The Business-Technology Weave

Aug 22 2010   12:27PM GMT

Security and Insecurity: Finite vs. Infinite

David Scott David Scott Profile: David Scott

It’s an unsecured world.  That is, until you establish security…  somewhere… in some small measure.  And maintain it.  And grow it in response to ever expanding and stronger threats.  Nothing starts out secured.

You have limits:  budget, personnel, time… these are finite things.  Finite things against the Infinite:  Threats are continual – never ending – ever more imaginative, and limitless.  In our response, we must even grant that there are limits to our awareness of threats.  That’s why we continually educate ourselves regarding new perils.  That’s why we participate in knowledge shares, such as the IT Knowledge Exchange. 

As security threats grow in scope and severity, everyone in IT and Business must actualize a fresh awareness and view every activity through security’s prism. 

But what does the IT leader deliver in these regards?  How to keep security front and center without seeming pushy?  Paranoid?  And… how not to hobble business with crippling security measures?  Where are the thresholds of best returns vs. diminishing return?

In the coming days, let’s explore how to battle the Infinite (that which is  “out there”) with the Finite (the resources at your disposal).

August 22nd:  On this day in 1906, the first Victor Victrola was manufactured.

1  Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.
  • Rogermark
    This is an interesting write-up by David. I agree with him on the need to view every activity in the IT domain through the security’s prism. Security threats are not going to go away. We will have to deal with them. Organizations are now realizing the importance of IT security for undisrupted business operations. While some organizations are strengthening post-incident controls, others are initiating steps to pre-empt security threats by hiring [A href="">certified ethical hackers"] known [/A] certified ethical hackers.
    0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: