Greetings ! This blog collects thoughts on securing increasingly powerful and connected computational devices. The security risks are getting worse with rising software complexity, device connectivity and the increasing dependence people have on technology.
Because security of a system is as good as that of its weakest link, a systems view is required to understand threats and countermeasures. The ‘system’ includes the technical infrastructure such as devices, clients, servers, applications, databases, network and storage systems, but also the data flows, the people, and the processes for governance and control of these resources. As a result effective security involves a collaborative effort of parties working in different domains and roles, as well as an understanding and leveraging of technologies that are changing rapidly – for example – cloud, big data, mobile and IOT.
We invite you to browse, comment and subscribe – as we look at security of different links in the chain of the connected world.
Ruchir Tewari, email@example.com
Note: All opinions expressed on this blog are personal and do not represent the views of my employer.