Be the first to like this
You cannot secure the pipes, secure the servers or even just secure the storage – you have to be able to trust the data, based on the data – and nothing else! Current models of security are pretty much cyberspace equivalents for fixed fortifications in “real space” warfare. The safe bet is that data becomes self protecting by 2030, and hopefully much before that. In the shorter term the emphasis has to shift from being an IT issue to being an Enterprise-wide Risk Management issue. There are three paths of technology development – all of whom should start bearing fruit in the next 3 to five years - that are foundations to being able to trust the data solely based on the data itself. Content Centric Networking(PARC and NSF), Content centric computing (work load based), content centric storage (already started with de-duping technology).