Featured Article: Security Trends
As defined by Gartner in a Business Solutions article, some of the top trends for IT Security in 2014 include: Cloud Access Security Brokers, Adaptive Access Control, Pervasive Sandboxing and IOC Confirmation, Big Data Security Analytics, Containment and Isolation, Software-Defined Security, Interactive Application Security Testing and Secure Gateways. All of these trends touch on different areas of IT Security as the realm of security has evolved within the last months, weeks and even hours.
An adaptive access control trend employers have tried is to allow the “Bring Your Own Technology/Device” allowing employees to bring their own mobile device including phone, laptop and tablet to the office to perform work accessing privileged company information and applications. With this new trend comes more security concerns that can be addressed with other trends and ideas on Big Data Security Analytics and Purvasive Sandboxing to catch these new threats right when they happen and prevent them in the future. For an interesting take on what IBM does with Big Data to protect against multiple attacks see this article,IBM Security Intelligence With Big Data.
Recently in the news Heartbleed, a security bug in the OpenSSL cryptography library has caused a lot of damage.New reports are showing that additional vulnerabilities have begun to surface and there might be even more. According to TechRepublic’s contributor Frank Ohlhorst these new vulnerabilities might be serious for some and a toothless threat for others.For more information, see the full article here. Also in the news, the United States of America Senate Homeland Security and Governmental Affairs Committee passed a reformed Federal Information Security Management Act (FISMA) which is waiting on Senate approval. This Act was first introduced in 2002 to create a set of guidelines and requirements agencies must meet, and these organizations access their progress annually to track the effectiveness of their security measures.
More than just protecting your company and website, how much thought have you given to protecting your personal phone? Similar with the Bring Your Own Technology/Device trend you might want to start adding protection to your mobile SIM card. In this article,Protect Your Android SIM card with SIM Pin lock, Jack Wallen touches on the password you might have protects against personal datanotyour phone number, data plan, billing information and other private data! The article goes on to give instructions on how you can set up your SIM Pin lock and start protecting your personal data.
With all of the new threats each day, how do you make the most of your IT budget? See this article,SMB Penny Stretching 101: Making the most of your security budget, from TechRepublic on their suggestions for helping you prioritize and stretch your IT budget. Their top suggestion is to utulize the SANS Top 20 critical controls as SANS has already identified a list of foundational security controls to consider and how you can implement them.
To share your thoughts on these IT Security trends and new items please go to the IT Security Forums in the Members Only section of the AITP website.
Back to Top