Volume 17, Issue 29
Week of August 4, 2014
In This Issue
Feature: Special Letter Innovations In Cyber Security – An Emerging New Paradigm
- Cyber Plunder in Perspective
- A Cat and Mouse Game
- Protecting the Crown Jewels
- A New Paradigm
- Pursuing Opportunities
- About Steven R. Russo
Publisher’s Note: There are two chilling trends in Internet security that were underlined this week with the announcement by Hold Security of a Russian crime ring taking around 1.2 billion user names and password combinations from perhaps 420,000 different hacked websites.
The first is a ramping of theft success on all scores, from personal IDs to nations stealing crown jewel intellectual property, which simply can no longer be tolerated if innovation and commerce are to continue.
The second is a massive movement to cloud computing, driven by financial requirements rather than security requirements, at a time when our internal sources indicate that clouds have already been hacked. Now, hold those two thoughts —
A few years ago, I was seated next to a top Microsoft engineer, just before he became CTO of one of the largest online firms in the world. As we talked, I laid out a potential new way of securing data, and made him swear he wouldn’t take it back to Redmond for copying.
In today’s issue, you will see that idea (and more) applied to cloud security and data protection. To my mind, getting this project done is of the same priority as replacing firewalls and virus lists with heuristic tools for monitoring network penetrations, and convincing CEOs to wake up and take serious action on security (since today their “in-denial” approach is killing their companies).
The suggestion made here – that there really is a solution set that works for clouds – is coming none too soon. I hope every member will read on, and, if involved in this effort, take a close look at this great approach. – mra.