The most accurate predictive letter in computing and telecommunications,
'This was my first time at FiRe, and I think it's one of the best conferences I've ever been to.' – Gregory McRae, Executive Director, Morgan Stanley
'What [FiRe] means to me most is really smart people, getting together and changing the world --- Best conference yet: good attendance, focused themes --- Great job!' – Michael Pfeffer, Managing Partner, Kolohala Ventures
Sign up now for FiRe 2012: www.futureinreview.com
Publisher's Note: About five years ago, Ray Ozzie, then newly anointed chief software architect at Microsoft, described the world he saw, from a security perspective, and the vision was daunting. He maintained then, and it surely is true today, that the primary challenge for the enterprise operating system would be to allow trusted computing for a new 'universe of devices.'
Today that challenge, often referred to as the 'consumerization' of enterprise IT tools, represents the greatest security risk chief information officers must face. Do you allow any Android (or, for that matter, Windows) phone onto your network just because Bob or Jill brought it to work?
The first answer is No. Android hacks are already legion, and the efforts have just begun. Not that anyone else in the business – perhaps outside of BlackBerry – has really locked down their phones.
In this week's special issue, Wave Systems' CEO Steven Sprague explains a simple, pervasive, low-cost, and effective solution to at least providing security down to the device – the solution most needed by CIOs yesterday – and then down to the user, as well. Why this has not been implemented yet is a separate question, but I will suggest that this technology (or one just like it) will be in full force within five years for securing all of our devices. – mra.