Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    Cyber-Defenses Are About Managing Risk: RSA’s Coviello

    Written by

    Fahmida Y. Rashid
    Published February 28, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      SAN FRANCISCO — The sheer volume of attacks against enterprises and governments in 2011 showed that security is critical, but the security industry is “in serious risk of failing” to protect organizations, said Arthur Coviello, executive chairman of RSA, during his opening keynote address at the 2012 RSA Conference.

      Signature-based and perimeter-heavy defenses no longer work, and the industry needs to shift attention to new types of security defenses, said Coviello, who kicked off the show Feb. 28. Organizations have to assume their networks will be penetrated and put in protections to minimize data theft or damage as a result of the compromise, Coviello told attendees who gathered at the Moscone Center here for the conference.

      Security technology that organizations should be considering should have three elements, said Coviello.

      The first is being risk-based, which allows IT managers to look at what is going on within their environment and properly prioritize what needs to be fixed. Managing risk is critical, he said.

      The second element is being agile, as the platform of choice needs to be situational aware and be able to react immediately when something goes wrong. Today’s security is often a “patchwork of controls” spewing out “too much data and not enough intelligence,” said Coviello.

      Finally, there is context-awareness, and this is critical. There needs to be a way to tell when a certain activity is an anomaly and not part of user behavior despite it seeming harmless.

      All these elements together allow organizations to respond in real time to threats.

      Organizations “have gone through hell” in the 12 months since last year’s conference, said Coviello, and that includes RSA.

      Coviello was referencing the incident where unknown perpetrators — who still have not been unmasked a year later — breached RSA Security servers and managed to steal data related to the SecurID two-factor authentication technology. RSA shared the pain of regaining customer trust and trying to secure its systems that other breached organizations felt, said Coviello.

      “An attack on one of us is an attack on all of us,” he said.

      RSA also experienced a sense of urgency to apply the lessons learned from the breach to make its systems stronger as well as to share the information with the rest of the industry. The attack influenced how the company shares data, its investments and its overall strategy.

      Types of Attacks Have Changed

      The types of attacks have also changed, as last year was the first time there were so many “stepping stone” attacks, said Coviello, referring to incidents where an organization was breached to steal information that could be used to launch a more complex and potentially more rewarding attack.

      The SecurID breach was one such attack, as there is evidence the attackers used the stolen information to launch attacks against Lockheed Martin, a defense contractor. The attacks against certificate authorities, such as the one against DigiNotar, a Dutch certificate authority, is another, as the perpetrators were focused on stealing security certificates that could be used to masquerade as legitimate Websites.

      Coviello hopes that the increasing number of attacks will strengthen the sense of urgency within the industry to work on methods to improve organization defenses.

      In addition, the trinity of emerging technologies€”mobile, software as a service (SaaS) and hybrid cloud adoption€”is exacerbating the security situation. These new trends are “transformative,” but because they open up the attack layer, it becomes even more challenging for IT departments to keep their employees and systems secure.

      It’s unprecedented that employees and consumers are adopting emerging applications and technology faster than governments and enterprises can absorb them, said Coviello. It’s no longer possible to separate the digital world from the physical, nor work life from personal. People have gotten so used to being able to do things online and have easy access to powerful machines that they are not willing to wait for IT to catch up.

      IT has to learn to manage what they can’t control, and security organizations have to learn how to secure what they can’t control, said Coviello.

      Cyber-adversaries are better at planning attacks and much faster at launching campaigns than IT teams are at detecting and blocking them. They are exploiting the gaps in a security that is a result of an increasingly hyper-connected infrastructure, he said. The industry has to move away from worrying about the network perimeter to keep threats out because the attackers can “outflank” the network perimeter.

      “The network will be penetrated. We should not be surprised,” said Coviello.

      “You can’t always get what you want,” he added. People would like a world with no risk. No auto accidents, no stock market crashes, no cyber-attacks. Since that isn’t realistic, people look for ways to reduce risk so that “smart people” can make “prudent decisions” to keep the systems and data secure.

      Coviello is optimistic, despite the challenges facing the information security industry: “If you try, you might find what you need.”

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×