Access "Future"
This article is part of the December 2007/January 2008 issue of Reflections on the impact of Sarbanes-Oxley
The View from Visionaries compiled by Marcia Savage In 10 years, information security as we know it may not exist. Rather than a separate product, it may simply be embedded into everything. Or Web services may upend traditional enterprise security. We asked some of the best and brightest minds in the business what they see ahead and the answers were far ranging: everything from from attacks masked heavily with encryption to zombification of corporate networks. Some predict radical changes while others foresee more of the same. Read on for a peek into what the future may hold. 1 Whitfield Diffie Vice president, Sun fellow and chief security officer, Sun Microsystems Today, when we say that a company is doing its computing securely, we usually mean that it is doing the computing on its own computers and that it has taken whatever means are appropriate to protect those computations. In 10 years, no major business computation will be secure in this sense. Today, every developer, manager and marketer uses Google a dozen times a day. In 10 years there will be ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Blow Out the Candles
Information Security magazine turns 10 years old, maturing right alongside the security industry.
-
Milestones
Getting the Point | Turning Points | Nefarious Numbers | SOX Appeal | Evolution of a Hacker | Digital Pickpockets | The Toughest Battle: 10 Years, 10 Attacks | We Hardly Knew Ye
-
Reflections
A Dynamic Decade | News of the Day | Trustworthy Finally? | Crystal Ball
-
Blow Out the Candles
-
Columns
-
Ping: Fyodor
Fyodor
-
Editor's Desk: Risk is the new black
A New Direction for Risk?
-
Ping: Fyodor
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO