Deprecated: wp_make_content_images_responsive ist seit Version 5.5.0 veraltet! Benutze stattdessen wp_filter_content_tags(). in /home/customer/www/winmagic.com/public_html/blog-de/wp-includes/functions.php on line 4774

Das Aus herkömmlicher Sicherheitsmaßnahmen und Interessantes zum Thema Cyber-Sicherheit

Once again, I had the pleasure of attending the RSA Security Conference this year in San Francisco, USA, the world’s largest security conference . There were 40,000 participants this year. Just a few years ago, it was less than 20,000. WinMagic had sent a complete team to San Francisco to attend lectures and presentations. In the exhibition area, WinMagic presented the new solution SecureDoc CloudVM on its own stand .

As in past events, I asked my colleagues about the event. Below I summarized her feedback and my personal opinion.

  • The company everyone was talking about at the conference did not count as a sponsor, did not have their own stand, and did not give a lecture on security: Apple. That was certainly due to the current media interest: The FBI called on Apple to develop a software that should unlock the iPhone of the assassin of San Bernardino. This topic was on everyone’s lips in the exhibition area, at lectures and in the keynote speeches. The entire security community backed Apple, arguing that backdoors do more harm than good. The technical community was aware that the government and the public had a different opinion. For this reason, she advocated a comprehensive and open discussion of this issue.
  • Fighting backdoors is not the only topic that consensus among security experts. Another example of cooperation in this area is the new Cyber ​​Threat Alliance , founded by Intel Security with other companies.
  • Conventional security measures are no longer sufficient. In front of firewalls, attackers are no longer deterred. For this reason, IT security must be reoriented. Attacks are an issue almost daily in most large companies. Therefore, new strategies and technologies are needed. Understand that your network is being attacked, find the cause, do mitigation, and recover quickly from the incident. For example, I’ve heard several people talking about minimizing the damage done to each attack, or backing up every 10 minutes to keep the recovery point up-to-date.
  • The cloud is omnipresent: It is being used more and more often and, in contrast to reality, is developing very fast. In no time, dozens or even hundreds of new servers are created. New, cloud-oriented companies have a strategic advantage over traditional IT: An expansion in the cloud is almost immediately possible without large capital expenditure. The same applies to extensive resources, which can also be accessed inexpensively. This scalability is based on a high degree of automation. And as soon as the automation is involved, things can theoretically go wrong. That’s when I remember the well-known quote“To err is humane, but to really foul things up you need a computer” (for example: To err is human, but to screw it right, you need a computer) Surely it will soon be replaced by a new quote that takes into account the damage that can arise through clouds. More and more new businesses and technologies are addressing these security issues. Although you can move and process data to a third-party cloud, the ultimate responsibility of the company is to secure the information.
  • Next is the Internet of Things. Maybe. I have heard at least a dozen times that by 2020 there will be around 50 billion devices connected to the Internet. WinMagic even gave a presentation on ” SEDs in the IoT“At the RSA TGG seminar. Often, however, it is also questioned whether every person on earth necessarily needs a web-enabled toothbrush. The benefits of buying and using such devices must balance the risks and potential damages. Personally, it is unclear why and how a hacker should launch an attack on a toothbrush, but that is certainly not unreasonable. Even if it will not be 50 billion devices, there will be billions of Internet-enabled devices in the near future. Authentication, verification, and encryption play a major role in protecting these devices.
  • Artificial intelligence is the future. It will certainly take another ten or twenty years for the artificial to catch up with human intelligence. When the time comes, artificial intelligence could quickly overtake people and become the superintelligence predicted by Professor Nick Bostrom , head of the Future of Humanity Institute. Unlike the Internet, security and protection are integrated into artificial intelligence right from the start. If that does not happen, I see myself in 2036 at the RSA conference in a lecture, which has the first attack on humanity by a renegade artificial intelligence on the subject.

Comments

comments

Vorheriger Beitrag
Kleine Datenlecks, hohe Kosten
Nächster Beitrag
Sicherheit für kritische Infrastrukturen

Related Posts

Sechs Tipps zum Schutz von Patientendaten

Umfassende Sicherheitsstrategien, bei denen der Schutz von Daten statt Geräten im Vordergrund steht, sind dank moderner Verschlüsselungstechnologien so unkompliziert wie nie zuvor. Einer aktuellen Umfrage des Ponemon Institute zufolge haben Gesundheitsdienstleister in den letzten fünf Jahren zunehmend in die Datensicherheit…

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert.

Bitte füllen Sie dieses Feld aus
Bitte füllen Sie dieses Feld aus
Bitte gib eine gültige E-Mail-Adresse ein.

Menü