Andy Thurai

Subscribe to Andy Thurai: eMailAlertsEmail Alerts
Get Andy Thurai: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Andy Thurai

As with most modernized economies, the United States economy utilizes capitalist principles. It is only fitting that we invented a technological solution that will help companies engage in c-api-talism using APIs in a more efficient manner. If we look back into the history of mankind, we progressed towards more civilized, mature, monetary-based economies on a steady basis. The progression from the Stone Age, to the Bronze Age, to the Iron Age, to the Industrial Age and to the current Digital Age all made strides towards the current digital economy. The Stone Age was about using stones with sharp edges as tools for hunting and gathering, which created a self-centered economy for accumulation of wealth for families and established tribes which led to a localized trade and economy. The Bronze Age created more sophisticated tools and hence an urbanization concept, fi... (more)

Why Are APIs So Popular?

Kin Lane recently wrote a couple of blogs about why copyrighting an API is not common. I couldn’t agree more that copyrighting APIs is uncommon. First of all, the API definition is just an interface (It is the implementation detail that is important, and needs to be guarded), so it doesn’t make any sense to copyright an interface. (It is almost like copyrighting a pretty face ). Secondly, the whole idea of exposing an API is you are looking for others to finish the work you started by just providing the plumbing work. Why would anyone want to get involved with a copyrighted API a... (more)

Application-Aware Firewalls

[by Andy Thurai] "Application-Aware Firewalls."You may have heard this term recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and even Web security, but most people don’t think in terms of application level security unless either you are the developer, admin, or user of those specific services or perhaps a hacker. Especially when your traditional network boundaries disappear you can’t carry all of those devices with you. When you move out of your traditional boundaries, towards ... (more)

Taming Big Data Location Transparency

Andy Thurai, Chief Architect & CTO, Intel App security & Big Data (@AndyThurai) | David Houlding, Privacy Strategist, Intel (@DavidHoulding) Original version of this article appeared on VentureBeat. Concern over big government surveillance and security vulnerabilities has reached global proportions. Big data/analytics, government surveillance, online tracking, behavior profiling for advertising and other major tracking activity trends have elevated privacy risks and identity based attacks. This has prompted review and discussion of revoking or revising data protection laws govern... (more)

Big Data, IoT, API – Newer Technologies Protected by Older Security

Nowadays every single CIO, CTO, or business executive that I speak to is captivated by these three new technologies: Big Data, API management and IoTs (Internet of Things). Every single organizational executive that I speak with confirms that they either have current projects that are actively using these technologies, or they are in the planning stages and are about to embark on the mission soon. Though the underlying need and purpose served are unique to each of these technologies, they all have one thing common: they all necessitate newer security models and security tools to... (more)