Feeds

Immature tech likely to get lucky in credit crunch

Security pros: 'Uh oh'

Protecting against web application threats using SSL

The credit crunch is likely to produce changes in IT spending priorities that may create additional security risks.

Tim Mather, RSA Conference chief strategist, said technologies such as open source, virtualisation, inter-organisation VoIP and cloud computing will gain traction as organisations look to rein in spending. How to properly secure virtual environments, for example, remains ill-defined, but firms are pushing ahead anyway and remain more occupied by other concerns.

Ben Jun, VP of technology at Cryptography Research, said organisations rolling out virtualisation as a way to consolidate systems and reduce costs are more concerned about whether servers with Intel chips can coexist with systems running AMD in the same environment.

Along with the introduction of new technologies and tightening purse strings, IT departments are likely to face the demands of tighter regulation in the wake of the global banking crisis.

Mather argued that the financial meltdown of banks might be partly blamed on a failure of compliance systems and of information security professionals to maintain systems that preserve data integrity. IT security has aligned itself with risk management over recent years, which means IT pros ought to take a good look and ask themselves if there are any lessons to be learned.

"Information security has tied itself so closely to risk management so it would be remiss if we didn't look at what went wrong and whether we are part of the problem," Mather said, adding that this process would occur on a company by company basis rather than taking the form of a wider post-mortem.

Mather and Jun made their comments at a global advisory press briefing at the RSA Conference in London on Monday. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.