Four Pillars of Hybrid IT Integration (merge the "how" with the "wow")
Kristoffer Sterzin |
May 12 | Tags: computing analytics mobility enterprise api systems devops simplify business strategy economy transformation infrastructure virtualization integration hybrid real-time cloud-based services digital ibm it soa data iot scalable
0 Comments | 2,004 Visits
As IT architects, you’re probably suspicious of adopting integrated systems. But what if you could cut through the noise, reduce the time it takes to adopt a platform, and simply plug it in and go?
The “if it’s not broken, then don’t fix it” mentality doesn’t really work with the world of hybrid IT. This world presents a new reality. One that creates 2.5 quintillion bytes of data each day, where 85 percent of enterprises use cloud services, and two thirds of all integration flows outside of firewalls. Yet you probably hear your CIO say “we need to build apps faster, connect them and pull in other APIs and services to make them more robust, then pull in customer data and transactions from the cloud, marry it with the backend and connect it back to the app.” Sound familiar? As an IT architect, you carry a lot on your shoulders. You’re tasked with making sure the business has a solid enough base to deliver the “wow” factor that drives the needle – the how of the wow, so to speak. Solutions have to be secure, devices and systems need to talk to each other in a lingua franca, and it all has to be fast, flexible, and scalable. That’s a tall order. Enter integration. Chances are you’ve already engaged in a balancing act between cloud-based services and on-premise systems. But you’re constantly clearing roadblocks, bottlenecks and putting out fires, dealing with a proliferation of shadow ops and increasing complexity. So where do you find the time to step back and plan for an effective digital transformation? Integration is more than added functionality. It offers a single source of truth and that “shareability” which is so important to building experiences people love. Integration lets you be proactive - to set up guidelines and rules for development - rather than just reacting to changes and responding to the needs of the business unit. It’s about speed and service. It’s about focusing on the here and now to simplify operations. It’s about merging the “how” with the “wow.” So what does that look like?
It all begins with four pillars that support an overall system of integration:
Foundation - A solid foundation that is flexible, fast, scalable, and transparent is the first step to leveraging new technologies with existing IT investments and deploying new projects with ease and speed.
Security - 24x7x365 security lets you control your environment, comply with internal and external data policies and trust your mobile transactions.
APIs - Easily manage a single API catalog to expose new services, expand your reach into new markets, leverage new tools for new strategies, and engage end-users on a personal level. Messaging - Simplified, connected, and secure messaging lets you access your data wherever and whenever you need it for better collaboration, trusted gateways, smarter workflows, and increased productivity. To learn more about how IBM facilitates your digital transformation through integration, visit IBM.com/Integration. |
Monday, May 25, 2015
Four Pillars of Hybrid IT Integration (merge the "how" with the "wow")
Friday, May 15, 2015
Maritime industry heavily depends on technology, a cyber attack against its infrastructure and systems could have dramatic consequences on our society.
Maritime industry heavily depends on technology, a cyber attack against its infrastructure and systems could have dramatic consequences on our society.
In a recent post, I talked about attacks targeting SCADA systems will increase, and our ports are among critical infrastructure that makes large use of such systems.Let’s consider that “almost 90% of the world’s goods are shipped on boats”, and I am sure that not everyone realizes that. These boats bring us our clothes, our electronics, food, etc., etc.
Ports have a crucial role and related activities in our society.
A newsletter provided by the maritime cybersecurity consulting firm CyberKeel includes some scaring statists, 37% of maritime companies using windows web servers that aren’t patched, leaving one-third vulnerable to denial of service attacks and unauthorized remote access.
Do you remember Heartbleed, the announced in 2014? This vulnerability considered by many as “the worst vulnerability ever discovered”, counting that maritime company don’t patch their systems like they should do remaining them vulnerable to several attacks, including the popular Heartbleed that could expose customer data, the goods physical location and much more.
Even if one of the companies in the maritime industry falls victim of a cyber attack, unfortunately, there is no interest in disclosing them since it will generate bad publicity.
