As 2015 winds down to a close, I reflect on what 2015 brought IT.
2015 was a great year for looking forward by looking back. Who knew that the "Back to the Future" movies would implant such expectations for us and 2015? Before we knew it, Hoverboards would be our focus; and yes, despite decades of so many losses, we just felt it was probable, no, LIKELY that the Cubs would win the Series, especially after smacking their arch-rivals into the playoff dirt.
Remember 2001? The movie was 1968 and the book earlier. 2001 promised us some great things, large revelations. Many of those didn't happen, either.
I will soon resume my former practice of blogging about coming Information Security trends, trends in hacking, tooling, and the like. I don't think they will be 100% accurate. Instead, it may take some time for the trends to surface. So why do it?
I've been blogging on this site since 2001. Most of the early stuff did not survive the restructuring of the site, but overall, my predictive blogs are slightly more accurate than flipping a coin.
After spending a little more than two years building out my (soon) past employer's pentesting program and getting some excellent SANS training and certifications (SANS.org--You Rock!); I've seen firsthand how security has taken a big turn from past approaches.
For me, the more realistic approach to security, discussing what hackers can do by following vulnerability reports and the like, this is no big change. I'm a former app, net, and/or OS admin, after all. Being cognizant of the issues is what an admin does. But today's security analyst must be able to dig into the tech and be able to discuss these details with internal customers. That was not old school comfort zone...
But I'm getting ahead of myself. Jot a few words below. What are your predictions for the coming year?
JT, blogging on Windows, Developments, Open Source, Security, UNIX, and lots of other stuff. Let's partner on making this a true IT nexus of ideas in 2016!
P.S. I still get no payoffs, gifts, or anything from any vendor or technology mentioned in my blogs. I mentioned them, good or bad, because that's the realistic side of today's Information Security program.