Does Father Christmas know just how exposed his operation is? With one of the largest address books ever conceived (names, addresses, gift preferences of billions of people) and a seasonal workforce of elves that may or may not have been vetted before hiring, Santa’s gift selection, preparation and delivery system may be hugely at risk.
First, there was the virtual machine. Then came the container. Now, welcome to the unikernel, the latest initiative for atomising computing.
Will it ever go away? The basic password is still alive and well.
It’s not paranoia, they really are out to get you. When the very organisations promoting IT security manage to botch it up, it’s difficult to have confidence in anything anymore.
People – “Can’t live with them, can’t live without them” might be the motto for many enterprises and their chief information security officers (CISOs).
Hollywood (once again) got there first. Remember those films in which shadowy figures hiss “Trust no-one!” before vanishing from the scene?
If you’ve worked in IT development for hardware or software, or had dealings with that world, you may well have seen the statistics about the costs of fixing bugs.
It almost seems that there are as many definitions of the “blended attack” in IT security, as there are experts willing to give them.
Once upon a time, IT security was all about building the highest wall possible to keep attackers out and corporate users and systems safe.
Back in 2004 at the RSA Security Conference, Bill Gates was campaigning for the replacement of the password by two-factor authentication or some other secure mechanism.