This article is part of the December 2007/January 2008 issue of Reflections on the impact of Sarbanes-Oxley
The View from Visionaries compiled by Marcia Savage In 10 years, information security as we know it may not exist. Rather than a separate product, it may simply be embedded into everything. Or Web services may upend traditional enterprise security. We asked some of the best and brightest minds in the business what they see ahead and the answers were far ranging: everything from from attacks masked heavily with encryption to zombification of corporate networks. Some predict radical changes while others foresee more of the same. Read on for a peek into what the future may hold. 1 Whitfield Diffie Vice president, Sun fellow and chief security officer, Sun Microsystems Today, when we say that a company is doing its computing securely, we usually mean that it is doing the computing on its own computers and that it has taken whatever means are appropriate to protect those computations. In 10 years, no major business computation will be secure in this sense. Today, every developer, manager and marketer uses Google a dozen times a day. In 10 years there will be ... Access >>>
Premium Content for Free.
Blow Out the Candles
Information Security magazine turns 10 years old, maturing right alongside the security industry.
Getting the Point | Turning Points | Nefarious Numbers | SOX Appeal | Evolution of a Hacker | Digital Pickpockets | The Toughest Battle: 10 Years, 10 Attacks | We Hardly Knew Ye
A Dynamic Decade | News of the Day | Trustworthy Finally? | Crystal Ball
- Blow Out the Candles
The View from Visionaries | Taking the Services-on-Demand Plunge | Warning Signs | Web of Worry | Attack Toolkits | VoIP Vulnerable
How Sarbanes-Oxley changed the information security profession
Sarbanes-Oxley empowered information security professionals with the clout they'd sought for so long.
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...