For Davison, of the early 1990s, when the internet emerged: “Back then, no one could have predicted that there would one day be blogs, Facebook, Google, or Twitter. And now we’re back in a time of uncertainty, trying to figure out who’s going to be the next Google of blockchain?”
Gartner: Key Directions for Security Systems Development in 2017
PC Week #11 (932) August 29, 2017
Igor Novikov | 12.07.2017
At the Gartner Security & Risk Management Summit in June, Gartner identified the key areas of technological development that will be most important for the development of information security systems in 2017 and their application in the future.
Cloud Computing Security Platforms
Data processing in modern data centers can be performed in various places: on physical servers in the data center, in virtual machines, containers, a private cloud. Very often, part of the computing load "lands" in public clouds used to obtain specific services.
The growing popularity of the hybrid cloud malta mobile database model leads to the improvement of platforms that provide unified security protection tools that extend their control to all connected resources. Control is carried out from a common management console, uniform security requirements are imposed on the entire system regardless of the acIsolation of browser operation
Almost all recent attacks that have targeted corporate systems and succeeded in achieving their intended goal have been carried out via the public Internet. The primary entry point has been browsers.
As practice shows, the current IT system architecture does not allow for effective prevention of such attacks. However, the growth of attacks can be contained if individual Internet access sessions by users are isolated from the possibility of entering corporate systems and networks. In this case, malware cannot “reach” corporate systems, and due to this, the risks of attacks on corporate servers are significantly reduced.
In the user's work, it is necessary to ensure that after any access to the open Internet through a browser, opening a tab or accessing an external URL, his session with corporate resources is limited to a known safe state, and full access is restored when work with the open Internet is stopped.
tual location of the load, but taking into account local features.