This article is part of the December 2007/January 2008 issue of Reflections on the impact of Sarbanes-Oxley
The View from Visionaries compiled by Marcia Savage In 10 years, information security as we know it may not exist. Rather than a separate product, it may simply be embedded into everything. Or Web services may upend traditional enterprise security. We asked some of the best and brightest minds in the business what they see ahead and the answers were far ranging: everything from from attacks masked heavily with encryption to zombification of corporate networks. Some predict radical changes while others foresee more of the same. Read on for a peek into what the future may hold. 1 Whitfield Diffie Vice president, Sun fellow and chief security officer, Sun Microsystems Today, when we say that a company is doing its computing securely, we usually mean that it is doing the computing on its own computers and that it has taken whatever means are appropriate to protect those computations. In 10 years, no major business computation will be secure in this sense. Today, every developer, manager and marketer uses Google a dozen times a day. In 10 years there will be ... Access >>>
Premium Content for Free.
Blow Out the Candles
Information Security magazine turns 10 years old, maturing right alongside the security industry.
Getting the Point | Turning Points | Nefarious Numbers | SOX Appeal | Evolution of a Hacker | Digital Pickpockets | The Toughest Battle: 10 Years, 10 Attacks | We Hardly Knew Ye
A Dynamic Decade | News of the Day | Trustworthy Finally? | Crystal Ball
- Blow Out the Candles
The View from Visionaries | Taking the Services-on-Demand Plunge | Warning Signs | Web of Worry | Attack Toolkits | VoIP Vulnerable
How Sarbanes-Oxley changed the information security profession
Sarbanes-Oxley empowered information security professionals with the clout they'd sought for so long.
More Premium Content Accessible For Free
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...