Travelling at the Speed of IT Security

[vc_row][vc_column][vc_column_text]Einstein, move over. There is a new universal constant now, one that governs all IT-driven activity, which by now is almost everything that goes on in the known world[/vc_column_text][vc_single_image image=”4981″ img_size=”full” alignment=”center” image_hovers=”false” lazy_loading=”true”][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]Forget about light and photons. We’re talking about the concept that no data travels faster than the speed of IT security.

Or perhaps that IT security can be made to keep up with the ever-increasing speed of information, which would certainly give it the drop on light. So, what is this new metaphysical marvel and how does it work?

The big change in IT security currently is the move from a boundary-oriented model to a boundary-less model.

Data no longer resides obediently within the corporate perimeter. Today, it’s out there in the cloud, on employees’ mobile devices, and travelling the worldwide web.

Another way to look at it is to say that the corporate perimeter has now expanded to include the entire planet, and that its perimeter also overlaps which countless others for the same reason.

As a result, classical corporate firewall solutions are no longer enough – they are akin to shutting the data storage door after the horse has bolted.

The new thinking is that now IT security must travel with the data it is supposed to protect. Integrating security into applications from the start (and testing it along with the code in general) is a first step.

Encryption of data in transit, at rest, and in use (inside applications) is a next step. Rapid binary analysis of applications without needing to see the source code is yet another step, allowing third party applications to be vetted as they are downloaded.

All of this means new models and new operational methods, in short, new ways of thinking. But then to paraphrase Einstein, the boundary-oriented thinking that caused today’s IT security problems would have been unlikely to provide the solution.[/vc_column_text][/vc_column][/vc_row]