Friday, November 17, 2017

When 'hack' was just a joke

The word “hacker” is based on our vocabulary, and even more so when you dedicate yourself to the world of cybersecurity. As many of our readers know, the word hacker is not negative because it doesn´t always refer to an inclusion in another's website, but can refer to some enthusiastic lover of programming. This term has its origin in the Artificial Intelligence laboratory of MIT. Here, the members of this organization created the tradition of playing innocent jokes among themselves, which they called "hacks". These same members were the first to call themselves hackers.

And although the origin of the word is poetic, the actions of these characters of cybersecurity are not always so endearing. Although the profession itself has both positive and negative meanings, the verb "hack" rarely refers to a good action. High towers have fallen this week due to the action of this verb and the activity of the less noble hackers of the network.

Wednesday, November 15, 2017

Doctor at your own home

During the twentieth century medicine has reached a remarkable development. While in the nineteenth century relief was more frequent than healing, twentieth-century medicine has experienced a great boost. Scientific and technical development is the main reason for the progress of medicine, and the figure of the doctor has progressed with it. The figure of the doctor has been transformed from a purely priestly facet to becoming a technical advisor for his patients, getting a relationship in which patient and doctor collaborate for a common purpose.

Currently, due to the accelerated digital transformation that is experienced in companies, the role of the CIO is evolving and taking more weight in the decision making of companies. For all those who do not know what charge we are referring to, the CIO is the Chief Information Officer, which, among other functions, has the responsibility of making the company aware of the need to control risks and invest in security. Gartner, a consulting and information technology research company, has conducted a survey of CIOs from Europe, the Middle East and Africa to learn about the current status of this position within companies.

Monday, November 13, 2017

Good bases

"I wake up every morning in a house that was built by slaves, and I see my daughters, two black girls, intelligent and beautiful, playing with their dogs in the gardens of the White House." This phrase, extracted from the emotional speech that Michelle Obama offered during the Democratic National Convention last year, gave rise to endless doubts about the origin of the White House. In fact, the few written records of the time do not allow to reach that conclusion with total certainty, but even if it is not entirely true, for a moment all citizens of the United States rethink the bases on which American pride is based.

Today, in the interview of the week, we meet Joe Stunz, who was Chief of Police for Casablanca in the National Security and Cybersecurity unit and now works in One World Identity, an independent search and strategy company. As happens with the origins of the White House, in almost any history the principles lay the foundations of the present and make things look from another perspective. Joe Stunz, thanks to his professional development, has a special ability to see the current situation of cybersecurity from a much broader point of view.

Friday, November 10, 2017

The importance of a good glosary

Have you ever wondered who names the storms and hurricanes? Although many don´t know, there is a technique used when naming atmospheric phenomena to help a quick identification in the warnings of caution to the population. Most of these hurricanes and typhoons have female names, this is because during World War II meteorologists popularized the practice of using women's names for storms since they preferred to choose names of their lovers, wives or mothers. Fortunately, beginning in 1978, the names of men began to be included in the lists.

In cybersecurity we don´t have atmospheric phenomena but we fight every day against attacks, viruses and malware. The nomenclature of these elements is vital for their recognition and the disparity of denominations can generate problems for both the infected user and the organizations and companies that work in this field. Doing a review of the news of the week we find several names that it is important to start remembering because ... they are taking on the odds.

Wednesday, November 8, 2017

Gasoline or batery?

When listening to the “hybrid” word, it is inevitable to bring up vehicles of last generation, of futuristic aspect and coming from a company aware of the environment. But nothing is further from reality, the one that is considered the first hybrid of history dates from 1896. It is Armstrong Phaeton built by the Armstrong Company for the Roger Mechanical Carriage Company. It consists of a hybrid system consisting of a 6.5-liter two-cylinder gasoline engine and a dynamo connected to a battery. It is a pity that, at the end of the 19th century, they didn´t appreciate the visionary thinking of this vehicle.

In recent years the term "hybrid" has reached the cybersecurity sector, although this time linked to the concept of the cloud. Just this week we received this international survey conducted by AlgoSec, a specialist in network policy management, with 450 security and network work professionals showing the challenges in terms of strategies based on the hybrid cloud and their fears about cybersecurity. Among the main fears on the part of the respondents are cyber attacks, security breaches and the way they deal with their visibility and security management processes. But, how do companies consider facing these fears?

Monday, November 6, 2017

The push of the investment

There has always been a certain reluctance to accept that the bases of development are shaken every so often to make way for new ones. Already at the end of the 19th century there was a certain consensus when it came to admitting that there was nothing important to discover in the scientific field. In fact, at a conference in 1900 Lord Kelvin came to say: "Physics can no longer discover anything new. The only thing that we need is to be able to make measurements with greater precision".

One of the first things that need to be changed to drive development is this kind of thinking. Currently, despite the fact that cybersecurity is becoming an issue of general importance, and to a greater or lesser degree, anyone has heard of cyber attacks and data leaks, companies continue to consider the "cyber" sector as an extra on time to invest. And we already know that, lack of investment leads to a lack of innovation and development. Today we meet Nazo Mossa, director of VT Partners, a capital growth fund that supports the rapid development of technology companies, which believes that cybersecurity in Europe needs a boost in terms of investment.

Friday, November 3, 2017

The value of your information

If we think in the First World War we know that in a bakery there could be more than bread and that a baker could be perfectly a spy. In fact, the story says that a baker in Moscow was used by German espionage to communicate with each other, with only his gaze and the count of the loaves of bread. It was a simple and peculiar technique that achieved its goal: to go unnoticed by the Allied side.

As in the First World War, we are currently in the midst of another type of war in which information is the most precious asset. Criminals, fraudsters and thieves in the cybersecurity sector have seen this vein and new methods are emerging every day to make them achieve their goal. Doing a review of the news this week we realize that, today more than ever, the protection of your information should be at the same level as the security of your home or your car.