Why the Future of Security will be Context-Based ?

Rise in adoption of mobile, social and cloud technologies has created the need for a more proactive and context-based approach to managing security


For years, business organizations followed a rather reactive approach to managing IT security. Every time there was a new type of attack, security vendors would come up with a new solution to combat that threat. This approach worked very well till users accessed computers in controlled work environments. The company could easily monitor incoming and outgoing network traffic. But in today’s multi-channel environment, where users stay connected through a plethora of mobile devices and web-based apps, the security threats and vulnerabilities have only increased. According to PWC’s Global Information Security Survey 2015, the number of security incidents detected in 2014 was 48% higher than the previous year.

Multiple access devices and touch points have given hackers more options for entering corporate networks, without being easily detected. Therefore, the traditional models of security management are proving insufficient.  There is a need to adopt a new approach to managing security - one that is more proactive, sensitive and context-based. A recent Gartner report points out that increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies. Going forward, enterprise security solutions will have to become context aware and adaptive. Security organizations and leaders that fail to alter strategies to accommodate a more consumerized workforce will soon be sidelined, predicts the report.

Read more ...

Are we ready to integrate IOT devices ? Security ?

The hack of Sony Pictures have raised many questions about securing our network and devices.

In a single week, hackers have brought a major Hollywood studio to its knees.

Sony Pictures is dealing with more than downed computers and frozen email. Movies have been leaked, and internal documents have exposed private company memos, along with employees' salaries, Social Security numbers and health information.


 We need to first work towards securing our existing infrastructure and data. If we are unable to do so, imagine what happens when we connect these embedded devices are connected to internet. IOT may be rapidly flourishing into our everyday life, whether in cars, power utility, farm etc, but if we do not build these devices with security in mind, it may cause far larger disaster. not only in monetary terms, but in human lives too.