For this week’s In the News, research an article how an organization has improved their productivity, efficiency, or quality of their key business services by adopting one of the New Trends in Information Security.
Reader Interactions
Comments
Leave a Reply
You must be logged in to post a comment.
Former Microsoft executive Ray Ozzie raised $22 Million for his new IoT startup Blues Wireless. His goal is to make everything online without the need to be connected to a WiFI network. These devices range from HVAC systems to propane gas tanks to refrigerators. Ozzie had the idea when helping during the Fukushima disaster of 2011. He was trying to get solar-powered cellular environment devices installed, but had issues with the implementation. Blues Wireless will charge only for the device itself, at $49, and there will be no monthly fees to use their service afterwards. Having IoT devices that can connect to cellular networks is a good idea in relation to first responder and emergency personnel’s technology, but the need to have everything online all the time doesn’t seem to be necessary, especially with home appliances. These devices could collect data on the subscribers using them, which makes them a target for exploitation by nefarious individuals. I hope that IoT devices become more secure as the technology evolves and more people and organizations adopt them.
https://www.geekwire.com/2021/ray-ozzies-telecom-startup-blues-wireless-raises-22m-bill-gates-others/
Hi Krish!
That’s a cool article! It seems that Blues Wireless may be the next big thing and we will have to keep an eye out for it!
Great post Krish,
IoT devices today are incorporating security in their appliances because some are now programmable to interact with users. Am more interested to see how they will manage the security aspect of it, because advanced gadgets like computers and cellphones that are conscious of security are being hacked with ease.
The gathering of data by these IoT devices is astounding. What’s worse is that these devices lack the right levels of security to really protect your information. I have learned to segregate my networks at home. Different ISPs for my work, personal and public uses. All my IoT devices (and we have at least 20) link of to a guest network, my personal devices (cell phones, laptops, ipads) link to my private network and my work devices link up to a work network. Not only am I limiting network traffic within my own home but also not allowing external traffic into my domains. Paranoid much? 🙂
Segregating the network is a great idea. I think that most people at home get excited about new, exciting technology and security doesn’t even cross their minds. Many home users who do pause to think about security think that they’re “small fish” and therefore have nothing to worry about.
Not exactly in the news, but I really liked the topic and how it has benefited my group personally. In the past year and a half my team has completely adopted the devops into our code development / code deployment modules. Taking this on was a real headache in the beginning building all the new systems from scratch, but once we had everything implemented we have seen a good decrease in potential network / app issues on our systems. Our code pushes after hours no take less time and work for us, we do everything in our dev environments, check to make sure everything is good to go and just push the changes to prod. In addition to the other benefits, we have seen much less issues arise from our security scans we normally have ran against our systems with these new models. Overall it has been great adoption by our group!
https://aws.amazon.com/devops/what-is-devops/
https://about.gitlab.com/
https://www.ibm.com/cloud/kubernetes-service/kubernetes-tutorials?p1=Search&p4=43700057365943513&p5=e&gclid=CjwKCAjwlrqHBhByEiwAnLmYUItHEil-rrWVn63QriqsuN9TAln1H168SjwXBn8o8ICXYI7VqOJADxoC4KAQAvD_BwE&gclsrc=aw.ds
https://www.docker.com/
Hi Gino!
Thanks for the real world scenario! I just got done watching a beginners video on Kubernetes. I need to learn more about containerization. I am not familiar with it at all.
Thanks for sharing Eugene,
Quick question, what is the approval process(change management) process of pushing code to the production environment if you don’t mind sharing?
Security begins in development for sure! We too are in the process of implementing this kind of technology at my office. We just had a tech talk on the topic of github and kubernetes! Excellent articles.
REducing the redundancy of work and being able to leave the human factor aside and implementing some automation tools is the way of the future. It’s a great value add even if the upfront setup takes times and effort.
Vanessa
It’s great to see a real-world example of this! That initial difficulty of implementing DevOps is probably what causes many companies to hesitate in adopting it but it sounds like the payoff is well worth it.
The Securonix Approach to Security Monitoring for Healthcare Cybersecurity:
Securonix comes with out of the box integrations with EMR applications, security and network devices, and identity stores. This allows you to collect and enrich healthcare security events with rich contextual information in order to produce meaningful insights. Employee information is enriched with identity context such as manager, department, and division. Securonix also enriches patient information with identity context such as patient name, type, and classification (for example: if they are a VIP patient).
Enriched events are analyzed using machine learning algorithms to baseline normal trends and identify anomalous behavior. Securonix then combines related anomalies into threat chains in order to prioritize the highest risk events.
Securonix provides the ability to search, investigate, and respond to threats, all from a single pane of glass. The solution provides out of the box and ad-hoc reporting capabilities to meet the reporting and compliance needs for HIPAA, HITRUST, GDPR, and other industry regulations.
Securonix is HITRUST CSF certified. HITRUST CSF is the industry-wide standard required by healthcare providers and insurance plans. This achievement puts Securonix at the forefront of compliance for a SIEM solution that is cloud based, healthcare ready, and available as a service.
https://www.securonix.com/solutions/securonix-for-healthcare/
Hi Jerry,
Wonderful article! The upcoming trends in cybersecurity are the integration of AI and automation in normal processes. Also, the next upcoming thing would be the integration of the different cyber kill chains. This is the change in the posture of US cyber capabilities from defensive to defensive offense.
Amazon Provides Key tools in the cloud for designing Formula !’s race car of the future.
This has been a fascinating article, even though this product has benefited other industries contrary to being used by itself. AWS figured in the process using Computational Fluid Dynamics and thousands of computing cores to run simulations over 550 million data points. These data points modeled the impact of one car’s aerodynamics wake on another, and by using AWS, F1 cut the average time to run simulations by 80%- from 60 hours to 12 hours. F1 moved from an on-premises environment, using CFD and wind-tunnel testing, over to AWS’ Elastic Compute Cloud to run complex simulations that visualized wake turbulence on cars. Teams will use the cars for the 2022 season.
Reference
Schlosser. K. (2021). Amazon provides key tools in the cloud for designing Formula 1’s race car of the future. Retrieved from https://www.geekwire.com/2021/amazon-provides-key-tools-cloud-designing-formula-1s-race-car-future/
https://www.ledgerinsights.com/blockchain-used-for-traceability-of-mica-used-in-makeup/
This is a cool article about the latest trend — blockchain. Here it is being used to “enhance the traceability of mica, a mineral dust found in makeup products, insulation cables and cement.” Having visibility into this supply chain enhances the efforts to limit its use and also to trace the effects of it’s use in these products. Mica is a mineral that can cause sever health risks due to prolonged inhalation. This knowledge will also allow companies to “implement responsible work practices.” A shared database will contain the data processed in individual transactions but will remain confidential to all the sources that are accessing the data. Blockchain is a popular new tool that is being used to gather all kinds of transactional data yet maintain the security and confidentiality of the stakeholders.
The increase in regulations with regards to data privacy has forced more organizations to take a more serious approach to information security. Companies have begun to invest in data privacy automation software which makes their information security more effective and allows them to be more efficient. The initial cost may be high but the benefits (and now the need due to laws/regulations) seem to be worth it for a larger number of companies.
https://www.datamation.com/big-data/data-privacy-trends/