It is no longer a realm of a conspiracy theory or imaginings of a geek hacker.
Today, we see more information in the world news about the professional, criminal and state-sponsored cyber security threats. This new threat is quickly starting to polarize nations and prioritize military and other security services spending.
Why is cyber security getting so much more attention in the recent days?
We have had security solutions for as long as one can remember, yet we continuously see organisations, military and nations under the constant new threat to cyber security. The issue is no longer about just securing our infrastructure or information, but it has now raised to a new level altogether.
Geopolitical and economic security is at the heart of this new era of cyber security investments, measures and counter-measures.
What used to be a realm of the sole professional hacker has now been open up to forces that have the means, the will and the political power to change our digital world. This new arms race will set a new level of power balance, innovative solutions and intrusion into our private digital lives like we have never seen before.
The question of exactly which power balance will be the lasting impact into our digital lives is still unanswered at this stage.
What should we be doing at this stage of our digital lives?
We know the basics, and the basics are our personal, professional, state and commercial Information. It will always be at the very core center of any professional, state or criminal sponsored cyber threat. This information can not only be stolen, but can also be tampered with or used to orchestrate economic, political, professional and personal outcomes.
The new era of information cyber theft, warfare, espionage or surveillance will require a new breed of skills and a completely different mindset when securing and integrating information.
Traditionally, we secure our digital borders by using all sorts of security technology solutions, people and process policies and training.
The new era will require us also to store and integrate information out of context while providing the end user with the information context. Imagine the world where we access the context of information as we do today, but render information completely useless to cyber threats when storing and integrating information
Providing In-context information in an out-of-context sea of information is where I believe the next innovation will be with a device, applications and the public cloud.
I will continue to explore this In-Context driven information concept more in a future posts.
Enterprise Business and Solution Consultant