Page 3 - Cyber Warnings
P. 3
What’s Next? Find Out This Month at RSA Conference 2016
Friends,
What a great time to be talking about HTTP/2, Internet of Things, etc.
It’s all really about what’s next? What is right around the horizon for
advancements in consumer electronics, mobile technology, cloud,
voip, virtualization and the list goes on. All of these things have one
thing in common – everything is becoming an internet device. With
that exciting door being opened to our watches, our television sets,
our refrigerators even our home alarm and baby monitor comes an amazing amount of risk.
I know we’ll find some amazing INFOSEC advancements this month at RSA Conference 2016.
We’ll see cloud security, virtualization security, next generation antivirus, more advanced UTM
firewalls. We’ll see new token systems and better encryption. We’ll see malware analyzers and
scrubbers. There are going to be a plethora of new and innovative products to consider. New
cloud-based security offerings and endpoint security tools to review. We’ll see so much in the
way of next gen INFOSEC, I would only hope that we could start to get one step ahead of the
next threat. This edition of Cyber Warnings covers many excellent topics to get you in the mood
for RSA. But one of the most difficult areas for us to discuss, is government security and
encryption. We now sit on a precipice where we see a battle raging between well-meaning
privacy groups, Apple and the FBI, along with those who support enhanced policing and even
strong encryption laws (that weaken encryption). When the US Government suffers breach
after breach, I don’t think a single advanced INFOSEC tool or technique discussed at RSA will
help them solve this problem until they embrace encryption – that means STRONG
ENCRYPTION not strong encryption laws.
Look at the OPM.gov breach – the office of personnel management, who just had their CIO quit,
because of a breach of 22,000,000 records, most likely by the Chinese government. Why
weren’t those records encrypted? Doesn’t the US Government realize that Encryption is also
like strong borders – between data privacy, data safety and the lack thereof. If you are heading
to RSA Conference 2016, I’m sure you’ll hear much more about PHISHING ATTACKS having
become the #1 form of exploitation. You’ll also hear much about the raging debate between
Apple putting a backdoor in their operating system for the FBI or fighting tooth and nail not to do
so – in the name of privacy and security. Think about what Apple has invested in Apple Pay
and you’ll understand completely why they want these smartphones – which will become the
heart of the flow of m-commerce, being secure and one step ahead of the next threat.
To our faithful readers, Enjoy
Pierluigi Paganini
Pierluigi Paganini, Editor-in-Chief, [email protected]
3 Cyber Warnings E-Magazine – March 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide