In your opinion, which company or person has had the biggest impact on the information security industry within the last 10 years, and why?
There are so many companies and people that have individually had a significant impact on the information security industry that it’s nearly impossible to pick just one.
I’m a fan of first (root) causes and thus I’d point to not the people or companies, though they surely deserve the recognition and our thanks, but the technology that’s amplified their contributions.
In the past 10 years we’ve seen the rise of the Internet as not just a distribution mechanism for Flappy Bird and Candy Crush but as a serious platform that has contributed both to the rise in anti-security (that’s the bad guys, in case you were wondering) and the impact of those who ferret out, fix and warn us about their activities (that’s the good guys).
The fact that we can instantaneously reveal the insecure underbelly of just about any product and just as quickly find a mitigating solution has had a serious impact on everyone related to the security industry. Vendors are (generally) quicker to respond because the ramifications of not doing so will be broadcast immediately and with extreme prejudice. Multiple mitigation options can be located sometimes mere hours after the announcement of a vulnerability’s existence thanks to the millions of active, interested security professionals (and sometimes amateurs) who are notified.
If it weren’t for the Internet and platforms like Twitter, specifications like RSS, blogs and instant messaging capabilities, would I even know the name of Brian Krebs? Or Bruce Schneier? Rich Mogull?
I’d like to think their extreme contributions to security across a variety of areas would have had the same impact, but if I’m realistic, without the amplifying effect of Twitter and RSS feeds and social networking in general, they might not have.
Go Internet!
Lori MacVittie | F5, Sr Product Manager | @lmacvittie
To find out more about our panel members visit the biographies page.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.