The CEO of the largest vendor of computer security tokens gives his prognosis for what's going to matter in '05.
Two weeks before RSA Conference 2005, the largest security conference of the year, InformationWeek senior editor George V. Hulme spoke with Art Coviello, RSA Security Inc.'s president and CEO, about phishing, spyware, and other security concerns.
InformationWeek: What are the top trends for the coming year in information security?
Coviello: We're seeing emerging and more targeted threats that are far more troubling than generalized worm and virus attacks. One area is phishing attacks--these are continuing on a widespread basis. I also see more-sophisticated spyware attacks that don't just track where you've been on the Internet, but also capture your keystrokes and passwords. With this type of spyware, you don't have to fall for a phishing scam to have your identity stolen.
InformationWeek: What's the state of your partnership with Microsoft for your SecurID hardware (which creates a six-digit number that changes every minute)? Is that helping users log on to Windows more safely?
Coviello: Everyone wants to criticize Microsoft, so I always get a lot of pushback when I say this, but it's in Microsoft's firm interest to overcome these security issues. They're taking a multipronged approach to improve security. They're working to create this trusted-computing environment by making secure code in the first place. And they've substantially upgraded their patch process and the speed with which they fix security leaks. No one likes this situation, but we're stuck with it until later versions of software are released. The third prong of their strategy is by reaching out to vendors like us to add security value to their software. We can make the Microsoft log-on more secure by replacing it with the SecurID token.
InformationWeek: How well is the strategy of marketing your ClearTrust identity-management software to customers of your security tokens going?
Coviello: If you look at what an identity- and access-management system should contain, it's the ability to prove someone's identity and authorize those identities to do things, and to get access to resources, which is what ClearTrust does for Web applications. There's an understandable and natural fit between strong authentication- and identity-management software.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.