The Top Data Security Trends from the RSA Conference for 2015 

Contact Us Today!

The RSA conference is an annual cryptography and information security conference that takes place in San Francisco. This year's conference will be held from April 20-24 at the Moscone Center. Feel free to click here to register.

This article will discuss some the upcoming data security trends that will be highlighted at the conference. Read on to learn more.

Packetworks provides internet and networking services for business clients. Our networks focuses on speed, simplicity and security. Click here to contact us today.


The Importance of Identity Verification

Online services are becoming more and more essential for businesses and individuals who are looking to remain on the forefront of technology. Cloud based resources and storage systems, as well as the rise of smartphones as essential devices, has made room for increased data security threats. This is because sensitive data is now on a server somewhere in the cloud instead of on a hard drive in the back room of a business. Mobile devices can easily be lost or stolen, which can also contribute to the potential risk that sensitive data faces.

The main factor in keeping data safe is ensuring that only the real person that owns the data can access it. More and more services are moving away from simple username and password authentication, and instead are relying on more elaborate measures that look to verify a user’s real identity via a two-step identification process.

However, this two step identification process also faces threats. Digital identities will always be susceptible to forging, and malicious social engineering can result in attackers gaining access to information by pretending to be a senior executive.

These trends have resulted in the creation and development of two security measures: Identity and Access Management (IAM) and Identity as a Service (IDaaS). Click here to learn more about those measures.

Shortage of IT Security Specialists

Upcoming IT personnel have started to be trained in security measures that are relevant to the cloud and the mobile devices that have developed in the past few years. This leaves a talent delay, where upcoming talent has yet to become experienced, and existing talent has not been trained in some of the security threats of today’s online world.

Jon Oltsik (senior principal analyst at Enterprise Strategy Group) headlined one of his conference sessions with a talk entitled “The security staff and skills shortage is worse than you think.” He went on to reference a survey that his company had conducted which found of IT hiring managers, 18% are finding it "extremely difficult" and a further 65% are finding it “somewhat difficult” to hire informed information security professionals.

Apple Security Flaws

Apple has long championed their operating system as immune to viruses and other malicious software. However, this notion has been found to be untrue, as over the years a few malicious pieces of software have managed to get onto a significant number of Macintosh devices. Recently, a major vulnerability in OS X was revealed, which prompted Apple to respond on their website.

As OS X gains market share, and becomes more and more popular among executives and IT professionals, expect the number of security threats it faces to grow.

Cloud and Mobile Security

Cloud and mobile security continues to be a topic of much discussion in the security world. The competing want of ease of access and the need for security find many companies searching for an equilibrium between the two. The BYOD (bring your own device) system has proved popular with businesses all over the globe, but it puts a strain on IT departments, as they now must look to secure individuals personal devices.

Educating employees, two-step authentication, routine and secure device backups and the ability to remotely wipe the data on devices are all steps towards a more secure future for the BYOD policy. For more about BYOD, see our two additional articles:

IT Strategy: Security Analysis of BYOD (Bring Your Own Device)

IT Strategy: Lower Security Risks of BYOD (Bring Your Own Device)

 

Read More Articles

 

Contact Us Today!


Sources:

http://www.petri.com/rsa-conference-2014-8-top-computer-security-trends.htm

http://windowsitpro.com/identity-management/year-identity-2013-edition

http://www.rsaconference.com/writable/presentations/file_upload/prof-m03a-the-security-staff-and-skills-shortage-is-worse-than-you-think.pdf


Twitter Facebook