Reflecting on 2012: Cyberwar, next generation firewalls and compliance
by Reuven Harrison - CTO of Tufin Technologies - Monday, 10 December 2012.
Historically security products have been developed either in response to, or in anticipation of, major shifts in enterprise computing - or at least that's been my experience. Without a time machine it's impossible to state exactly what the future holds, but it is possible to make an educated guess based on what has happened to date. So allow me, if you will, to share my observations on significant events that occurred this year and how I think they’ll impact the year ahead.

Legislation came of age

Eight years after it was first introduced, the Payment Card Industry Data Security Standard (PCI DSS) has not only caught the attention, but gained the respect, of security professionals.

In contrast to other standards, which require companies meet a certain objective offering little explanation of why or guidance on how to become compliant, PCI DSS is different because it’s prescriptive. Now, nothing is perfect, as there is always room for improvement – and PCI DSS is no exception, but what it does do (really well in my opinion) is ensures all organisations who are subject to the regulation can easily adhere to a set of industry standard best practices. Organisations not only have a very clear understanding of what they need to do, but more importantly why they have to do it.
  • The legislation itself strikes a good balance between technology, business processes and implementation practices.
  • It is regularly maintained and updated so it remains current.
  • From an IT perspective, it even outlines the specific security controls and processes it expects organisations to adopt if they’re to adequately manage and secure credit card data.
Perhaps this is due to the PCI Security Standards Council’s establishment of a thriving ecosystem which gives enterprises and auditors access to solutions and service providers that can be used to implement the standard. Although “compliant” and “secure” are still far from synonymous, PCI DSS has created more common ground between the two than any other external mandate to date.

Organisations are increasingly storing personal and credit card details - whether it be for more direct contact with customers, employee information or government requirements. For that reason I expect, in the coming year, we will see more companies having to comply with PCI DSS in order to make their client data safe.

No longer fantasy but reality

For many years we’ve seen various cyberspace wars played out on the big screen and in sci fi novels. Unfortunately, this year fiction became reality – and in a big way!

Perhaps the most significant incident was Stuxnet – although there have been others. In June, Stuxnet was widely reported to have taken over Iran’s computerised systems, that operated its centrifuges, and having done so destroyed 1,000 used to enrich uranium. In a plot that would have made Ian Fleming proud, this event proved beyond doubt that a cyber-event can actually result in physical damage. The gauntlet could be considered well and truly thrown down as, in October, the U.S. government accused Iran of launching distributed denial-of-service (DDoS) attacks against U.S. financial institutions in retaliation.

Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //