For a long time now, people (employees, users) have been touted as ‘the weakest link’ because of the tendency to make mistakes or try to bypass cumbersome processes, with no malicious or criminal intent in mind,” says Anthony Lim, Senior Cybersecurity Advisor, Asia Pacific, for Frost & Sullivan and Vice-Chair for (ISC)2 Application Security Advisor Council.
The 2015 RSA Conference provides security professionals access to myriad keynotes, educational sessions and solutions for today’s cybersecurity risks. Whether you’re headed to San Francisco for the conference April 20-24 or you’re observing cybersecurity trends from your office, here is a sampling of some of the trends, products and services showcased at this year’s event.
According to frequent headlines in the press, cybersecurity is an issue that has seized the attention of corporate boards and the executives who report to them. The reality is probably more nuanced. Although the largest companies in some sectors are engaged in extensive risk management efforts, the broader business community in the middle market remains at best uneven in its response, says Matthew F. Prewitt, partner with law firm Schiff Hardin in Chicago, chair of Schiff Hardin’s data security and privacy team and co-chair of the trade secrets and employee mobility team.
The character Don Quixote became legendary tilting at imaginary giants that were ultimately just windmills dotting an expansive countryside. His cause was noble, but his efforts were fruitless and completely misguided.
Rapid growth in the volume of sensitive information combined with new technologies has chipped away at the effectiveness of traditional endpoint protections and network perimeter security.
Data security used to be relatively simple. Office buildings and areas within them presented clear “perimeters” that companies could protect with locks, alarms, and if necessary, searches of belongings.
Cloud computing technology providers are rapidly improving the effectiveness and efficiency of network security, and what we are seeing is just the beginning. If your business is not already taking advantage of cloud-based security solutions, chances are high you will benefit from this emerging market soon.
In light of all the headline-grabbing network security breaches in the last year it's understandable that enterprises might be on high alert to prevent their own organization from being thrust into the spotlight.
September 1, 2014
Network and security components must be able to communicate so that if an attacker penetrates one system, others can respond immediately to take preventative measures. IF-MAP is a robust protocol that enables information sharing between disparate systems.