Feeds

Immature tech likely to get lucky in credit crunch

Security pros: 'Uh oh'

SANS - Survey on application security programs

The credit crunch is likely to produce changes in IT spending priorities that may create additional security risks.

Tim Mather, RSA Conference chief strategist, said technologies such as open source, virtualisation, inter-organisation VoIP and cloud computing will gain traction as organisations look to rein in spending. How to properly secure virtual environments, for example, remains ill-defined, but firms are pushing ahead anyway and remain more occupied by other concerns.

Ben Jun, VP of technology at Cryptography Research, said organisations rolling out virtualisation as a way to consolidate systems and reduce costs are more concerned about whether servers with Intel chips can coexist with systems running AMD in the same environment.

Along with the introduction of new technologies and tightening purse strings, IT departments are likely to face the demands of tighter regulation in the wake of the global banking crisis.

Mather argued that the financial meltdown of banks might be partly blamed on a failure of compliance systems and of information security professionals to maintain systems that preserve data integrity. IT security has aligned itself with risk management over recent years, which means IT pros ought to take a good look and ask themselves if there are any lessons to be learned.

"Information security has tied itself so closely to risk management so it would be remiss if we didn't look at what went wrong and whether we are part of the problem," Mather said, adding that this process would occur on a company by company basis rather than taking the form of a wider post-mortem.

Mather and Jun made their comments at a global advisory press briefing at the RSA Conference in London on Monday. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.