The End of an Open Internet? Skip to main content

Gartner Forecasts Security and Risk Management Spending in India to Grow 12% in 2024

  GenAI-Driven Attacks Require Changes to Application and Data Security Practices and User Monitoring End-user spending on security and risk management (SRM) in India is forecast to total $2.9 billion in 2024, an increase of 12.4% from 2023, according to a new forecast from Gartner, Inc. Indian organizations will continue to increase their security spending through 2024 due to legacy IT modernization using cloud technology, industry demand for digital platforms, updated regulatory environment, and continuous remote/hybrid work. “In 2024, chief information and security officers (CISOs) in India will prioritize their spending on SRM to improve organizational resilience and compliance,” said  Shailendra Upadhyay , Sr Principal at Gartner. “With the introduction of stringent government measures mandating security breach reporting and digital  data protection , CISOs are facing heightened responsibility in safeguarding critical assets against evolving cyber threats.” Gartner a...

The End of an Open Internet?


Details
Published on Tuesday, 31 July 2012 14:06
Written by Craig Sutherland
There was time when nobody took anything you said seriously in an email or SMS message for that matter. From a legal point of view most companies included a release, which included a waiver of liability message at the bottom of each email, stating they don't enter into contracts by email and if the message was sent to the incorrect recipient then please delete it.


The average office was awash with politically incorrect emails circulating around the corporate world. Sometimes they were amusing, often offensive but generally good natured, whatever the content we just deleted them and got on with our day. However, as the transition continued from printed to electronic media, the responsibility of the written word also changed.

Social and Electronic Media

Today, electronic media has become the noose in which to hang ourselves. In the old days, if you had a bad day at work you would sit down and bash out an angry resignation letter to your boss. Then think about what you had just written while searching for an envelope, and completely change your mind before you made the fatal mistake of leaving it at his or her desk. Even if you did so, and changed your mind once you got home, you could still arrive the next morning and retrieve it before damage was done.

However, that is not the case today. As soon as you hit the send button you have just committed the message into the ether and you can not undo it. Politicians, sports celebrities, you and me, no one is immune, there is no second chance. The situation has become exasperated with the growth of social media. For politicians, celebrities and the like, social media is a double edged sword. On one hand it provides instant feedback from a huge number of people as to how you are performing.

However, make the fatal mistake of sending the wrong tweet or uploading the wrong picture to your Facebook page and suddenly both your professional and personal life takes a tumble. Behave irresponsibly on a night out and you can almost guarantee someone has snapped tell all pictures and uploaded them to a social media site which is pushed out to thousands of followers, even before the party has finished. This does almost seem like George Orwell’s 1984, but played in reverse. It’s not that electronic media is contractually binding or implies an obligation on the part of the individual in any way, but sets a trend of behavior expected by a jury of your peers.

Freedom of Speech

The Internet as we know it today is a transport mechanism. It doesn’t distinguish between good or bad. The foundation of the applications which were developed to run on top of this transport were always intended to be a based upon freedom of speech and free of censorship restrictions. So why is there so much talk today about censoring and controlling the Internet with litigation? Prior to social media revolution, most governments (in the West at least) were reluctant to impose any sort of restriction on the Internet.



Most politicians thought of the Internet as a large electronic encyclopedia, a research tool or a source of dirty pictures. But along came social media which allowed splinter opposition groups to grow, become organized and before long coordinated riots broke out across the United Kingdom and governments in Egypt and Tunisia tumbled. The United States state department reeled in response to the leaked interoffice cables published by Wikileaks, and the Internet demonstrated its power to motivate people and bring about change in a entirely new way.

Western governments have always enjoyed a certain amount of control over the media. Carefully chosen press releases are fed to news organizations, who are either dependent on advertising revenues or are part of a large multinational conglomerate, who in turn have their own political agenda. Whatever the case, mainstream news is very guarded about what is reported and when. But the Internet allows news to be broadcast instantly, anonymously and without prejudice. The mainstream news organizations are often forced to play catch up on viral Internet news or risk appearing redundant.

Internet Piracy

The days of needing physical media for either listening to music or watching a movie have pretty much given way to online media. Prior to Internet piracy, police would raid illegal VHS or DVD duplication operations seize equipment, individuals and the content owners could rest easy that their intellectual property was safe. Today, content piracy is rife; media is replicated across the Internet minutes after being officially released. Indeed, both music and video stores have all but vanished from the high street, and online music and digital media stores have replaced this revenue stream altogether, however, the industry is losing millions, if not billions each year to the file sharing pirates.

