Tuesday, January 27, 2015

Tabula Rosa Systems Blog Of The Day - Internet Of Things According to John Chambers



=====================================
From The World Economic Forum - Future of the Internet
What does the Internet of Everything mean for security?
Jan 21 2015
There are two types of companies: those who have been hacked, and those who don’t yet know they have been hacked.
Major players in every industry were plagued by security breaches or incidents in 2014, though only the most high profile attacks made their way into the headlines. We found that 100% of business networks have traffic going to websites that host malware, and the number of cybersecurity incidents involving U.S. government agencies jumped 35% between 2010 and 2013. There is no indication that this is going to subside, and trends show that attacks continue to evolve in their sophistication and frequency. Because of this, it’s no longer a question of if – but when – cybercriminals will get into our networks or data centers.
Last year at the World Economic Forum, I wrote about how the Internet of Everything (IoE) – a global nervous system of networks connecting people, process, data and things – would change the world. Now, one year later, we have already seen the impact. Wearable health and performance monitors, smart cars, smart grids, connected oil rigs, and connected manufacturing have begun to revolutionise the way we work, live, play, and learn.
A new approach to security
The Internet of Everything presents a $19 trillion global opportunity to create value. However, in the era of ubiquitous connectivity, security will be an even bigger concern. Simply extending existing IT security postures to the Internet of Everything will not be enough. A new approach to security, disruptive thinking and innovation is critical.
I urge today’s leaders to consider the following:
By design, threats take advantage of trust in systems, applications, people and businesses. The reality is that there is no such thing as a trusted network or device, and oftentimes, people are the weakest link when it comes to threats entering an environment. While this might sound insurmountable, it’s actually an opportunity for companies to approach security as a growth engine, by designing strategies that leverage technology and security expertise. We must look at security across the attack continuum – before, during and after an attack.
Every company is a security company
To maintain a strong level of trust with customers, partners and employees in this environment, businesses must think of themselves as security companies. While there is no such thing as a trusted network or device, a strategy that focuses on the core security issue – threats – will allow network defenders to advance beyond the abilities of attackers to address the extended network and evolving business environments.
Good leaders need to be unrelenting in their self-assessments of security: What controls do we have in place? How well have they been tested? Do we have a reporting process? What else should we know?
Security is no longer just a technology issue – it applies to everyone. It’s necessary for technology and business leadership to align and discuss  potential risks and work together to find solutions that protect intellectual property and financials alike.
Global vigilance
Global vigilance and collaborative intelligence are crucial. With no common set of standards in place, the debate over Internet security is heightening around the world. Cybercrime is already flourishing in areas with weak cyber governance like in Eastern Europe. Eventually, this varied approach to security could lead to restriction of the flow of data across borders. A global dialogue among governments, society, and the private sector, can help create agreement on how to secure the Internet economy. Progress of the Internet Engineering Task Force (IETF) and other standards bodies are making the future look promising through collaboration, but ultimately, it’s up to today’s leaders to come together to solve cyber governance problems.
The Internet of Everything can transform our world, but to create meaningful change, we must rethink how we are going to make sure everyone can capture opportunities in a secure way. We must do this in a way that strategically positions security as a growth engine not only for each individual business, but also for the global economy. If everyone in the global community looks at security as a common cause that can bring us closer together, then we can also move forward together to address the technological and economic problems of our world.
=================================
**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

 

No comments:

Post a Comment