SNS: Special Letter: Innovations in Cyber Security - An Emerging New Paradigm

 

Global Report on

Technology and the Economy

 

19 Years Providing Weekly Foresight

 

The most accurate predictive report on technology and the global economy,

read by leaders in industry, finance, and government worldwide.

 

 SNS Subscriber Edition Volume 17, Issue 29 Week of August 4, 2014 

 

 

 

***SNS***

Special Letter:

Innovations in Cyber Security

- An Emerging New Paradigm

 

  

 

In This Issue

 

 

Feature:

Special Letter

Innovations in Cyber Security - An Emerging

New Paradigm

Cyber Plunder in Perspective

A Cat and Mouse Game

Protecting the Crown Jewels

A New Paradigm

Pursuing Opportunities

About Steven R. Russo

 

Upcoming SNS Events
& Media Links

 

In Other House News...

How to Subscribe

May I Share This Newsletter?

About SNS

About the Publisher

Where's Mark?

 

[Please open the attached .pdf for best viewing.]

 

 

Publisher's Note:

 

There are two chilling trends in Internet security that were underlined this week with the announcement by Hold Security of a Russian crime ring taking around 1.2 billion user names and password combinations from perhaps 420,000 different hacked websites.

 

The first is a ramping of theft success on all scores, from personal IDs to nations stealing crown jewel intellectual property, which simply can no longer be tolerated if innovation and commerce are to continue.

 

The second is a massive movement to cloud computing, driven by financial requirements rather than security requirements, at a time when our internal sources indicate that clouds have already been hacked. Now, hold those two thoughts ---

 

A few years ago, I was seated next to a top Microsoft engineer, just before he became CTO of one of the largest online firms in the world. As we talked, I laid out a potential new way of securing data, and made him swear he wouldn't take it back to Redmond for copying. 

 

In today's issue, you will see that idea (and more) applied to cloud security and data protection. To my mind, getting this project done is of the same priority as replacing firewalls and virus lists with heuristic tools for monitoring network penetrations, and convincing CEOs to wake up and take serious action on security (since today their "in-denial" approach is killing their companies).

 

The suggestion made here - that there really is a solution set that works for clouds - is coming none too soon. I hope every member will read on, and, if involved in this effort, take a close look at this great approach. - mra.