Hello reader,

This weblog has my thoughts on securing increasingly powerful and connected computational devices. The security situation appears to be getting worse with rising software complexity, device connectivity and the increasing dependence people have on technology. Consider the span from 1985 to 2015. In 1985 the focus was operating systems security, the first PC virus had not yet appeared and PKI implementations barely existed. In 2015 there is internet retail, banking, b2b commerce and innumerable online services and mobile devices that lie exposed to attacks from anyone connected to the net unless protected.

Because security of a system is as good as that of its weakest link, a systems view is required to understand threats and countermeasures. Connectivity implies trust on the network that one is connected to and through. The ‘system’ includes not only the technical pieces such as devices, clients, servers, applications, databases, network and storage systems but also the people involved and the operational controls around the technology stack. So security involves a collaborative effort of parties working in different areas and capacities and understanding and harnessing technologies that are changing rapidly – cloud, big data, mobile and IOT.

Feel free to look around, comment or subscribe as we look at security of different links in the chain of the connected world..

Ruchir Tewari

Contact: ruchir@securemachinery.com

Note: All opinions expressed on this blog are personal and do not represent the views of my employer. Thanks for reading.




Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s