At the recent RSA Conference 2015, I attended some fascinating meetings and sessions filled with valuable insights. Here are two of them whose presentation slides are available for PDF download:
Nearly all innovative products start as appliances. There are many good reasons for this, but two stand out. One is that an appliance controls the environment the product has to live in. This saves a significant amount of quality assurance testing against multiple different types of environments, but more importantly ensures that the product has the right blend of resources to perform as expected.
The other day I got a call from a man who, in broken English, said to me, “You are being hacked right now!”
I knew right away what this was, but I thought I’d play it out a bit. I said, “Right now? As we’re talking?”
“Of course, yes,” he said, claiming he worked for “Microsoft Windows” and that my PC was sending him alerts about a hacker in my system. I kept asking questions about who he worked for and he kept repeating “Windows Support,” after first having said he worked for Microsoft Windows.
In today’s world, smart devices and great new applications are everywhere. Along with making our lives easier, they make the lives of security admins and chief information security officers (CISOs) a nightmare. To state the issue in laymen’s terms: BYOD policy and rogue applications are akin to the Trojan horse inside the sophisticated network perimeter defenses.