As cyber attacks become more advanced and damaging, organizations are looking to integrate Big Data tools and techniques into their security operations to optimize threat detection and investigation. Organizations can no longer rely on traditional security systems that monitor and analyze only a slice of information from a … READ MORE
Let’s face it – real software products have security vulnerabilities! While building strong secure software development practices goes a long way towards detecting and helping to eliminate security vulnerabilities during the development process, a strong product security program also needs to be prepared to properly handle and respond … READ MORE
Advanced Threats are deeply impacting the way we develop secure products by fundamentally changing our working assumptions. We used to design and develop products to be attack resistant assuming that the environment where they will be deployed may be compromised. We now have to develop and design products … READ MORE
Watching the Olympic games, I couldn’t help thinking about what it takes for a country to develop a team of athletes capable of winning gold medals in various arenas. When one athlete dominates a sport, that’s a sign of rare, world-class talent. But when multiple athletes from the … READ MORE
More than 20,000 people have joined us in San Francisco this week for the annual RSA Conference, where I outlined how outdated approaches to security must adapt to keep up with new technology and evolving adversarial tactics.