“The potential consequences of even a minimal disruption of the flow of goods in U.S. ports would be high. … [S]helves at grocery stores and gas tanks at service stations would run empty.” was reported in report titled “maritime cybersecurity from Brookings explained” published in a 2013.
CyberKeel co-founder Lars Jensen explained that “The thing that started to scare us a little bit was that some of things … where we said, ‘This is clearly Hollywood-scenario stuff’ had already happened.”
But the public didn’t know about these incidents… but there is more, in 2014 a U.S port ( it wasn’t disclosed which) had a seven-hour disruption in their GPS signal, affecting their operations.
GPS is used in port cranes to define the crane’s position and to know to where the containers should move, without the GPS for seven hours, works were crippled. But the scariest part is that the GPS is used in navigation, so if someone is jamming the GPS signals, making the boat lost, they can perhaps ask for a ransom to unblock the GPS signals.
Another worrying incident occurred in 2012 when a malware was deployed in about three-quarters of Saudi Aramco’s files “across tens of thousands of PCs”.
The attacked showed an American flag in the infects machine’s screen. The company was able to mitigate the attack but since we are talking about an Oil company, this means that if the impact was bigger, it would affect the maritime shipping, affecting hugely the company.
“The threat is very real,”, “These intrusions and attacks are taking place every minute and every second of every day.” said Rear Adm. Marshall Lytle, the assistant commandant responsible for U.S. Coast Guard Cyber Command.Vice Adm. Charles Michel, talked about some of the Coast Guard’s plans for cybersecurity:
“Probably the most important part of the Coast Guard’s Cyber Strategy is in its key organizing principle: The strategy is all about embracing a policy framework that will allow our enterprise to begin to tackle these challenges.”Cyber-security must be a pillar of every sector in today society, we must consider seriously warning like the ones provided in these post to avoid major problems in the future.
About the Authors
Elsio Pinto is at the moment the Lead Mcafee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog http://high54security.blogspot.com/
(Security Affairs – maritime industry, cyber security)
Friday, March 27, 2015
Booming business of corporate espionage
Booming business of corporate espionage
paranjoy guha thakurta
Photo: Jorgen Mcleman/Shutterstock
Prijs Zonnepanelen 2015 - Profiteer van Gedaalde Prijzen. Vergelijk tot 5 Gratis Offertes!
solvari.nl/Zonnepanelen
solvari.nl/Zonnepanelen
A quick look at the ministries from which information and documents were pilfered tells you much of the story: Finance, Defence, Petroleum and Natural Gas, Coal and Power
Corporate espionage in India is hardly new. For decades, tycoons have used spies to ferret out information about what is going on behind closed doors in the corridors of power. Access to sensitive information known only to a few powerful politicians and influential bureaucrats is often not just a source of profit but also provides competitive advantage over business rivals. The government is vast and multi-layered — it can be easily compromised by bribing junior officials with relatively small amounts to part with valuable information. The big names from the world of politics, bureaucracy and the corporate sector are rarely caught when law-enforcing agencies crack down on spies and thieves. Only their minions are jailed.
So what’s new about the recent incidents of corporate espionage that are being investigated by the Delhi Police? Not much. Except that the modus operandi of the spooks has changed with technological advancements. Xerox machines are out, scanners are far more convenient. Why cart away large bundles of paper when there are pen drives that fit into your wallet, when broadband-enabled email can in a jiffy move a zillion kilobytes of data across continents, when smartphones and WhatsApp make life unbelievably simple?
However, some things have not changed. During years of licence raj, every important decision impacting businesses countrywide were taken by a clutch of netas and babus sitting in Delhi or Mumbai. The brave new era of economic liberalisation was supposed to have made the working of ministries less discretionary, more predictable and transparent. But that doesn’t seem to have happened. To use the memorable phrase from Reserve Bank of India Governor Raghuram Rajan, crony socialism was replaced by crony capitalism, especially when it came to allocation and pricing of natural resources.
