• The importance of encryption and key management for security practitioners

    In this podcast recorded at RSA Conference 2015, Tsion Gonen, Chief Strategy Officer at Gemalto, talks about how if you're going to do encryption, make sure you do it right. Encryption done wrong is worse than nothing. You have to think about centrally, efficiently, and securely managing and storing cryptographic keys and policies - across the key management lifecycle and throughout the enterprise.

  • Strengthening trust in a highly connected world

    In this podcast recorded at RSA Conference 2015, Dave Rockvam, Vice President of Product Management at Entrust Datacard, talks about how employees and other authorized users want convenient access to facilities, networks and apps. They want consistent experiences on phones, tablets and PCs. And they want to collaborate freely with peers and work with anywhere-anytime flexibility.

    New demands are changing the way we think about security and creating the need for end-to-end secure solutions. Just as the connectivity of our world is transforming the way we live and work, this new understanding of security is impacting the very core of how organizations operate.

  • Product spotlight: Qualys Continuous Monitoring

    Todayís cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an organizationís perimeter. As a result, vulnerable machines can be exploited within hours with toxic combinations of scenarios that can lead to compromises in their IT environments such as zero-days and phishing scams, which can instantly expose an organizationís data.

    In this podcast recorded at RSA Conference 2015, Wolfgang Kandek, CTO at Qualys, talks about how their Continuous Monitoring (CM) solution for the perimeter now includes internal monitoring capabilities enabling organizations to proactively monitor and get real-time alerts for critical internal IT assets such as desktops, servers and other devices.

  • Total data protection outside the firewall

    Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform.

    In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how Bitglass protects corporate data throughout its life cycle: in the cloud, at access, on the device, and on the corporate network.

  • Why saying YES is changing information security

    In this podcast recorded at RSA Conference 2015, Tsion Gonen, Chief Strategy Officer at Gemalto, talks about how the information security is a very different place than 5-10 years ago.

    The mindset of what organizations are doing remains largely unchanged, while everything else around them is evolving. Think about it, five years ago the data center was not fully virtualized and most of your infrastructure wasn't in the cloud. When you have such a large gap between the way you use data and the way you're supposed to secure it, you're going to break things down.

    The most valuable information security tool of the past, the denial, is dead. The threat surface is increasing dramatically, yet CISOs are under pressure to say yes to new technologies and hardware, to enable easier collaboration, sharing, BYOD.


Whitepaper: 10 things your next firewall must do

For enterprises looking at Next-Generation Firewalls, the most important consideration is: will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, May 29th