Cyberthreats Outpace Security Measures, Says McAfee CEO
McAfee CEO David DeWalt says cybercrime has become a $105 billion business that now surpasses the value of the illegal drug trade worldwide.
Second, the increase in cyberthreats has fueled a rapid growth in compliance requirements as the federal government tries to mandate higher levels of security and protection of sensitive consumer and patient data. "There's a lot of legislation around industries forcing them to comply with various standards for customer protection," said DeWalt, including payment-card industry regulations, Sarbanes-Oxley reporting requirements for public companies, and the 1996 Health Insurance Portability and Accountability Act.
In fact, along with many corporate executives in the United States, DeWalt believes that "the pendulum has swung too far" toward increased government oversight of corporations and the customer data they control, causing American companies to lose their competitive edge to businesses in other countries with less-stringent compliance requirements, particularly in Asia.
The third important trend is the movement of security protection from the perimeter of corporate networks toward the data layer itself: "Traditional security has always been concentrated on the perimiter, on endpoint devices, particularly with firewalls," DeWalt noted. "The focus now is on thinking about data-oriented security" by classifying certain types of data so that it cannot leave the corporate network or company-owned devices.
That is especially important because some 70% of all data losses are caused by insiders of one sort or another.
Fourth, companies are facing new challenges as server virtualization spreads across many industries and many types of industries. "Virtualization is an amazing juggernaut in terms of security risk," said DeWalt, listing noncompliant virtual machines, VM-aware threats that can subvert countermeasures, the propagation of infected virtualization images, and "hyperjacking," or the potential for a single breach to offer simultaneouos access to many machines across a virtualized environment as some of the emerging risks.
"Managing and protecting a single physical endpoint is much different than managing security virtually," DeWalt said.
Finally, the emergence of new platforms and devices presents cybercriminals with new targets for hacks and phishing scams. Mobile devices such as smartphones and voice-over-IP systems are inherently more vulnerable than traditional clients and telephony services.
McAfee and its competitors are bringing out new products and technology to deal with these emerging threats, said DeWalt, but the advantage for the moment still lies with the evildoers in cyberspace. He concluded, "We're in inning two of a nine-inning game here."
IT's Reputation: What the Data SaysInformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
What The Business Really Thinks Of IT: 3 Hard TruthsThey say perception is reality. If so, many in-house IT departments have reason to worry. InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business views IT's performance in delivering services - and, more important, powering innovation. The news isn't great.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.