The series of scandals relating to the farming out of second-generation (2G) telecommunications spectrum, the opaque and arbitrary allocation of coal blocks by so-called “steering committees”, and the controversies relating to extraction of natural gas from the Krishna-Godavari basin by a contracting company controlled by Reliance Industries Limited (RIL) are but three instances of how government decision-making has been vitiated by cronyism. It is, therefore, not surprising that corporate captains have felt it ‘important’ to utilise the services of spies to find out what’s going on in North Block, South Block, Udyog Bhavan or Shastri Bhavan, among other buildings that house powerful economic ministries and government departments.
A quick look at the ministries from which information and documents were pilfered tells you much of the story: Finance, Defence, Petroleum and Natural Gas, Coal and Power.
The pattern is familiar. Journalist Santanu Saikia ran web portals on the petroleum, fertilisers and energy sectors, before he was put behind bars. Among those arrested or questioned by police are employees of groups like Reliance, Essar, Cairn/Vedanta and Jubilant. Those detained or accused are in the middle or bottom of the corporate hierarchy in conglomerates headed by well-known industrialists like the Ambani siblings Mukesh and Anil, the Ruia brothers Shashi and Ravi, Anil Agarwal and Shyam S Bhartia. As stated, it appears unlikely that the investigations will go all the way up to these individuals.
Who remembers the corporate spies of yesteryear? In 1986, Coomer Narain, regional manager of SLM Maneklal Industries, was charged with criminal conspiracy and leaking important classified information to agents of foreign companies. He would bribe junior employees in the atomic energy and defence ministries for documents, which he sold to the highest ‘bidder’. His employer used to supply textile machinery to the Soviet Union, Bulgaria and Czechoslovakia; source marine equipment from Poland; and represent firms from France, Austria, Switzerland, West Germany and Japan that sold defence equipment and machinery for nuclear power plants.
One of Narain’s sources was a personal assistant to Dr PC Alexander, the then Principal Secretary to Prime Minister Rajiv Gandhi. Alexander resigned in the wake of the espionage scandal. After Narain’s arrest, the government ordered two French diplomats, including the then ambassador, to return home. As in the recent case where at least one official of the Defence Ministry has been arrested, much of the corporate spying in the country has related to companies associated with military purchases. This is again not surprising, given that defence deals are extremely lucrative.
In November 1998, a search-and-seizure raid on V Balasubramaniam (or Balu), group president of the then undivided Reliance group, led to the recovery of secret documents including Cabinet notes. The police registered a first information report against him and two other senior Reliance executives, AN Sethuraman and Shankar Adawal (the latter was questioned by Delhi Police in the latest episode too). It was in April 2012, nearly 14 years later, that a court framed charges against the executives and passed an order, against which an appeal is pending before the Delhi High Court.
A number of surveys by industry associations and consulting agencies indicate the business of trading in sensitive information is ‘booming’ in India. In fact, this was precisely the language used in a report prepared in 2012 by PricewaterhouseCoopers.
The same year, a study by the Associated Chambers of Commerce and Industry of India stated that more than a third of the companies surveyed across different sectors were involved in some form of espionage to gain advantage over competitors. Nearly 80 per cent of the chief executives spoken to had used or were using detective agencies and surveillance systems to spy on current and former employees.
A 2014 annual risk survey by the Federation of Indian Chambers of Commerce and Industry called business espionage the ninth biggest threat to Indian companies. It stated that in spite of widespread use of closed-circuit television cameras and tracking computer software, only 15-20 per cent of corporate espionage cases is actually detected.
Minister of State for Commerce and Industry Nirmala Sitharaman has gone on record stating: “...We are on the side of keeping processes transparent and not on the side which will lead to corrupt practices.”
Time will tell whether this will indeed be the case and whether the corrupt nexus between politicians, corporate bigwigs and bureaucrats that has spawned the spying industry will weaken.
(Paranjoy Guha Thakurta is a journalist and lead author of Gas Wars: Crony Capitalism and the Ambanis)
Subscribe to:
Comments (Atom)
