By Enterprise Security Magazine | Thursday, October 22, 2020
Innovation and technology impact digital security and is helping to shape the future of digital security.
FREMONT, CA: It is a proven fact that innovations and trends in technology have a direct effect on digital security. Similar to what happened in this pandemic. As the organizations switched their workforces to remote connectivity, several security teams changed their attention to deploying enterprise-wide VPNs and paring with employees to improve their home networks/devices. These tasks can consume an even more significant part of infosec professionals’ time if they let their employees continue working from home in a post-pandemic world.
A boom in remote working is not the only force to shape the future digital security. Three other innovations and trends are playing a vital role in it.
Quantum computers use a new model of computing based on qubits instead of bits. These units are comparatively more “flexible” than bits, and in that, they might be on, off, or “superposed” between the two. They are also entangled to the extent that the particles are physically linked together, even if they are physically separate.
These properties enable quantum computers to move the data around and to carry out tasks quickly and efficiently compared to ordinary computers. The possibilities for quantum computing are thus endless. Also, scientists can use quantum computing to take artificial intelligence to all new heights. They can develop new materials, find cures to diseases, and radically change life in other ways.
5G Mobile Technology
The term “5G” means fifth-generation cellular wireless, and its primary benefit is its ability to provide a “high-band,” short-range airwaves. When partnered with its other advantages, including the increased availability and network capacity, 5G promises to offer higher speeds and lower latency than any wireless service before it. Such outcomes might help to revolutionize the ways how machines, objects, and devices connect.
The confluence of information technology (IT) and operational technology (OT) is challenging an organizations’ digital security. It was not always the case. As explained by Digitalist, the former comprises hardware, software, computers, and other telecommunications devices that serve the business function, whereas the latter consists of vendor-specific, proprietary technologies that perform the actual operations. There is, therefore, nothing that states that IT and OT teams have to collaborate.
The times have changed the security community and will have to develop a new “ITOTSecOps” methodology that mainly addresses IT and OT systems working together.