“My software is secure, I use encryption!”
“My software is secure, I use encryption!” How many times have we, software security practitioners, heard this when engaging with software development teams? I certainly have, and this is typically...
View ArticleThe RSA Share Project: A Software Security Developer Community
This week, RSA, the Security Division of EMC, launched the RSA Share Project — an important milestone for those of us interested in advancing the adoption of security practices across the software...
View ArticleThe Security Apartheid: The beginning of the end?
Security has been notably absent from earlier evolutions in the computing industry. For long, the industry has evolved through two parallel universes: 1) The IT infrastructure universe creating...
View ArticleThe Security-aware Cloud
To build security into the IT infrastructure demands much more than secure software. It is also about having the IT infrastructure products deliver intrinsic security value as a core capability of the...
View ArticleCloud and Virtualization: Surpassing current levels of security
Earlier this month, RSA, The Security Division of EMC released a new RSA Security Brief entitled “Identity and Data Protection in the Cloud: Best Practices for Establishing Environments of Trust.” This...
View ArticleIn Cloud We Trust…
Throughout 2010, surveys have shown how the lack of trust in cloud computing is slowing the adoption of cloud services. This week at the RSA Conference in San Francisco, California, securing the cloud...
View ArticleSplit-value Cryptographic Authentication: Building Advanced Threat Resistant...
Advanced Threats are deeply impacting the way we develop secure products by fundamentally changing our working assumptions. We used to design and develop products to be attack resistant assuming that...
View ArticleEMC’s Approach to Vulnerability Response
Let’s face it – real software products have security vulnerabilities! While building strong secure software development practices goes a long way towards detecting and helping to eliminate security...
View ArticleWhy Use Security Analytics?
The difference between success and failure in cybersecurity today hinges upon having deep visibility into an organization’s digital environment and the ability to detect and respond to attacks before...
View ArticleDell and EMC: Why, and What It Means
This is a bittersweet announcement for me. I am incredibly proud of the business we have built here at EMC. It has been a journey that I wouldn’t have traded for anything. I love our people and the...
View ArticleNext Stop on the RSA Express: Abu Dhabi
I’m incredibly excited about attending RSA’s next conference, which will be held November 4-5 in Abu Dhabi. This marks the first time we’re holding a conference in the region and I certainly hope we’ll...
View ArticleSecurity Industry Predictions for 2016
This year marked a strategic shift from a maniacal focus on prevention, toward greater balance on monitoring, detection, and response capabilities. It’s become cliché to say that breaches are...
View ArticleBuilding the Modern Data Center on a Foundation of Trust
If your organization is struggling with how to keep your enterprise data secure in the cloud, you aren’t alone. As I spoke with customers at the recent RSA Conference in San Francisco, how to migrate...
View ArticleFive Security Lessons We Can Learn From the Theft of the Death Star Plans
Last year, I wrote about Six Management Lessons That IT Leaders Can Learn From Darth Vader and with the looming release of Star Wars: Rogue One, it is time to revisit the Star Wars universe. Rogue One...
View ArticleRansomware and What You Can Do to Help Protect Your Data
The largest ransomware attack in history hit many organizations worldwide over the past few days. Known as the “WannaCry” worm, it encrypts the files on a computer and demands a $300 ransom payable in...
View ArticleWhen it Comes to Ransomware, the Best Offense is a Good Defense
The need for cybersecurity awareness and preparedness is once again top of mind as companies across the globe are reeling after the WannaCry ransomware attack last month, and now the NotPetya...
View ArticleTLS Security and Data Center Monitoring: Searching for a Path Forward
Protocols are evolving to meet the demands of the future. We must continue to strengthen the security of these protocols to keep pace with the threat landscape. As such, Transport Layer Security...
View ArticleEdgeX Foundry and Industrial Security for the IoT Edge
This post is co-authored by Riaz Zolfonoon, an RSA Distinguished Engineer who leads the Emerging Technology group at RSA. He is responsible for strategy and technical direction for IoT. Riaz also...
View Article
More Pages to Explore .....