Published works

WITH MONEY-DRIVEN CYBER ATTACKS End-to-end IT security is vital to firms

Posted on: April 11, 2009

WITH MONEY-DRIVEN CYBER ATTACKS
End-to-end IT security is vital to firms

By Anna Valmero
INQUIRER.net
First Posted 15:20:00 04/10/2009

Filed Under: Security (general), Internet, Computing & Information Technology

MANILA, Philippines—Security in information technology is important in times of financial crisis when financially-driven cyber attacks increasingly threaten critical data transactions across industries, said an IT executive recently.

“Technology has made business global in orientation and enabled transactions to take place from the physical to the Internet, facilitating faster business processes across borders,” said Marne Gordan, GRC market manager for IBM’s Tivoli Software division.

This shift has opened up companies to risks in cyberspace such as identity theft, phishing, pharming, and incidents of fraud. Common targets of cyber attacks are financial and banking institutions.

Such require that companies adopt an end-to-end approach to security—for people identity, information, applications and process, network and server endpoints, and the company’s physical infrastructure, she said.

But there are other trends in the picture: emerging technologies such as virtualization and cloud computing, explosion of multiple digital identities, and proliferation of mobile devices such as PDAs and mobile phones as access points to the Internet, said Rodney Regalado, country manager for Global Technology Services.

To secure massive and dynamic resource sharing with virtualized and cloud computing, firms must have a highly dynamic IT environment with combined server and network protection to respond securely and efficiently to demands, said Gordan.

To develop trusted multipurpose identities, a user identity can evolve from specialized to attribute-based authentication identity that can be shared in emerging platforms such as mobile devices.

Based on the IBM report “Security Technology Outlook,” 54 percent of all vulnerabilities disclosed in the first half of 2008 were web-based and 75 percent of attacks are focused on applications. This requires that firms deploy an integrated security throughout the application life cycle from development, deployment, and operations.

IT and physical security are converging together thus requiring sense-and-respond mechanism to real world events, said Gordan.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Timeline

April 2009
M T W T F S S
« Mar   May »
 12345
6789101112
13141516171819
20212223242526
27282930  

Pages

Anna Valmero Tweets

Error: Twitter did not respond. Please wait a few minutes and refresh this page.

Top Clicks

  • None
%d bloggers like this: