The escalating terror attacks that are gripping the world will dramatically change the technology landscape in the coming year. As the threats of more deadly attacks on innocent people become more pervasive, people’s attitudes and public policies toward technology will fundamentally change.
Whether we like it or not, technology has become a tool of today’s rapidly growing terrorist groups. They recruit new members, showcase their latest atrocities and promote their causes via social media. They use encryption to hide their plans and coordinate their attacks. And they are becoming more adept at not only hacking government and corporate databases for political purposes but also getting closer to gaining access to power plants, manufacturing operations and other key components of the “grid.”
As a consequence of these intensifying threats, there will be a groundswell of demands in 2016 for new technology policies, products … Read More »
One of the primary concerns among IT and business decision-makers regarding cloud computing, including Software-as-a-Service (SaaS), is potential security problems. Yet, most enterprises are facing an uphill battle trying to keep their own operations secure.
The latest illustration of this point is today’s Wall Street Journal story claiming that the FBI is investigating a potential security breach within Citigroup that may have resulted in the theft of millions of dollars by a Russian cyber gang. While Citigroup is denying that its computers were compromised and that there is an investigation underway, the story is a clear reminder that no one is safe from hackers intent on attacking a specific target.
Therefore, cloud computing vendors are no more vulnerable and are not necessarily less secure than enterprises. In fact, if the lack of published stories about security infringements among cloud computing vendors is a good indicator, then these vendors have actually proven to be … Read More »