Feeds

Immature tech likely to get lucky in credit crunch

Security pros: 'Uh oh'

Providing a secure and efficient Helpdesk

The credit crunch is likely to produce changes in IT spending priorities that may create additional security risks.

Tim Mather, RSA Conference chief strategist, said technologies such as open source, virtualisation, inter-organisation VoIP and cloud computing will gain traction as organisations look to rein in spending. How to properly secure virtual environments, for example, remains ill-defined, but firms are pushing ahead anyway and remain more occupied by other concerns.

Ben Jun, VP of technology at Cryptography Research, said organisations rolling out virtualisation as a way to consolidate systems and reduce costs are more concerned about whether servers with Intel chips can coexist with systems running AMD in the same environment.

Along with the introduction of new technologies and tightening purse strings, IT departments are likely to face the demands of tighter regulation in the wake of the global banking crisis.

Mather argued that the financial meltdown of banks might be partly blamed on a failure of compliance systems and of information security professionals to maintain systems that preserve data integrity. IT security has aligned itself with risk management over recent years, which means IT pros ought to take a good look and ask themselves if there are any lessons to be learned.

"Information security has tied itself so closely to risk management so it would be remiss if we didn't look at what went wrong and whether we are part of the problem," Mather said, adding that this process would occur on a company by company basis rather than taking the form of a wider post-mortem.

Mather and Jun made their comments at a global advisory press briefing at the RSA Conference in London on Monday. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.