In his #EMCworld keynote on Tuesday morning, Joe Tucci used the phrase “the sea of trust” to capture the pervasive role that security has to have in the success of the “third platform” of mobile, cloud and big data. It’s a great metaphor, reflecting not only the pervasiveness that security has to have, but also the dynamism and power that it needs to embrace.
Cybersecurity has been visible in EMC keynotes before. Last year Pat Gelsinger spoke about the importance of security in VMware architecture, for example. But this year is the first time that security has taken center stage in the opening keynote.
Big Data is the buzzword making headlines today. From improving medical diagnosis and treatment to energy conservation, businesses around the world are using Big Data analytics to transform the data they store into actionable information. Even here at RSA/EMC, we are working to leverage Big Data analytics to improve the way our customers detect and respond to threats. You can be sure that if legitimate businesses are using the latest and greatest technology, cybercriminals are too!
The application of Big Data analytics to security has resulted in a transformation not only in detecting and responding to threats. It also transforms how we establish and evaluate trust, based on understanding risk rather than expecting absolute security. This transformation doesn’t just affect security professionals. Understanding trust is critical for many of the topics that are explored at EMCworld, including cloud, virtualization, storage and document management. Understanding trust can help in enabling new business opportunities, finding more effective operational processes and working more effectively with partners.
We’re well into the preparations for EMCworld 2013, to be held May 6-9 in Las Vegas. There’s been a significant RSA presence at EMCworld ever since RSA was acquired by EMC back in 2006 – including the presentation I gave on storage encryption and key management back at EMCworld 2007 in Orlando! This year we’ll have even more RSA presence than ever, exploring the “Lead your Transformation” theme from the perspective of security and trust.
In this edition of the RSA Speaking of Security Podcast, Tom Chmielarski, Practice Lead with RSA’s Advanced Cyber Defense consulting practice, talks about specific threat intelligence strategies that organizations can take in the defense against malware and advanced attackers. Tom is one of the lead consultants bringing RSA’s Next Generation Security Operations Design and Implementation [...]
The SBIC has produced a new report that is mobile centric called “Realizing the Mobile Enterprise.” The council builds on data. In this case, it builds on a fascinating series of online polls that show a rapid litmus-like test of the mobile landscape and, in particular, the degree to which “the enterprise” (an interesting notion [...]
My blog today reflects on newly published research from Jon Olstik at ESG (from whom I borrowed the title of this blog), which covers the collision of advanced threats, security monitoring, SIEM, big data technologies and techniques, and organizational security maturity. In the paper Jon clearly brings forward his argument – with which I completely agree – that security threats have changed and thus the tools used and approaches for defense need to change significantly. I recognize this sounds a bit clichéd, but read the paper and you will see that there is a clear argument and evidence to back up this claim. One very obvious technical trend is that the flood of security data that is required to provide the visibility that is necessary to improve the organization’s defenses, have gone up — way, way up.
Albert Einstein defined insanity as doing the same thing over and over again and expecting different results. Reflect on that for a moment. For the past 10 years, the Internet has become a ubiquitous form of communication. Growth of digital content and use of mobile devices have soared, organizations have opened their infrastructures to enhance [...]
I like Star Trek. I’ve always wanted to be Captain Kirk (had to pick one…Picard is great too) sitting in that chair on the bridge of the Enterprise with seemingly endless resources at my disposal with a mission to protect the universe. I’m not giving up, but that’s probably not going to happen. However, I do get a bit of the same thrill as I have the opportunity to work in the Critical Incident Response Center lab we have set up at RSA for research and demonstration purposes.