+1-202-802-9399 (US)

Thycotic’s Cyber Security Publication

Forward-facing security by remembering the past

Written by Thycotic Team

January 7th, 2016

As the new year begins, it’s a good time to look forward to what’s on the horizon and reflect on the successes and struggles of the past 12 months. Given the speed with which technologies emerge, these moments give us perspective when planning to make the coming year a stronger and more successful one.

When it comes to government IT, everyone is hoping to find a silver bullet – that next generation of software or technologies that will revolutionize the way we deliver value to constituents, protect critical data, safeguard our national infrastructure and create even stronger layers of security to support these functions.

Researchers are already predicting that further advances in processing power will completely change the security landscape as we know it. Brian LaMacchia, Microsoft’s director of security and cryptography, is quoted as saying that “quantum-resistant public-key algorithms” are his wish for 2016.

Certainly, quantum computers hold immense promise, and, without a doubt, many government security professionals will start looking to these and similar advancements as ways to improve upon their security programs. But this forward-looking mentality and desire to be on the bleeding edge of the newest technologies is not always the most effective strategy for delivering an efficient, nimble and resilient security program. In fact, the best advice has already been given time and time again: properly implement the tools and technologies that have been available for years.

This is nothing new, but yet we continue to tout (and then not follow) that same advice. Why is that? George Santayana could not have predicted the state of technology then as we know it today when he said, “Those who cannot remember the past are condemned to repeat it.”

Read the full article ‘Forward-facing security by remembering the past’. If you liked this article, you may want to read our other InfoSec articles featured in Dark Reading, Security Week and other notable publications.

SHARE THIS


The following two tabs change content below.

Thycotic Team

We deploy smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identities.