The challenges, blockers to change, and the decisions required to embark on change vary across industry sectors. The policies and processes that have been engrained over decades of information technology (IT) dominance and stewardship may become the inhibitors of change without a strategy for change. The intrinsic nature of risks has changed and therefore the solutions must too.Read More
The proliferation of autonomous digital devices in our daily lives, what we refer to as the Internet of Things, is poised to connect with other things in a chain of clouds to serve a much larger purpose and make possible a much wider spectrum of services. You can think of this as the socialization of things, where things communicate with other things – near and far. The power of locally connected things is a game changer for local economies, in both urban and rural communities. From the energy grid, to water supply systems, roads, trains, farms, schools, factories, hospitals, healthcare workers, and first responders the connectivity of things is becoming an enabler for economic prosperity.
Device transformation and protection is required to revolutionize digital transformation, just as virtualization and software defined networking were required to revolutionize data centers. Operations Technology (OT) and Information Technology (IT) are fundamentally dissimilar. To begin with, the problem space is radically different – unprotected devices versus gullible users as the carbon. This demands a different solution strategy. Cyber criminals exploit user psychology and over the past decade have truly transformed hacking from a cottage industry to a fine art. A device has no emotions. Devices can be made smarter than humans in cyberspace. Bridging the IT-OT divide (in some cases, a thin line) is the implementation challenge.Read More
Over a decade ago, we were told the cloud was not just a “secure” cloud, it was a “trusted” cloud. Today, cybersecurity companies are still playing detectives and cloud platform vendors and service providers are acquiring them for billions of dollars. In the end, can we trust chief risk officers to do the right thing and invest in protection after they have exhausted all detection alternatives? While detection is a valuable and necessary forensic analysis tool, not including protection as a strategy in the digital tool chest is a fatal oversight. Protection is what you do before detection becomes a necessity.Read More
During the cold war, a new weapon was built to pierce any shield and for every new weapon a new shield was built that could not be pierced. This is the infinite game theory about will and resources, and who exhausts one or the other first and drops out of the game.Read More