Emerging Threats Loom

A Q&A with Art Coviello, CEO of the largest vendor of computer security tokens, who gives his prognosis for what's going to matter in 2005

George V. Hulme, Contributor

January 28, 2005

2 Min Read
InformationWeek logo in a gray background | InformationWeek

Two weeks before RSA Conference 2005, the largest security conference of the year, InformationWeek senior editor George V. Hulme spoke with RSA Security Inc. president and CEO Art Coviello about phishing, spyware, and other security concerns.

Targeted threats are a big concern, Coviello says.

InformationWeek: What are the top trends for the coming year in information security?

Coviello: We're seeing emerging ... threats that are far more troubling than generalized worm and virus attacks. One area is phishing attacks--these are continuing on a widespread basis. I also see more-sophisticated spyware attacks that don't just track where you've been on the Internet, but also capture your keystrokes and passwords. With this type of spyware, you don't have to fall for a phishing scam to have your identity stolen.

InformationWeek: What's the state of your partnership with Microsoft for your SecurID hardware [which creates a six-digit number that changes every minute]? Is that helping users log on to Windows more safely?

Coviello: Everyone wants to criticize Microsoft, so I always get a lot of pushback when I say this, but it's in Microsoft's firm interest to overcome these security issues.

They're taking a multipronged approach to improve security. They're working to create this trusted-computing environment by making secure code in the first place. And they've substantially upgraded their patch process and the speed with which they fix security leaks. No one likes this situation, but we're stuck with it until later versions of software are released. The third prong of their strategy is by reaching out to vendors like us to add security value to their software. We can make the Microsoft log-on more secure by replacing it with the SecurID token.

InformationWeek: How well is the strategy of marketing your ClearTrust identity-management software to customers of your security tokens going?

Coviello: If you look at what an identity- and access-management system should contain, it's the ability to prove someone's identity and authorize those identities to do things, and to get access to resources, which is what ClearTrust does for Web applications. There's an understandable and natural fit between strong authentication- and identity-management software.

About the Author

George V. Hulme

Contributor

An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights