Pages

Monday, August 7, 2017

How do we stop poking holes in our security!

Emerging technologies are poking holes in security
·      Emerging technologies such as DevOps, IoT, automation/intelligent software, information technology service partnering, cloud computing and BYOD.
·      DevOps merges software development and operations in order to speedy deployment of software that immediately works in production. While this is great for usability, change management and security take a hit from adopting DevOps.
Probable Root Cause:                 
·      The pressing need to get IoT devices and related technological changes ready for market stands in sharp contrast to security.
·      Automation affects change management and security because there may not be an understanding of how to support the new information security requirements of automation as change occurs.
Probable Recommendations                
·      Developers must use trusted tools from trusted sources inside those sandboxes so that attacks don’t enter through holes created by cloned tools that hackers have purposely packed with vulnerabilities and malware.
·      For IoT, the enterprise needs to restructure information technology to monitor, track and support new apps and devices through investment in security governance, protocols, standards and procedures.
Also Visit:
-->

No comments:

Post a Comment