Page 131 - CDM-Cyber-Warnings-March-2014
P. 131
one for the security management of devices and another for data ingest and enrichment. As I spent some time with the team at their booth, I watched as they received an overwhelmingly positive response from the dynamic mix of attendees. It seems to me, this is one company you should take a look at and share your thoughts with fellow infosec professionals. From here, I visited one of my favorites – as I always say, encryption, encryption, encryption. Ultimaco This year’s RSA conference showed an industry that is looking to go back to basics, and to take control of their security. Buzz words like cloud and mobile aren’t cutting it anymore, and calling on policymakers for better norms of behavior or rules isn’t sufficient in the face of advanced persistent threats or professional espionage by third-parties like the NSA. How do we properly secure against threats? How do we build products that truly secure against attacks? What are the foundations of security and trust? With questions like these floating around at RSA, it’s no wonder Utimaco received a lot of attention. Utimaco’s hardware-based security solutions offer the root of trust to keep cryptographic keys safe, secure critical digital infrastructures and protect high value data assets. In the face of Big Data and the Internet of Things, businesses nowadays capture more sensitive and business- critical data than ever before, and they need to safeguard it. Compared to software solutions, hardware security modules offer unprecedented security, even in the most hostile environments, including physical. Utimaco offers the industry’s only general-purpose hardware security module as a customizable platform to integrate into with other security solutions to allow customers the ability to implement and integrate their own sensitive business applications within the HSM and the trusted environment that it offers. In addition to securing the highly sensitive data in the payment, banking and government security industries, Utimaco’s technology is also deployed to safeguard connected devices such as wearables, cars and home appliances as well as connected architectures, such as Smart Grids and manufacturing plants. In closing, with a record ~30,000 attendees, two expo halls filled to the brim with large players, medium sized and the little guys, it was quite a spectacle and sincerely overwhelming. If RSA Conference grows any larger in 2014, it will remind me of the good old days of COMDEX where you literally had to go from one end of Las Vegas to the next, wearing out your shoes and leaving literally so overwhelmed you had to wonder what you did for a week? Time to decompress…It’s possible I could have written another 20 pages about the conference but I’m hoping you’ll meet me there next year and see for yourself, if you missed it this year. Don’t miss out – come to RSA Conference 2015 and pickup an exclusive print edition of CDM. It’s less than 330 days to go (and counting)…can’t wait to see you there, next year! Source: Gary S. Miliefsky, CISSP®, Executive Producer, CDM " # % " $ " # ! !