Predicting the future of security

AI, Artificial Intelligence, Cloud, Inspiring

When Rick asked me to write a blog for his platform, I was adamant I could write it about all the new and exciting technology emerging in the security field. We have AI coming up, Cloud Computing is already here and there is even behavior analysis coming into play in this exciting field of work. It would be impossible not to blog about it, right? I sat on the idea for a week, even two maybe and still had no blog. Rick was bugging me over-and-over and I couldn’t figure out why I couldn’t hammer out two pages about the upcoming technology in the security business. Than it hit me: It had to do with my other love in (work) life! Cloud Computing, or more specifically: Public Cloud Computing.

Cloud Computing

Think about it for a while: What are we really trying to secure here? We use VPN’s for private access to a Remote Desktop Server (for remote workers), so they can run some application we installed on that Remote Desktop Server to access data on some other server in a network. We use Private Cloud, Hybrid Cloud and find reasons or regulations why we can’t possibly go to the public cloud or even use traditional systems. However, my prediction is simple: Those are all going to disappear. Within five or ten years, all those semi-cloud solutions and reasons not to use a public cloud will be gone.

Securing the (public) cloud

So where does that leave my security blog? Well, for the public cloud to be safe and successful, there must be security in the public cloud. The difference is who delivers it. Right now, that task falls on the clients. The public cloud provider only secures the platform and access to the platform and the client is responsible for securing whatever is running on the public cloud. This makes for half-and-half solutions. As a client, you want to use AI and behavior analysis to secure the public cloud but can’t get the entire picture because you have no access to the lower levels of the system. The public cloud provider can not do it either, because they will not and cannot access the higher functions of the public cloud without your explicit consent.

The coming of age of AI

I predict that soon this AI will be available to clients. Access all the way down to the lower levels of the public cloud through an API where you connect the upper level AI you control. Instead of protecting the connections, applications and servers, you will protect the only thing that matters: data access. With that, you can use the public cloud in the way it was meant to. Provide services to your users, clients, customers, even the public. Let them decide themselves how they access and consume the information, through what interface or application, or through their own AI. We already see this shift a little bit in the field. Products that harness AI to notice suspect behavior and generate alerts. Not necessarily because it is disallowed, but because it is strange that this particular user at this particular time from this particular location is doing what he or she is doing. As for the security field I work in myself: Our work isn’t done. There is still programmer error, users with terrible passwords and of course an AI to train and pester with strange requests to illicit a response. Would an AI stop monitoring if I told it to? And what if I told it to explicitly monitor its own log files for changes and mark those in its log files?

Where will it end?

The development of AI will continue up to a point where you as a person have a personal assistant that will fetch the information you need. How will it do that? By asking the AI of the data source if you have access. There is no real interaction between the person and the systems anymore, you are not bound to one organization or one data source, your personal assistant will simply find and serve data you need right now, like this awesome blog in your lunch break for some light reading while you munch down on your sandwich.

Biography: Sebastiaan van der Meer has been heavily involved with Microsoft Azure, virtualization and security through out his professional life. Currently he works for Securesult, a company specialized in helping clients become more aware and secure in an ever changing IT landscape. He has held roles as CISO, business developer and trainer for several organisations and speaker at several events regarding cloud and security. Did you enjoy this story end want to know more from Sebastiaan and get in touch with him? Connect with him on his LinkedIn page. Image credit 1, Image credit 2

Caesar Experts & a.s.r.: IoT concept to prototype in no time

Innovation, Inspiring, Internet of Everything, Internet of things, IoE, IoT

This blog originally appeared on the Caesar Experts blog

 

“Help us to learn about the business potential of a new technology”

This incredible question was asked at the beginning of this year by a.s.r. It was the start of a trajectory in which an a.s.r./Caesar Experts team set out with each other to implement the area of the Internet of Things for the non-life insurance of a.s.r. In this blog, I will outline how we moved from concept to prototype in only a few weeks.

 Inspire & experiment

With our joint team from a.s.r. and Caesar Experts we started with an inspiration session about the Internet of Things, followed by a hands-on session in which all team members began with the Internet of Things very practically. That allowed the team to see several applications and opportunities for the technological development of IoT very quickly.

Concept

After getting to know IoT, a case the whole team was enthusiastic about was selected, mowburn! The mowburn case was mainly chosen because it is a process in which the customer interaction is increased and because it can measure a lot from an IoT perspective. It is nice that everyone was enthusiastic, but what is mowburn? Mowburn are bacteria that raise the temperature, which leads to self-ignition. This does not only apply to hay, but also other organic materials. By speaking to experts from a.s.r., we figured out what the characteristics of mowburn are. It also became clear how the process of inspection works nowadays and what the added costs are to a.s.r. as an insurer.

Realise & Validate: prototyping & platform

With this information, Caesar started selecting sensors, logic, the network and other essentials. After this phase, the prototype is realised by Caesar and validated with a team from a.s.r. At the same time, Caesar started realising a platform which gives real-time insight into the current situation of the hay and its deviations. Several triggers and actions are built in to signal deviations early on, which made the system go from reactive trade to preventive trade.

 

“Caesar Experts added specific IoT knowledge to the project. This knowledge is not available in our organisation at this time. This lead to a positive impulse upon the realisation from paper to prototype.”

                                                   Chiel Kuijpers improvements adviser a.s.r. care

 The result

Adding more value to the customer dialogue is an essential marker for a.s.r.’s future. With this trajectory, we inserted the power of new technology to show a new, proactive form of customer interaction. We did this by showing the technical operation of an a.s.r. customer process and lift a corner of the veil to see the potential.

Internet of Things: From reactive to proactive

As you can see, Internet of Things can help to make processes, customer interaction and other operating items proactive. An increasing amount of businesses struggle with questions about their purpose and the added value of their business in the future. Added value: a value that might be increasingly difficult to realise but is essential to the existing of the companies in the future.

Do you want to think about the added value of new technology and how it can have a positive impact on your company? Contact us, and we will contribute ideas. From concept to prototype that you can validate with your business, to the management of the solution.