The Eight Biggest Security Threats for 2010
Blue Coat Systems' predictions for the worst security threats for the year.
"Today's organizations need a new set of tools to express and enforce a more intelligent and relevant security policy that deals with the realities of Web 2.0, social networking, and the anywhere-anytime-any device nature of the borderless enterprise. Without these tools, policies are as effective as the ugly mattress tags that warn: Do not remove under penalty of law.' Most are removed." --Tom Gillis
Network security has become even more challenging in the age of Web 2.0, given its reliance on social media and mobility. As Tom Gillis points out in his book "Securing the Borderless Network: Security for the Web 2.0 World," users reject the idea that "personal" and "professional" technology use shouldn't be intertwined because they already are. The emergence of social-networking technology only serves to highlight how IT policies-particularly those relating to security-don't reflect reality. Organizations whose policies disallow use of social-collaboration tools lose out on opportunities for gains in productivity and efficiency.
The goal of Gillis' book is to encourage the security community to "adapt and evolve policies so that businesses can embrace these new technologies while not exposing themselves to harm through increased malware infection, acceptable use problems or data loss." To that end, he offers Cisco's plan for providing network security in the borderless enterprise. This identity-, application- and content-aware architecture consists of five components:
Related Knowledge Network Content