As more companies deploy cool Web 2.0 technologies, careful planning is required to avoid new kinds of security problems.
Web 2.0 isn't just for the likes of MySpace and YouTube anymore. Mainstream companies are catching the fever, ramping up their Web sites and creating communities of their customers.
The only problem is, they might be rushing headlong into something that could put their network -- and their customers -- at risk.
"Web 2.0 is all about openness and freedom," said Kris Lamb, a director with IBM's Internet Security Systems, in an interview at Interop. "You're really tearing down the traditional barriers that have kept companies safe. What does security mean for Web 2.0 when you can't make really clear distinctions between 'this is what we allow to happen,' and 'this is what we don't allow.'"
As companies rush to embrace this trendy new media phenomenon, IT and security managers are being warned to slow down the process and make sure they think through their security. How public-facing are these new Web 2.0 features going to be? How much risk are companies willing to take?
"They've got to think about security," said Lamb. "It can't be an afterthought. It has to be part of a larger decision-making process If it's not, there's a lot of risk."
Web 2.0 technologies -- the kinds that promote interactivity and community-building and made MySpace and YouTube household names -- are starting to gain a foothold on more conventional Web sites. Web 2.0 largely is about user-generated content. Corporate executives and marketing heads like the idea of having their customers be participants and sharing information, rather than just getting information off the site. An automobile maker, for instance, might start a social network or blog for customers to write about their experiences with their vehicles or to post pictures or videos from their favorite road trips.
But the advantages of creating these communities and enriched Web sites also come with the same risks that plague the Web 2.0 giants. A worm planted in a MySpace page infected more than 1 million users. Hackers and spammers can join MySpace to create their own pages, riddled with malicious code, to infect their social-networking peers. And hackers are beginning to target vulnerabilities in Ajax applications, which help make the Web 2.0 Web sites so dynamic.
"It's a gold rush right now," said David Cole, director of Symantec Security Response, in an interview at Interop. "But you have to remember that you're taking all this code from the back end and pulling it down to the client side. Before, you could hide it. If you have some goofy code in there, you could be exposing it with these technologies."
[Interop ITX 2017] State Of DevOps ReportThe DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.