Wednesday, November 29, 2017

A solid base

Anyone interested in architecture will know that for a structure to work, good foundations are essential. Studied for centuries, the construction of Venice is an unusual fact that shows that with a solid foundation you can build a city on the sea itself. The secret of the longevity of the wooden bases of Venice lies in the fact that they are submerged under water, out of reach of the microorganisms that cause the wear of the wood. In addition, the constant flow of salt water around and through the wood, petrifies it over time, turning it into a hardened structure, similar to stone.

As happens in architecture, companies also need a solid foundation on which to build their security strategy. And some of those responsible for laying the foundations are the developers. There are several measures that developers can take to accelerate the adoption of best security practices by their organizations, or that reveals a recent analysis conducted by the security provider Veracode. This study includes data from the scanning of 400,000 applications written in Java, Net, Android, iOS, PHP and several other programming languages and operating systems of organizations of all sizes.

Monday, November 27, 2017

The behavior as a shield

Since time immemorial, the human being has tried to understand himself and has asked many questions about human nature. Although it exists since antiquity, psychology as a science emerged in the nineteenth century, when a group of professionals adopted the scientific method to interpret human behavior.

There are many prisms from which one can face the constant problems and risks that attack the cybersecurity fronts. One of the currents that come stomping in the terrain of cybersecurity is based on the analysis of user behavior. Fromm all the voices that are currently struggling to carve out a niche in the sector, today it is worth noting the one of Jeff Paine who has offered an interview with SecurityBrief in which he talks about his point of view on cybersecurity to this day. Jeff Paine is the founder of ResponSight, an Australian-based cybersecurity firm that is focusing on fault detection and risk assessment.

Friday, November 24, 2017

Taking measures

At some point in the history of the human being arose the prevailing need to be able to express numerically everything that was around, and that was how the concept of number arose. Later, due to its development, a new need arose: to measure distances. At first, and having to take hold of what they were carrying, they began to use their own body. Steps, elbows, spans ... were some of the methods used to take measurements and express distances.

But when we talk about taking measures we don´t only talk about metrology, but we can also be referring to the act of taking some action to try to solve the problems. This is well known in the cybersecurity world. In a sector in constant evolution, what is valid today may not be tomorrow. The continuous transformation of threats makes it necessary to take measures and adapt them to each situation, which evolves almost daily. This week we have several cases of companies and organizations that have decided to take to deal with certain complications.

Wednesday, November 22, 2017

The new revolution

Many are the advantages of the machines: they increase the production, they grant a greater level of precision, the losses of raw materials are diminished ... but in spite of being able to enumerate many of them, not all were advantages when the machines arrived to stay and the revolution industrial began. For decades, workers enjoyed little of the benefits of this increase in productivity and it was not until after a time, when the benefits began to be distributed more widely.

Today, in the 21st century, we are not suffering an industrial revolution ... or are we? Artificial Intelligence has brought many benefits to the technological, industrial, sanitary or educational sector. And this trend is booming and proof of this are the results of the survey conducted by Deloitte to digital leaders in the United Kingdom of 561 different organizations. According to this study, 85% of senior executives plan to invest in Artificial Intelligence (AI) and Internet of Thing (IoT).

Monday, November 20, 2017

The way to success

Today they are familiar but between the middle of the 12th century and the beginning of the 13th century all of Europe began to be planted with these new educational institutions for the time. In Europe, during this time, many young Europeans began to go en masse to the incipient universities in search of a title that opened the way to success. As for the first university, despite giving priority to the University of Bologna, it is not known exactly which one was the first to be founded.

The search for professional success has not gone out of fashion and, today, we are still looking for the key to succeed in the workplace in a constantly changing landscape. In the cybersecurity sector, there is a complicated time, in which lack of talent leads to technical positions that are not covered. Among the different points of view on this topic today stands out the voice of Simon Wright, who has recently offered an interview in Infosecurity Magazine. Wright is director of operations at CareersinCybersecurity, a company that provides access to numerous sources for job seekers and recruiters. As far as talent is concerned, there is no better opinion than that of a talent collector.

Friday, November 17, 2017

When 'hack' was just a joke

The word “hacker” is based on our vocabulary, and even more so when you dedicate yourself to the world of cybersecurity. As many of our readers know, the word hacker is not negative because it doesn´t always refer to an inclusion in another's website, but can refer to some enthusiastic lover of programming. This term has its origin in the Artificial Intelligence laboratory of MIT. Here, the members of this organization created the tradition of playing innocent jokes among themselves, which they called "hacks". These same members were the first to call themselves hackers.

And although the origin of the word is poetic, the actions of these characters of cybersecurity are not always so endearing. Although the profession itself has both positive and negative meanings, the verb "hack" rarely refers to a good action. High towers have fallen this week due to the action of this verb and the activity of the less noble hackers of the network.

