Mind the (security) gap

Photo: IDC Security Roadshow in Istanbul /2016


 

Executing a cyber-attack gets easier every day

2016-02-15 15-31-20 Ekran görüntüsü

Levent
By Laurens Bammers*

The IT industry is already familiar with the most effective ways of security. Yet methods like these leave gaps in between. At the the International Data Corporation (IDC) IT Security Roadshow IT Security Roadshow, experts proposed several ideas for optimal security to corporate IT leaders.

Good news for companies with big data sets. The best ways to protect data from outsiders has already been developed decades ago. At least according to Brendan Rizzo, technical director with Hewlett-Packard, who spoke at the International Data Corporation (IDC) IT Security Roadshow in Istanbul the 16th of February.

Rizzo emphasised the importance of simple but effective encryption methods like AES and SSL. ‘The problem however’, he said, ‘is that these methods have gaps between them.’ Users send their data from their computer or mobile devices to a database. The information then gets encrypted on the server, so it is seemingly safe. The ‘gaps’ Rizzo talks about are between the server and your device.

Rizzo proposes ‘data-centric security’. Instead of only securing servers and databases with encryption or other methods, it would be best to encrypt the data straight on the device. This way, only your devices will be able to read the data. So your information is safe not only from hackers, but also from curious employers at your provider.

The Good, the Bad and the Ugly

Andrea Rossi, worldwide sales leader at IBM said something similar: ‘The fight against hackers is not a matter of good guys versus bad guys, because there are a lot of “bad” guys inside the companies. (…) Many employees often have unnecessary access to different kinds of data.’

The most common strategy for companies is to provide different security for every segment of their network, like their databases, cloud apps and so on. Rossi proposes a way to put one big layer over the entire network in which can be decided which user within the company can have access to what.

Cyber-attacks are a lot more common in Turkey than in the rest of the world. According to Today’s Zaman, in the second quarter of 2014 there was an increase of 6 percent in Turkey while the global average dropped by 68 percent.


Laurens Bammens, PXL Journalism student and he is Dağ Medya Intern during the 15 February – 3 June 2016

Yorumlar

yorumlar

Yazar Hakkında

Benzer yazılar

Yanıt verin.

E-posta hesabınız yayımlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.