RSA Leverages Big Data to Detect and Investigate Security Threats

As cyber attacks become more advanced and damaging, organizations are looking to integrate Big Data tools and techniques into their security operations to optimize threat detection and investigation. Organizations can no longer rely on traditional security systems that monitor and analyze only a slice of information from a … READ MORE

Mona Patel January 30th, 2013

EMC’s Approach to Vulnerability Response

Let’s face it – real software products have security vulnerabilities! While building strong secure software development practices goes a long way towards detecting and helping to eliminate security vulnerabilities during the development process, a strong product security program also needs to be prepared to properly handle and respond … READ MORE

Reeny Sondhi December 14th, 2012

Portfolio Approach to the Gold

Watching the Olympic games, I couldn’t help thinking about what it takes for a country to develop a team of athletes capable of winning gold medals in various arenas. When one athlete dominates a sport, that’s a sign of rare, world-class talent. But when multiple athletes from the … READ MORE

David Goulden August 27th, 2012

The Problem with 80/15/5

As I speak with CIOs, boards of directors, and others with responsibility for IT security and risk management, I hear agreement that a new model of cybersecurity is overdue.

Art Coviello August 21st, 2012
Click to Load More