Utility / Cloud computing will not take over, but drive price comparison in internal IT shops. Atomic metrics must have abstract units convertible to associated costs perhaps in a financial market like brokered environment.
It is nuts. It is scary. Breeding out the 'old guard' wil happen also, as currently security is also a social and geo-political problem. Incentives and penalties will need to be introduced, initially per country. Once RIRs get fully authoritative and sBGP, DNSSEC happens, we may look at penalising entities! Virtual hosts, virtual servers, virtual networks and virtual storage will also drive fluidity in IT yet increase the static nature and characteristics of 'virtual nodes' which transact with each other.
More: What if a *national* security board/organisation could instruct an RIR(Regional Internet Registry) based upon an IRR(Internet Routing Registry) recorded NETBLOCK to be revoked as punishment for X... e.g. sinkhole/null route at Tier1/2/3 ISP/INEX? Thus an organisation would lose it's internet presence. Maybe we could use this to force em' to supply their anonymized *logs* and *survey* data (signed by the CIO of course) ....
Wednesday, July 30, 2008
Monday, July 14, 2008
Sunday, July 13, 2008
Thursday, July 10, 2008
Top 5 Abused/Misused/Miscontrued Terms in Information Security
Paradigm Shift
Game Theory
l337 5p34k
* is dead
Security ROI
http://techbuddha.wordpress.com/2008/05/21/top-5-abusedmisusedmiscontrued-terms-in-information-security/
Game Theory
l337 5p34k
* is dead
Security ROI
http://techbuddha.wordpress.com/2008/05/21/top-5-abusedmisusedmiscontrued-terms-in-information-security/
Subscribe to:
Posts (Atom)