Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Security in the form of... a pizza box

MarthaAviles ‎02-05-2014 09:09 AM - edited ‎09-25-2015 08:30 AM

 I saw this article on Forbes last week, about a new technology called a “ShapeShifter.” According to the article, it’s a pizza-box-sized appliance that plugs into an organization’s network and muddles the code behind the customer’s website. Intriguing? Yes, I thought so. (And it’s a snazzy name, too!)


This nifty little device has raised around $26M from investors, and is going through testing now. This comes at an opportune time, as cybercrime is on the rise and organizations are spending copious amounts of time, manpower, and investments on preventing data breaches. This entrepreneurial way of thinking is of significant importance, as the standard, for the past several years, has been to fight the virus with an antivirus. Here, this device is pitting the hackers’ own tricks against them.


Let’s open a conversation about this—is this a rational solution? Or a better question…how long do you think it would take a device like this to become hacked? I can foresee that one of the caveats to any CSO might be that it’s just ‘another device’ to add to the security basket—particularly, when there are substantial NGIP systems out there.  What do you think?


Be sure to look for me at the RSA Conference! I'll be happy to continue this conversation with you.

0 Kudos
About the Author


Peter Alfred
on ‎03-26-2014 05:48 AM

It’s truly a nice and helpful piece of information. I am glad that you simply shared this useful info with us. Please stay us informed like this. Thanks for sharing.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference to learn from peers in every industry and hear from Big Data experts and thought leaders in an exciting, energy fille...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference and is the place to meet the world’s top information security talent, discuss new products and share information...
Read more
View all