@CloudExpo Authors: Liz McMillan, Corey Roth, Zakia Bouachraoui, Yeshim Deniz, Dana Gardner

Blog Feed Post

Mobile Malware and Future Threats


Wired.com had an excellent article last week about Mobile Malware and it got me thinking about future computer threats a little. Let’s see where my mind went:

Mobile devices far outrank traditional computers and the gap is only growing. The Wired article points to only one of the problems with this, the lack of good antivirus software for mobile. Most cell phones carry no traditional security programs. Design features like sandboxing are nice and we are now seeing it in more phone/tablet operating systems, like Windows 8. Even so, mobile is the most used device and arguably the least secure. People do much more than just send email from their smartphone these days. Banking, locking the doors to your house, even starting your car are all being done via mobile devices. What once seemed like it was only for James Bond is now a reality, a very weakly secured reality. Hackers and organized groups will increasingly shift their attention to these devices and operating systems over the next couple years. Smart companies and security experts will likewise follow the trend. To give companies some idea of the scale of the potential security market in mobile, there were over 400 million cell phones sold in the 2nd quarter of 2012 alone, with smart phones up 41% from last year at 150 million. A company who capitalized on these trends by offering a trustworthy security protect for mobile devices could see enormous growth as a result.

Another scary future/present threat is hacking medical implants. Research has shown that you can kill someone by hacking into their pacemaker and delivering a high electric jolt. Talk about covert assassination or try being able to prove murder. Inserting computer chips into the body can have tremendous medical benefits, but the security side of these products cannot be ignored. So far it has been.

Finally building off another CTOvision article, the cloud offers hackers, thieves, and the like just as many opportunities as businesses. By using cloud services, cracking encryptions and passwords is constantly getting easier. Companies have fallen behind in realizing their old security standards no longer match up to current technology. A company’s security practices and standards cannot be a static but rather must be dynamic and continually evolve as technology and the threat spectrum changes.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

CloudEXPO Stories
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by sharing information within the building and with outside city infrastructure via real time shared cloud capabilities.
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
Is it possible to migrate 100% of your data ecosystem to the cloud? Join Joe Caserta as he takes you on a complete journey to digital transformation mapping out on-prem data footprint and walking it to the cloud. Joe will also explain how the modern ecosystem supports Artificial Intelligence and will include business use cases to back each of his insights.