Access "Future"
This article is part of the December 2007/January 2008 issue of Reflections on the impact of Sarbanes-Oxley
The View from Visionaries compiled by Marcia Savage In 10 years, information security as we know it may not exist. Rather than a separate product, it may simply be embedded into everything. Or Web services may upend traditional enterprise security. We asked some of the best and brightest minds in the business what they see ahead and the answers were far ranging: everything from from attacks masked heavily with encryption to zombification of corporate networks. Some predict radical changes while others foresee more of the same. Read on for a peek into what the future may hold. 1 Whitfield Diffie Vice president, Sun fellow and chief security officer, Sun Microsystems Today, when we say that a company is doing its computing securely, we usually mean that it is doing the computing on its own computers and that it has taken whatever means are appropriate to protect those computations. In 10 years, no major business computation will be secure in this sense. Today, every developer, manager and marketer uses Google a dozen times a day. In 10 years there will be ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Blow Out the Candles
Information Security magazine turns 10 years old, maturing right alongside the security industry.
-
Milestones
Getting the Point | Turning Points | Nefarious Numbers | SOX Appeal | Evolution of a Hacker | Digital Pickpockets | The Toughest Battle: 10 Years, 10 Attacks | We Hardly Knew Ye
-
Reflections
A Dynamic Decade | News of the Day | Trustworthy Finally? | Crystal Ball
-
Blow Out the Candles
-
Columns
-
Ping: Fyodor
Fyodor
-
Editor's Desk: Risk is the new black
A New Direction for Risk?
-
Ping: Fyodor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO