Instrumented Interconnecteds Intelligent
Smarter Security

Laurence Guihard-Joly, General Manager, IBM Business Continuity and Resilience Services

Laurence Guihard-Joly, General Manager, IBM Business Continuity and Resilience Services

By Laurence Guihard-Joly

Every company needs electricity, but that doesn’t require building a power plant. Many organizations have reached the same conclusion about computing and storage needs. Why build out data centers if it’s not your core business? Plus it can be a costly proposition.

That’s basically the premise of cloud computing – turn to trusted partners for your computing needs so you can focus on the business. But when deciding on a cloud strategy, organizations should be careful not to simply focus on saving money.

To be sure, moving to the cloud is economical and brings greater efficiencies, but it’s also an opportunity to reexamine everything from finance systems to enterprise resource planning and even the helpdesk. It can be a means of improving business efficiency over every operation that runs on software. Adding redundancy and automating backup are two functions most cloud providers offer, with more or less sophistication. A cloud strategy – public, hybrid, private – is also an excellent place to rethink security and continuity strategy and options across the board. Continue Reading »

Bookmark and Share

Theresa Payton, Founder, Fortalice, LLC; Author

Theresa Payton, Founder, Fortalice, LLC; Author

From 2006-2008, Theresa Payton served as the White House CIO for the Bush administration. In 2008 she founded Fortalice, a security consulting firm focused on fraud issues related to consumer protection. She spoke today at IBM’s Counter Fraud Summit in New York. A Smarter Planet caught up with her to get her perspectives.  Here’s a snapshot of that conversation.

Smarter Planet: What types of fraud do you believe businesses should brace themselves for in 2014 and beyond?
Theresa Payton: There are multiple types of fraud consistently reported by businesses around the globe. They include the back office type, such as asset misappropriation, accounting fraud and procurement fraud. There are also fraud and financial crimes related to money laundering, and false claims. And then there’s also cybercrime. With all the digital smokescreens now available, I believe you will see these types of fraud continue. But you will also see cybercrime as a percentage of overall fraud numbers climb as the entry point to fraudulent activity. Continue Reading »

Bookmark and Share

Robert Griffin, Vice President, Industry Solutions, IBM

Robert Griffin, Vice President, Counter Fraud Solutions, IBM

By Robert Griffin

“Fraud is a normal cost of doing business.”

Any organization that subscribes to this long-standing mantra needs to rethink their priorities. With 2.5 billion gigabytes of data created every day, fraud is taking on a new face in the Big Data world.

According to the Association of Certified Fraud Examiners (ACFE), organizations forfeit five percent of annual revenue to fraud, which by conservative estimates amounts to more than $3.5 trillion lost each year to global fraud and financial crimes. Fraudulent activity has grown in scope, volume and complexity, with the brash sophistication of recent attacks — and magnitude of damage, both to the brand and bottom line — elevating the anti-fraud conversation from acceptable loss to C-Suite imperative.

Today’s generation of organized and digitally-savvy criminals are using the same technologies that deliver efficiency to business and convenience to consumers — such as mobile devices, social networks and cloud platforms — to constantly probe for vulnerabilities and weaknesses. The pace of this threat continues to accelerate. Identity fraud impacted more than 12 million individuals in 2012, resulting in theft of nearly $21 billion, and each day the U.S. healthcare industry loses $650 million due to fraudulent claims and payments. Continue Reading »

Bookmark and Share

Nataraj Nagaratnam, Distinguished Engineer, CTO, IBM Security Solutions

Nataraj Nagaratnam, Distinguished Engineer, CTO, IBM Security Solutions

By Nataraj Nagaratnam

With IDC predicting that by 2017, the U.S. Federal Government will quadruple from $2 billion next year to nearly $9 billion in what it spends on cloud computing (mostly on private cloud), the topic of cloud security is going to quickly become the center of attention in Washington D.C.

Though the government has established some early security certifications like the Federal Information Security Management Act of 2002 (FISMA) and the Federal Risk and Authorization management Program (FedRAMP) to give agencies guidance on security, there will be a heightened need to go even further as agencies move mission critical workloads to the cloud. Continue Reading »

Bookmark and Share
November 12th, 2013
17:20
 

Chris Preimesberger, Features & Analysis Editor, eWEEK

Chris Preimesberger, Features & Analysis Editor, eWEEK

By Chris Preimesberger

The sheer numbers of digital devices, users and connections – combined with commensurate lack of understanding of digital security – has never presented a better opportunity or more fertile ground for the bad guys in computer hacking.

By 2017, there will be about 3.6 billion Internet users, almost half of what will be the projected worldwide population of 7.6 billion people that year. By comparison, there were 2.3 billion users in 2012, or about 32 percent of the world’s population, according to a recent industry report.

Also expected within the next few years is the management of more than 19 billion network connections – for both fixed and mobile devices – as well as M2M connections, up from about 12 billion in 2012. That’s an enormous amount of network activity which is certain to strain both IT and security providers. Continue Reading »

Bookmark and Share

SP FACT 2013By Keith Byrne, Intelligence Manager, U.K. Federation Against Copyright Theft (FACT)

Last month, the fifth and final season of the hit television show Breaking Bad premiered in the U.S. Despite all the legal ways to view the show in the U.S. and in several other countries, many people still viewed the episode through pirate websites. In fact, within a few hours after the unauthorised copy of the episode was uploaded, 80,000 people had shared the file illegally and after 12 hours more than half a million people around the world were estimated to have downloaded the copy.

Such behaviour can have dramatic and negative economic impacts – impacts that often go unnoticed by consumers. When a producer or director is unable to score a box office hit, for example, their ability to secure backing to produce the next film is greatly diminished, setting off a chain reaction that affects the entire production ecosystem from lighting and carpentry, to catering and cinema staff – all of whom depend on the continued survival of the creative economy. Continue Reading »

Bookmark and Share

Dan Lohrmann, Chief Security Officer, State of Michigan, and author of “BYOD for You”

Dan Lohrmann, Chief Security Officer, State of Michigan; author of “BYOD for You

By Dan Lohrmann

A radical change is sweeping across the global workplace: mobile technology is redefining the boundaries between work, home life and play.

According to IT analyst firm Gartner, the rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing since the introduction of the personal computer in the workplace.

Bringing your own mobile device offers many benefits. Employees are comfortable with the various features and functionality of their preferred—and often beloved—smartphone. Also, using personally-owned mobile technology can eliminate the need for carrying two devices—one for personal use and the other for work. Continue Reading »

Bookmark and Share

Subscribe to this category Subscribe to Smarter Security