Wednesday, November 15, 2017

Doctor at your own home

During the twentieth century medicine has reached a remarkable development. While in the nineteenth century relief was more frequent than healing, twentieth-century medicine has experienced a great boost. Scientific and technical development is the main reason for the progress of medicine, and the figure of the doctor has progressed with it. The figure of the doctor has been transformed from a purely priestly facet to becoming a technical advisor for his patients, getting a relationship in which patient and doctor collaborate for a common purpose.

Currently, due to the accelerated digital transformation that is experienced in companies, the role of the CIO is evolving and taking more weight in the decision making of companies. For all those who do not know what charge we are referring to, the CIO is the Chief Information Officer, which, among other functions, has the responsibility of making the company aware of the need to control risks and invest in security. Gartner, a consulting and information technology research company, has conducted a survey of CIOs from Europe, the Middle East and Africa to learn about the current status of this position within companies.

Monday, November 13, 2017

Good bases

"I wake up every morning in a house that was built by slaves, and I see my daughters, two black girls, intelligent and beautiful, playing with their dogs in the gardens of the White House." This phrase, extracted from the emotional speech that Michelle Obama offered during the Democratic National Convention last year, gave rise to endless doubts about the origin of the White House. In fact, the few written records of the time do not allow to reach that conclusion with total certainty, but even if it is not entirely true, for a moment all citizens of the United States rethink the bases on which American pride is based.

Today, in the interview of the week, we meet Joe Stunz, who was Chief of Police for Casablanca in the National Security and Cybersecurity unit and now works in One World Identity, an independent search and strategy company. As happens with the origins of the White House, in almost any history the principles lay the foundations of the present and make things look from another perspective. Joe Stunz, thanks to his professional development, has a special ability to see the current situation of cybersecurity from a much broader point of view.

Friday, November 10, 2017

The importance of a good glosary

Have you ever wondered who names the storms and hurricanes? Although many don´t know, there is a technique used when naming atmospheric phenomena to help a quick identification in the warnings of caution to the population. Most of these hurricanes and typhoons have female names, this is because during World War II meteorologists popularized the practice of using women's names for storms since they preferred to choose names of their lovers, wives or mothers. Fortunately, beginning in 1978, the names of men began to be included in the lists.

In cybersecurity we don´t have atmospheric phenomena but we fight every day against attacks, viruses and malware. The nomenclature of these elements is vital for their recognition and the disparity of denominations can generate problems for both the infected user and the organizations and companies that work in this field. Doing a review of the news of the week we find several names that it is important to start remembering because ... they are taking on the odds.

Wednesday, November 8, 2017

Gasoline or batery?

When listening to the “hybrid” word, it is inevitable to bring up vehicles of last generation, of futuristic aspect and coming from a company aware of the environment. But nothing is further from reality, the one that is considered the first hybrid of history dates from 1896. It is Armstrong Phaeton built by the Armstrong Company for the Roger Mechanical Carriage Company. It consists of a hybrid system consisting of a 6.5-liter two-cylinder gasoline engine and a dynamo connected to a battery. It is a pity that, at the end of the 19th century, they didn´t appreciate the visionary thinking of this vehicle.

In recent years the term "hybrid" has reached the cybersecurity sector, although this time linked to the concept of the cloud. Just this week we received this international survey conducted by AlgoSec, a specialist in network policy management, with 450 security and network work professionals showing the challenges in terms of strategies based on the hybrid cloud and their fears about cybersecurity. Among the main fears on the part of the respondents are cyber attacks, security breaches and the way they deal with their visibility and security management processes. But, how do companies consider facing these fears?

Monday, November 6, 2017

The push of the investment

There has always been a certain reluctance to accept that the bases of development are shaken every so often to make way for new ones. Already at the end of the 19th century there was a certain consensus when it came to admitting that there was nothing important to discover in the scientific field. In fact, at a conference in 1900 Lord Kelvin came to say: "Physics can no longer discover anything new. The only thing that we need is to be able to make measurements with greater precision".

One of the first things that need to be changed to drive development is this kind of thinking. Currently, despite the fact that cybersecurity is becoming an issue of general importance, and to a greater or lesser degree, anyone has heard of cyber attacks and data leaks, companies continue to consider the "cyber" sector as an extra on time to invest. And we already know that, lack of investment leads to a lack of innovation and development. Today we meet Nazo Mossa, director of VT Partners, a capital growth fund that supports the rapid development of technology companies, which believes that cybersecurity in Europe needs a boost in terms of investment.

Friday, November 3, 2017

The value of your information

If we think in the First World War we know that in a bakery there could be more than bread and that a baker could be perfectly a spy. In fact, the story says that a baker in Moscow was used by German espionage to communicate with each other, with only his gaze and the count of the loaves of bread. It was a simple and peculiar technique that achieved its goal: to go unnoticed by the Allied side.

As in the First World War, we are currently in the midst of another type of war in which information is the most precious asset. Criminals, fraudsters and thieves in the cybersecurity sector have seen this vein and new methods are emerging every day to make them achieve their goal. Doing a review of the news this week we realize that, today more than ever, the protection of your information should be at the same level as the security of your home or your car.