Man and technology

Identity: The Keystone of Security

Okay, I’ve started this blog post with a deliberately controversial title, which truthfully is intended to be a bit of a thought experiment. Let’s suspend our disbelief, and think about the security landscape from this perspective for a few minutes. Really, this posting is intended to recap my thoughts and impressions from last month’s RSA…

Read More
LAX

Embracing the Challenge of Cyber Security

As summer draws to a close, I resumed my usual heavy schedule of travel last week with a keynote at the SIGS Technology Summit in Bern, Switzerland at which Hugh Thompson also spoke. During the panel at the end of SIGS Technology Summit, one of the most difficult questions that came up was whether we…

Read More

Stephen Colbert and the Ring of Steel

Believe it or not, the “Colbert Report” has been a Comedy Central mainstay for nearly a decade.   For me, it was a staple of weekday college nights, one that offered a refreshing (and often hilarious) take on the news stories we all-too-serious journalism majors spent five days a week over analyzing.   Keeping up with current…

Read More

Balancing Security and Privacy: Embracing an Advanced Cyber Defense Strategy

In his recent keynote at RSA Conference Europe 2013,  Art Coviello, RSA Executive Chairman, painted a sobering picture of the challenges confronting cybersecurity professionals. We face a continued increase in the sophistication and rate of cyberattacks. Attack surfaces are expanding, due to the explosion of apps, digital content, mobile devices and virtualized infrastructure.  And legacy…

Read More

An All Access Sweep – RSA Wins Big at SC Mag Awards

At the annual SC Magazine Awards, RSA’s defense of access continues to drive the state-of-the-art for the market. First, RSA SecurID maintained its position as the standard by which authentication solutions are judged, garnering the 2013 SC Magazine Award for Best Multifactor Authentication Solution. Additionally, following the mantra of “trust, but verify” RSA’s work in risk analysis and evaluation was also showcased with the award for Best Fraud Prevention for RSA Adaptive Authentication. This award is particularly satisfying as the Conference this week also saw the release of the groundbreaking RSA Authentication Manager 8.0 which brings big data-driven risk analytics to bear to achieve new levels identity assurance in enterprise, cloud and mobile environments.

Read More

The next marketing buzzword in security is…

Every year we seem to have a new buzz term in security. As someone who lives in the security product marketing world I’ve seen trends come and go. Terminology that was once mandatory in every piece of collateral suddenly becomes stale and cringe-worthy (APT is becoming one of these). We’ve had a bunch of buzzwords and phrases; some were pretty good and some were really terrible. I should know I helped propagate some of these buzzwords.

Read More

Security Strategy and Big Data

There’s been quite a lot of discussion recently about applying big data to improving security.  My colleagues Rashmi Knowles and Barrett Mononen have written a couple of blogs about it.  Our RSA/Netwitness CSO Eddie Schwartz spoke about it at RSA Conference China and the Splunk IPO in April certainly created lots of buzz around big…

Read More

Keys, Clouds and Conferences

As I mentioned in my last blog, one of the sessions I gave recently at RSA Conference China was a discussion of “Keys and Clouds”, exploring various models for key management and encryption in the cloud. It’s a topic that comes up often in my meetings with customers about private, public and hybrid cloud strategy.…

Read More