Quantcast
Channel: Speaking of Security - The RSA Blog and Podcast » security intelligence
Browsing latest articles
Browse All 11 View Live

Image may be NSFW.
Clik here to view.

The Kitchen Sink of Security Management

by David Mitchell – Product Marketing Manager for RSA On a recent visit to a number of companies with an increasing focus on IT security, I noticed a sense of common frustration developing among them....

View Article



Image may be NSFW.
Clik here to view.

What you don’t see can hurt you: Cybercriminals covering their tracks

Over the past few weeks, there have been several reports about the ways in which cybercriminals are making it harder to detect fraud by concealing what they’re doing.  One is a new kind of...

View Article

Image may be NSFW.
Clik here to view.

Orchestrating a New Solution for User Authentication

I’ve never spent much time in an office. I wouldn’t say that I’m Up in the Air as much as George Clooney’s Ryan Bingham. But the value of personal interaction with our customers from Sao Paolo to...

View Article

Image may be NSFW.
Clik here to view.

Security Intelligence and Identity: Reflections from the Munich EIC Conference

Last week my colleague Matthew Gardiner and I, along with Kim Cameron of Microsoft and Edwin van der Wal of Everett Consulting, presented a panel on “Security Intelligence and IAM” at the European...

View Article

Image may be NSFW.
Clik here to view.

Looking for the Unknown Risk

A couple of weeks ago, I spoke at the annual Computerlinks Forum in Münich, sharing the agenda with a number of other major security vendors.  We decided that a good topic would be  “The Next...

View Article


Image may be NSFW.
Clik here to view.

The Digital Universe and the Smart Grid

Among the materials associated with their just-released report on the Digital Universe, IDC has just posted a new Youtube video of John Gantz and David Reinsel, called “The Digital Universe and the...

View Article

Image may be NSFW.
Clik here to view.

The move to an intelligence-driven security model

Image: Internet cables are seen at a server room REUTERS/Kacper Pempel Albert Einstein defined insanity as doing the same thing over and over again and expecting different results. Reflect on that for...

View Article

Image may be NSFW.
Clik here to view.

The next marketing buzzword in security is…

“Whatever you put out I’m gonna buy it, so what’s your latest? I wanna try it” From “I’m a sucker for your marketing” by Sarah Jaffe   Every year we seem to have a new buzz term in security.  As...

View Article


Cybersecurity@EMCworld 2013: Transforming the Trusted Cloud

In my earlier blogs on Transforming Security Analytics and Transforming Trust, I wrote about the strong focus we have on cybersecurity at this year’s EMCworld, previewing several of the sessions that...

View Article


Cybersecurity Takes Center Stage: Notes from EMCworld Day One

Cybersecurity has been visible in EMC keynotes before. Last year Pat Gelsinger spoke about the importance of security in VMware architecture, for example. But this year is the first time that security...

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images