It is this guise of Internet piracy protection in which governments are using as the catalyst to put in place controls on content, which make service providers, search engines and anyone else in the path, accountable for maintaining links or transporting traffic of an illegal nature. This is a battle which if successful would erode into the margins on service providers and content search farms alike. Hence lobbying from both sides is intense.

The piracy argument will be the catalyst for controlling the Internet, but the real reason will be curbing social media networks from organizing chaos. A strategy based on creating legislation which makes social media networks and service providers accountable for the activities of their users, reduces the burden on the governments to moderate and monitor user activity. Regardless, most governments today whether they admit it or not, have in place Internet kill switch contingencies, so if the situation arises, stopping the Internet is akin to blowing up the radio transmitter during the war time days of the early 20th century.

The Controlled Internet

What we are risking is a repeat of the mid 1990s where organizations like AOL and MSN realized that a global Internet portal with structured content governed and controlled was the answer to the unstructured, untrustworthy pages of information on the Internet, which allowed both AOL and MSN to thrive during the early years of the Internet. Of course once the rest of the Internet became better organized it was quickly realized that unlimited flexibility of the Internet was far more desirable than the rigid structure of these portals. But ultimately this is what we face as the alternative if censorship on content, activity and opinions are successful.

Going Underground

If this did happen there is a real risk of parallel Internet's being created? With the advent of VPN technologies designed to connect remote workers back to their corporate offices, VPNs could also form the basis of private Internet rings where users circumvent protection mechanisms put in place by connecting to private server resources, which would become the foundation of the underground Internet. This would become a cat and mouse game where authorities would infiltrate the private ring, attempt to shut it down and then the pass-phrase or security token changes or a new ring is created and the process starts again.

In life more often than not, it is the minority who ruin things for the majority. The vast bulk of people on the planet who use the Internet on a daily basis don’t organize revolutions or actively engage in illegal activity, but ultimately the few that do, could create such ripples through society that the universally free Internet that we know today ceases to exist.

Comments

Popular posts from this blog

Mobile Phones Sales Plummet

Details Published on Thursday, 16 August 2012 06:34 Worldwide sales of mobile phones reached 419 million units in the second quarter of 2012, a 2.3 percent decline from the second quarter of 2011, according to Gartner. Smartphone sales accounted for 36.7 percent of total mobile phone sales and grew 42.7 percent in the second quarter of 2012. "Demand slowed further in the second quarter of 2012," says Anshul Gupta, principal research analyst at Gartner. "The challenging economic environment and users postponing upgrades to take advantage of high-profile device launches and promotions available later in the year slowed demand across markets. Demand of feature phones continued to decline, weakening the overall mobile phone market. "High-profile smartphone launches from key manufacturers such as the anticipated Apple iPhone 5, along with Chinese manufacturers pushing 3G and preparing for major device launches in the second half of 2012, will drive the smartpho...

Now facebook hit with international class action privacy suit

An Austrian privacy activist has launched a wide-reaching class action suit against Facebook Ireland for breaching European data protection law. Anyone outside of the US and Canada can join activist and law student Max Schrems' suit via the website fbclaim.com, since they will have signed up to Facebook's terms and conditions via the Dublin-based European subsidiary. That amounts to around 82 percent of all Facebook users. After being live for just one hour, the site has collected 100 participants. The suit is seeking damages of €500 ($537) per user, and injunctions to be levied on the company for the following breaches:     Failing to get "effective consent" for using data     Implementing a legally invalid data use policy     Tracking users online outside of Facebook via "Like" buttons     Using big data to monitor users     Failing to make Graph Search opt-in     The unauthorized passing of use...

Cabling and Data Explosion

Details     Published on Tuesday, 13 November 2012 05:39 The explosion of 'big data' and the seemingly limitless demand for bandwidth are driving trends in today's IT-centric world. The 'faster, better, most cost effective' mentality has led enterprises of all sizes to closely scrutinize their communications networks and networking infrastructure. network-cables The need to deploy high speed network backbones that meet future requirements, while simultaneously reducing costs, present conflicting interests. With the need for higher bandwidth and flexibility for growth, organizations are looking at the network's physical layer and its overall life cycle as a capital investment that is essential to the business. Throw into this conundrum the increasing focus on sustainability and the task of designing a network high-performance, high-efficiency network seems almost insurmountable. Addressing efficiency at a physical infrastructure level has fueled the growing ado...