Being a Late Adapter in Security is Not An Option
Then there was the networking engineer who told me ITT Automotive would never need more that a T1 to the Internet. These statements are laughable now but back then it demonstrated that never is about two months in the corporate IT world.
There are some decisions that can be made that really do set technology direction for several years. What desktop or server platform to use? What routing infrastructure? What ERP solution?
But security is different. Here is why:
There are three drivers that cause change in the security space. Change that must be reacted to and preferably should be anticipated.
Microsoft. Far from introducing the solution Microsoft is the cause of wide-spread vulnerabilities. And it is not all the fault of cumbersome or sloppy programming. The real fault is the world domination of Windows as a computing platform.
This means that a single vulnerability, say RPC DCOM or Windows Metafile, leads to the fast and furious spread of worms and viruses and enticement for cyber criminals and hackers.
Advances in Web applications. If you have not tuned into what is going on in this space dig into it now. It is all about exposed APIs to Web applications and the mash-ups that are putting them all together.
Look into Web 2.0 and mash-ups. Look at Salesforce, Appxchange or Google APIs as examples. Of course these are rolling out without any thought to security so there will be new product vendors to go back and protect mission-critical, business-generating applications as these become prevalent.
Threats. And finally and most importantly threats are growing and more real than ever before. Just look back over the last two years to understand the next two years.
Two years ago cyber crime was a theme of science fiction. Now it is the single greatest threat to cyber security, both individually and for corporations.
There is now a market for identities (basically credit card information or the underlying data needed to apply for a new credit card or loan). This has created a demand for large quantities of identities that hackers find on servers, stolen laptops, or maybe even by dumpster diving.
If your organization has any such information anywhere on your network you have just lost any security by obscurity you may have enjoyed. You will be subject to hack attempts both from external sources and internal.
The solution may involve making out-of-budget investments. But you need to do it. Waiting is not an option.
Web properties have grown tremendously in value. Cyber extortionists that threaten to use distributed denial of service (DDoS) attacks against your infrastructure are now discovering that value and testing your preparedness with their threatening emails.
And finally, targeted attacks using custom Trojan horses have been demonstrated successfully. First against Sumitomo Mitsui Bank in London last year and then in the now infamous Israeli Trojan fiasco.
So, why is late adaptation not an option? I have heard the following statements from companies that have a late adaptation policy:
While this attitude may work for infrastructure IT products and services, it can be risky when it comes to security.
Because new threats tend to arise from early warning to endemic in 12-24 months you will not be able to protect yourself unless your security investment policy is more liberal. And if you your advisors tell you to hold off, "wait and see, use the incumbent it is not great but good enough, it might be time to get new advisors.