Monday, March 5, 2012

Thirty years ago computer networking was still in its infancy, the internet was a dark and wild place where only the bravest men of science dared to tread. There was no America Online or Google, only Internet Relay Chats and a funny little program called "mosaic" that could unravel the cryptic addresses of the maze of computers if you were smart enough to understand the numerology of what would one day become the world wide web. It wasn't until the 1990's when Al Gore invented the information super highway that things really took off and millions of computers came online. It wasn't until after the government built the superhighway through the wilderness that the AOL's and the Ebay's became possible, and with the flow of cash came the fraudsters and the black hat hackers seeking to steal whatever wasn't tied down. Today the World Wide Web is a very sophisticated place where the zombie bot nets will rob you blind and decimate your systems if you do not protect yourself. Mere firewalls alone will not do it, security must be a full court press of a myriad of techniques and strategies, our applications must have security built in not bolted on if we are going to be protected from the cyber war that rages on the other side of our keyboard.

The future is now, everything is streaming into the cloud, that nebulous ether world where bits and bytes combine and entwine, where the stealthy and the dark seek to plunder by stealing our most sensitive information. The predators of this age are armed with encrypted malware designed to inject itself into our systems infecting and duplicating its vile intentions into the most vulnerable parts of the user application converting our systems into  mindless armies obeying the will of an evil and faceless task master.

In order to survive businesses must have a full suite of security oriented strategies in place to detect and thwart attacks before they occur.