In his introduction to the Innovation Sandbox at RSA Conference, Hugh Thompson remarked on the critical role that small companies have in driving innovation. That’s certainly true and it was great to see the innovations of the 10 finalists who presented on Monday. But Hugh’s remark got me thinking about other dimensions of innovation, particularly in the light of the phenomenal range of capabilities evident in the exhibition hall at the conference.
At the annual SC Magazine Awards, RSA’s defense of access continues to drive the state-of-the-art for the market. First, RSA SecurID maintained its position as the standard by which authentication solutions are judged, garnering the 2013 SC Magazine Award for Best Multifactor Authentication Solution. Additionally, following the mantra of “trust, but verify” RSA’s work in risk analysis and evaluation was also showcased with the award for Best Fraud Prevention for RSA Adaptive Authentication. This award is particularly satisfying as the Conference this week also saw the release of the groundbreaking RSA Authentication Manager 8.0 which brings big data-driven risk analytics to bear to achieve new levels identity assurance in enterprise, cloud and mobile environments.
Every year we seem to have a new buzz term in security. As someone who lives in the security product marketing world I’ve seen trends come and go. Terminology that was once mandatory in every piece of collateral suddenly becomes stale and cringe-worthy (APT is becoming one of these). We’ve had a bunch of buzzwords and phrases; some were pretty good and some were really terrible. I should know I helped propagate some of these buzzwords.
“We need to champion and develop a new breed of Cyber Security Analyst…This new breed of analyst must have the right analytical skills, ‘big picture’ thinking and much needed collaborative “people skills” to ensure smooth information sharing with multiple stakeholders.” – Art Coviello
In the “The Game of Cybersecurity”, I suggested that we as security professionals should be doing more to take advantage of game theory for the insights it can provide into the threats that we face and into effective strategies for cyber defense. As it turns out, there were a several presentations at RSA Conference Europe 2012 [...]
As I mentioned in an earlier blog, among the sessions on big data at RSA Conference China was Samir Saklikar’s presentation on Embedding Security and Trust Primitives in Map Reduce. Samir is in the RSA Office of the CTO and has been focused on big data security for more than a year, exploring the security and privacy issues for big data, the application of current security technology to those security requirements and the definition of new capabilities that would provide significant benefits in addressing those issues.
How often do users get blamed for being careless by disclosing sensitive information or inadvertently clicking on a link that looks legitimate? Vendors and enterprises spend millions on security awareness education, but these same users continue doing dumb things and statistics show us that data breaches keep going up. Why are we not getting this [...]
There’s been quite a lot of discussion recently about applying big data to improving security. My colleagues Rashmi Knowles and Barrett Mononen have written a couple of blogs about it. Our RSA/Netwitness CSO Eddie Schwartz spoke about it at RSA Conference China and the Splunk IPO in April certainly created lots of buzz around big [...]
As I mentioned in my last blog, one of the sessions I gave recently at RSA Conference China was a discussion of “Keys and Clouds”, exploring various models for key management and encryption in the cloud. It’s a topic that comes up often in my meetings with customers about private, public and hybrid cloud strategy. [...]
I was at the RSA Conference in Chengdu, China last week, giving a couple of sessions on “Keys and Clouds” and “The Pillar of Trust: where Big Data meets Security”, the latter jointly with my colleague and fellow blogger Branden Williams. I’ll be writing (and speaking) more about both these topics, but there was another [...]