{"id":215441,"date":"2017-03-12T11:43:06","date_gmt":"2017-03-12T15:43:06","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/the-new-cyber-security-ecosystem-information-security-buzz-isbuzz-news.php"},"modified":"2017-03-12T11:43:06","modified_gmt":"2017-03-12T15:43:06","slug":"the-new-cyber-security-ecosystem-information-security-buzz-isbuzz-news","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/eco-system\/the-new-cyber-security-ecosystem-information-security-buzz-isbuzz-news.php","title":{"rendered":"The New Cyber Security Ecosystem &#8211; Information Security Buzz &#8211; ISBuzz News"},"content":{"rendered":"<p><p>    When one compares cyber security today to what it was ten years    ago, the two are almost unidentifiable as the same industry.    The iPhone had only just launched; Facebook was still in its    infancy; the Internet of Things (IoT) was still a dream. The    routes a hacker could use to access a system were limited, and    because of this, cyber security was built around walls. One was    encouraged to block attacks with firewalls and other perimeter    security that could be plugged into existing systems. There was    no wider strategy, with little thought given to what would    happen if those walls were breached. This created a very    segmented landscape, made up of a multitude of different    products, all with varying capabilities and from different    suppliers.  <\/p>\n<p>    Todays landscape is utterly different. The routes into a    system are so numerous they are impossible to police    effectively, with the IoT making this problem greater by the    day.  <\/p>\n<p>    Yet this same technology that is causing a headache for cyber    security professionals is the exact same technology that can    help drive a business forward. Consider the transformational    potential of IoT. Data between previously distant departments    or operations can now be collected, shared and used    automatically, dramatically improving the efficiency with which    those two business areas work.  <\/p>\n<p>    The consequences for cyber security, however, are serious.    Access across a large multinational corporations systems can    be gained through one chink in the armour of one small    department. Recent hacks have shown this time and again. The    hack against Target, one of the biggest ever and responsible    for the loss of details of 110 million customers,stemmed from a phishing attack on a    contractor. USB sticks infected with malware are an    ever-present threat; once plugged in, hackers quickly spread    throughout an organisations system and begin to do serious    damage. This has been proven to chilling effect in the health    sector,where patient monitors have even been    accessed.  <\/p>\n<p>    To counter this, the cyber industry must work to develop a    security protocol  a standard  that can operate effectively    across all different elements of modern, large-scale computer    systems; a system of systems. Such a protocol will allow for    the effective identification and quantification of any security    and privacy issues in any part of a business IT systems. Other    industries have used similar models of ever-presenting testing    and evaluation to ensure their services are as rigorous as can    be. Engineering, constantly evolving since the industrial    revolution, is built upon testing. From product design through    to end-of-life decommissioning, the industry constantly tests    the performance and capabilities of its devices.  <\/p>\n<p>    A system of systems will allow cyber security to the same. All    parts of the IT supply chain, from the service provider to the    OEM; the management consultancy to the market researcher; all    will be able to scrutinise their business operations from a    cyber security stand point, and all to the same high level of    quality.  <\/p>\n<p>    This will align with and be underpinned by the National Cyber    Security Strategy, supported by the NCSC. It aims to create an    ecosystem of innovative and thriving cyber security by    bringing together the best minds from government, academia and    the private sector to deliver this system of systems, solving    the issues presented by a divergent and complex online world.    It will be the beginning of a new era of cyber security    protection, based not on unrealistic goals but on our ability    as a nation to mitigate and minimise risk through    collaboration. It will give the UK and its population    assurances that its data and systems are safe and the base from    which a successful digital economy can flourish.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here: <\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.informationsecuritybuzz.com\/articles\/new-cyber-security-ecosystem\/\" title=\"The New Cyber Security Ecosystem - Information Security Buzz - ISBuzz News\">The New Cyber Security Ecosystem - Information Security Buzz - ISBuzz News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> When one compares cyber security today to what it was ten years ago, the two are almost unidentifiable as the same industry.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/eco-system\/the-new-cyber-security-ecosystem-information-security-buzz-isbuzz-news.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[33],"tags":[],"class_list":["post-215441","post","type-post","status-publish","format-standard","hentry","category-eco-system"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/215441"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=215441"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/215441\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=215441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=215441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=215441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}