Cybersecurity@EMCworld 2013: Transforming the Trusted Cloud

In my earlier blogs on Transforming Security Analytics and Transforming Trust, I wrote about the strong focus we have on cybersecurity at this year’s EMCworld, previewing several of the sessions that will highlight security topics. In addition to those presentations, we’ll also once again have a Birds-of-a-Feather session, focused on Building your Trusted Cloud. It’ll…

The next marketing buzzword in security is…

Every year we seem to have a new buzz term in security. As someone who lives in the security product marketing world I’ve seen trends come and go. Terminology that was once mandatory in every piece of collateral suddenly becomes stale and cringe-worthy (APT is becoming one of these). We’ve had a bunch of buzzwords and phrases; some were pretty good and some were really terrible. I should know I helped propagate some of these buzzwords.

The move to an intelligence-driven security model

Albert Einstein defined insanity as doing the same thing over and over again and expecting different results. Reflect on that for a moment. For the past 10 years, the Internet has become a ubiquitous form of communication. Growth of digital content and use of mobile devices have soared, organizations have opened their infrastructures to enhance…

The Digital Universe and the Smart Grid

Among the materials associated with their just-released report on the Digital Universe, IDC has just posted a new Youtube video of John Gantz and David Reinsel, called “The Digital Universe and the Internet of Things,” discussing the implications of this massive explosion of data.

Looking for the Unknown Risk

A couple of weeks ago, I spoke at the annual Computerlinks Forum in Münich, sharing the agenda with a number of other major security vendors. We decided that a good topic would be “The Next Generation Security Operations Center”, a discussion about the fundamental shift in security strategy that is driven by the changes in our adversaries and their tactics, as well by the changes in the enterprise that enable different attack models.

Orchestrating a New Solution for User Authentication

The problem that RSA and Zscaler are taking on is a fundamental one for the new dynamic of user interaction with enterprise information. User access increasingly comes from outside corporate networks, using devices not controlled by the enterprise IT teams. Connectivity with IT systems is increasingly in short duration bursts and employs many different approaches: HTTPS, VPNs, VDI. The security posture of the user device changes continuously as the user accesses different resources from different locations, and I don’t mean just between home and office, or between different cities as we travel. It’s being connected via our home wireless at 8 a.m, via the office LAN at 9, the Starbucks wireless at 10 and so on. We are all out in the cloud a lot of the time!

The Kitchen Sink of Security Management

On a recent visit to a number of companies with an increasing focus on IT security, a sense of common frustration was beginning to develop. The levels and number of security issues were a concern, and keeping ahead of the security risks has lots of CSO’s scrambling to show they are on top of these high visibility issues.