Speaking of Security – for Smart Grid

I’ve touched on Smart Grid a number of times in my blogs for RSA’s Speaking of Security, including in a recent one on Metadata and Evolution of Security, where I used Smart Grid as an example of security evolution, moving from isolated controls to integrated systems. In The Digital Universe and the Smart Grid,I wrote…

RSA Archer Named a Leader in 2013 Gartner MQ on Business Continuity Management

I’m thrilled to announce that EMC-RSA was named a leader in the Gartner 2013 Magic Quadrant for Business Continuity Management Planning (BCMP) software! You can read the complete MQ here on Gartner’s website. For this Magic Quadrant, Gartner evaluated 18 enterprise-class vendors and their criteria focused on two broad areas – their Ability to Execute…

Vick Nails What the Kansas City Chiefs Can’t

It could be the anticipation of the NFL season kicking-off in a week, or maybe it’s because I’m still basking in the afterglow of drafting what will surely be an undefeated fantasy team, but I can’t seem to get the return of professional football off my mind.  It helps that my allegiance lies with the…

Information Sharing Done Right – What’s Useful to Share and Who Should Get It?

By Kathleen Moriarty, Global Lead Security Architect, EMC Office of the CTO Continuing on the theme of sharing information in a directed way to have a broad impact, I think it is important to think further about how we can share information effectively. For me, this means breaking down what is important to share and…

What James Bond Knows About the Oil Industry’s IAM Troubles

James Bond villains have always reflected the fears of their times.  Following the 1963 Cuban Missile Crisis, when paranoia over Soviet-led nuclear annihilation reached its apex, the cinematic representation of 007 nemeses temporarily shifted away from creator Ian Fleming’s self-described “fairy tales for adults” ripe for later parody, transforming them into a slightly bleaker “reality”…

Transforming Expectations for Threat Intelligence Sharing – Podcast #250

According to the author of a new RSA Perspectives paper, “sharing information equally with everyone often, results in information that’s helpful to no one.” Cyber threat intelligence sharing has gotten much attention recently as the industry has discovered through numerous examples that the underground network of cyber criminals and attackers actually do a better job…

Breaches Now Number One Threat Facing Businesses

The Insurance Journal, an online magazine dedicated to, you guessed it, the insurance industry, recently published findings claiming that businesses now consider cyber threats the number one impediment to long-term vitality, outweighing traditional risk concerns like burglary, litigation or natural catastrophe for the first time.  Yet, amazingly, the article estimates that less than one third…

The Security Re-Eruption Cycle

    It’s not uncommon to hear about the great technology disruptor that, after initial success, becomes larger and slower and ultimately becomes disrupted itself (see: Palm Pilot, Atari).  Naturally, the same phenomenon exists in security.  However, there’s a parallel phenomenon that occasionally crops up, in which we’re not dealing with Disruption, but with Re-Eruption.…

White House Stresses Need for Increased Cybersecurity

The White House’s official blog is a miscellany of all posts presidential, some providing worthwhile commentary on pertinent, executive policies, while others—not so much.  An entry about rebuilding strategies in the aftermath of Hurricane Sandy, for instance, is followed by an introduction to Sunny, the Obama’s friendly, new puppy.  Sandwiched between links of the President…

Chasing the Curve

When I was in school, one of the biggest topics of conversation around test time was the “Curve”.  For some students,  it was a blessing raising their probability of passing.  For others, the Curve meant that their final grade may or may not be affected so it didn’t impact their study habits.  For those that…