Skip to content
Daisie RegisterDecember 19 20133 min read

Best of Security in 2013

It’s hard to believe that 2013 is already coming to a close. Before we head into 2014, we want to take a moment and reflect on some of our most read content on TechSource this year. The first in this series focuses on security, as we saw significant movement in this area, including the rise of advance persistent threat (APT), cyber war and a new threat landscape that made the cyber security discussion rise in importance. The change in the threat levels drove the Executive Order on Cyber Security and a resulting Preliminary Cyber Security Framework released by NIST.

In the midst of all of these changes, experts at Iron Bow and within our key partner organizations offered their input. In case you missed it, here is a list of the most popular stories that we’ve featured on the topic in 2013.

Effective Security Strategy Requires a Lifecycle Approach

A traditional IT security model typically requires a defense-in-depth strategy. Organizations believe that if they put in enough layers of security boxes, they can deter or catch the bad guys and keep them out. Yet, in today’s security landscape, no one can be 100 percent protected. The bad guys are smarter and far more sophisticated than attackers of the past. Now, with the help of automation tools, we just have to assume bad things will happen to our network environment. So where does that leave an organization’s security strategy today? Jon Kim, Director of Iron Bow’s Cyber Security Practice, sat down with us to give insight into a new Security Lifecycle Model developed for customers.

The 95/5 Approach to Defensive Security

Steve Martino, Vice President and CISO of Cisco’s Information Security (InfoSec) organization, is tasked to innovate and adopt the most effective security technologies and policies; reflect them in Cisco’s people, products and services; and share them with customers. In this guest post, Martino offers us the 95/5 principle to protect data from advanced cyber threats.

National Cyber Security Awareness Month and the Future of Cyber Security

The editors of TechSource sat down with Bob Dix, Vice President, Government Affairs & Critical Infrastructure Protection at Juniper Networks, during National Cyber Security Awareness Month to get his take on the state of cyber. Dix discussed the concept of the “shared responsibility” of cyber-security, as well as the latest challenges concerning the current legal framework around this issue.

Evolving a Mobile Security Strategy for Federal Agencies

The rapid adoption of mobile technology and its success at increasing productivity and agency responsiveness means that government IT teams need to really understand what it takes to provide security for a network on the go. Sasi Murthy, Senior Direct of Product Marketing at Blue Coat Systems, an Iron Bow partner, has some reassuring news. While the mobile environment does present many unique challenges, the patterns of malware evolution that Blue Coat is seeing across its user network indicate that we’ve seen many of these attacks before and that mobile malware, in many respects, is a return to the classics.

Cyber Security and Network Security: Next-Generation Firewalls Take Center Stage

The Executive Order issued by the White House is a great step forward to ensure that cyber-security remains top of mind for both the private and public sectors. Other governments around the world have also pushed for similar initiatives recently, and one common takeaway is that network security is being more systematically called out in cyber-security discussions and is even taking center stage. Some analysts have even commented that network security will remain the largest cyber-security submarket for the next 10 years. Isabel Dumont, Director of Industry Solutions at Palo Alto Networks, discusses how next generation firewalls have taken center stage in this new environment.

COMMENTS