11:41 AM
Connect Directly

Forget Security 3.0. What Will Security 4.0 Look Like?

Believe it or not, people already are starting to ask this question as it becomes painfully obvious that today's teens, whose dexterous thumbs have grown up tapping away on cell phone keypads as they check out the latest action on MySpace or YouTube, will be part of the workforce before you know it.

Believe it or not, people already are starting to ask this question as it becomes painfully obvious that today's teens, whose dexterous thumbs have grown up tapping away on cell phone keypads as they check out the latest action on MySpace or YouTube, will be part of the workforce before you know it.What happened to Security 3.0? We're right in the middle of it, Gartner VP and analyst John Pescatore told attendees at Gartner's IT Security Summit in Washington, D.C., on Monday. If you consider Security 1.0 began back in the heyday of mainframes and Security 2.0 launched with the dawn of client-server and networked computing, then Security 3.0, to use a hockey metaphor, means "skating ahead of the puck," or, to use a hunting metaphor, "shooting ahead of the duck," in terms of thinking about where security needs will arise. (Incidentally, Pescatore's next presentation will be titled "Fun With Metaphors." Or so I heard.)

If security executives are tossing and turning at night thinking about organized crime on the other side of the globe launching a cyberattack that will steal customer data and shut down their networks, or if they're breaking into a cold sweat at the thought of disgruntled employees raiding their databases or planting logic bombs, think of what could happen once workers find meaningful ways to regularly use MySpace, Facebook, and other Web 2.0 sites as part of their jobs.

Pescatore likened today's approach to security as the game of "Whack a Mole" (a problem pops up, security pros hammer it down) when it should be more like chess, where the white pieces, or "good guys," go first. In chess, the strategy is forcing your opponent into places on the board where you're stronger, Pescatore said. (Again with the metaphors.)

What will Security 4.0 look like five years down the road? With globalization growing and grid computing expanding, companies won't even own a lot of their IT infrastructure, and they'll buy their IT resources from the provider offering the lowest cost, Pescatore said. "They'll be trying to spend the least amount of money while trying to be secure," he added. "At the same time, MySpace and Facebook users will be entering the workforce."

Of course, today's workforce is no stranger to the concept of figuring out some way to use the latest gadgets at work. As Microsoft continues to develop its Smartphone operating system and software, such as Pocket Outlook, and when Apple's iPhone hits store shelves, "you know you'll want to use it," Pescatore said. "I'll go to the Pentagon next year (to do consulting work), and some general will have one and want his staff to have them."

Are you ready to secure your IT systems in such a way that lets your colleagues make use of this gadgetry to your company's advantage? "Consumerization of IT -- and that includes Web 2.0 and people working from home -- is the biggest security issue for companies," Pescatore said. "Our information is flowing to god-knows-what devices" that users have.

How will companies deal with Security 4.0? Pescatore had this idea: "This means companies will be looking at which mobile security providers have the best in-the-cloud service," in order to keep up with securing expanded network use. Indeed, AT&T, Verizon, and others already are beginning to expand their managed security services.

It's a compelling idea, but not foolproof. In the end, it will still come down to end users and their commitment to "safe" computing that doesn't put their employer's systems and data in jeopardy. That's right, the kid sitting across from you on the train, iPod ear buds jammed in his ears, thumbs racing across his Sidekick, may someday be sitting in the next cubicle. Even scarier, he may someday be destined for the corner office.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio