnerabilities along the millions of lines of code of its software. Thus, DARPA (the Defense Advanced Research Projects Agency) has launched a website of online games called Verigames, where users can solve puzzles that will result in program annotations and mathematical proofs that identify flaws in the software.

Very often the use of cloud computing from a business perspective, also undergoes some transformations. In 2014, it is expected that the adoption of both the private and the public cloud consolidates and tends to further automation of its systems due to some increasingly security concerns, according to Eric Chiu, president of HyTrust.

There is no doubt that there are some worries about mobile technology regarding its large adoption and, in most cases, lack of control. Therefore, it is highly recommended that any company adopts a single security solution for all its mobile devices, which is simple, yet powerful and flexible and match strategic objectives of the company.

If we fail now carrying out the changes we know we need to do, we can not expect a version of our future selves calling us and warning us about it, as it does happen in the video by Sophos that comes with these lines.


We invite you to rate our posts, to leave your comments and to share them on social networks. Also, if you want you can follow us on our profiles. At the sidebar, you’ve got the links ;-)


Post a Comment