Network Security - The Imperative Need of Computer World
Just yesterday IBM announced another gem from its research lab - Watson . It's basically a Question Answering (QA) computing system, which will churn out enormous data at lightening speed to get the required answers/ results. For now, Watson’s playground will be the famous quiz show “Jeopardy”. You can read more about Watson & DeepQA here. But the Mind blower video in the corner of announcement page, prompted me to right this text.
The video asked the viewer, “What would you do if you have Watson for 1 day?”
Listening this, my (Security obsessed) brain started working overtime and here is one to-do which I could think at the lightening speed -
“I would ask Watson to find all possible kind of the security breech / loophole on my computer / network, along with solutions to fix each one of them”.
Also, it would be fun to ask questions like “What is the question for which you (Watson) don’t have any answer?”
It would be very exciting to explore more usage for this kind of system. Please comment if you have such ideas.
According to me, the usability & effectiveness of such system is in asking the ‘smart question’ to get the ‘smart answer’. So, dear all, the time has come when we can actually start thinking how to ask ‘smart questions’ to get precise answers.
(smart questions, smart answer, smart planet - sounds like lyrics of my next guitar song!)
All in all, It’s no more elementary, Dr. Watson!
Even today, organizations spend heavily to tighten the security for external attacks and keep eyes closed on the threat from insiders. It has been proved time & again that security risk from within the company is as good as (if not greater than) any external threat. One of the most critical perils is the 'data theft' by any insider. Imagine the situation in which your company’s yet-to-release confidential reports are in the hands of your competitors! Sounds like worst nightmare, isn’t it?
Well, the best way to avoid this, is to have proper mechanism to secure the valuable data at rest as well as data on the move and educate / motivate the employees to use these mechanisms. I’m proud to present you one such mechanism in the form of alphaWorks technology.
This initiative took lots of after-office hours of my team and the outcome couldn’t be better!
So people, get it - use it - spread it - what are you waiting for?
Any suggestion / comment invited!
Till next time, keep rocking.
Hello & Welcome to all the security enthusiast (if u r not, then be one!),
For my first blog, let me start by introducing myself. I'm Vipin Rathor, working for IBM Network Authentication Service (IBM Kerberos) Development & Support team. I've been with this fantastic team for 3 years now (directly became part of this team after joining IBM). We are part of Storage & Filesystems group under IBM India Software Lab. My very nuclear team is full of sense of humor, one-liners and is quick-witted, so am I.
Enough talking about me... let's see what to expect out of this blog.
This blog will basically serve as one-stop resource for computer security needs of yours. Focusing primarily on network security, data security, authentication protocol (especially IBM Kerberos), Security in Storage domain etc., we will try to cover latest actions here. Occasionally, you might see some off-topic but interesting feed about the happenings in security field around the world. If you want to me cover something specific, let me know.
This is all for the first blog, hang around for upcoming feed.
Bye for now & take care.