Skip to main content

7 guiding principles for redefining information security

Data center virtualization, cloud computing, the growth of mobile applications and social computing are just some of the hot topics at the 2009 RSA Conference Europe that is currently under way in London - and they are redefining the way information security is applied.

To embrace them and seize the opportunity to build better security into the information infrastructure, RSA proposes Seven Guiding Principles encompassing the critical elements required to build an effective information security strategy within today's evolving security landscape - and this are the principles that they themselves apply:

1. Security must be embedded into the IT Infrastructure -- Security should not just be integrated within the infrastructure, it should be embedded within it. Teams from RSA and Cisco have joined forces to embed data loss prevention into devices such as the Cisco IronPort email security gateway. RSA and VMware have also engaged in a technology partnership to embed core security controls into the virtual infrastructure.

2. Develop ecosystems of solutions -- Ecosystems must be formed to enable products and services from multiple organizations to work together to solve common security problems. RSA has invested in the RSA eFraudNetwork community, an ecosystem created in collaboration with thousands of financial institutions across the globe to spot fraud as it migrates between and among financial institutions on a worldwide scale.

3. Create seamless, transparent security -- Making security largely transparent to users and systems that it is designed to protect is critical to bridging the gap between the rate of technological advancement and the ability people have to keep up with it. RSA and First Data recently announced a service designed to secure payment card data from merchants by eliminating the need for merchants to store credit card data within IT systems. This service is being built into First Data's payment possessing system, making it seamless and transparent to merchants and their customers.

4. Ensure security controls are correlated and content aware -- In the EMC Critical Incident Response Center, security information management is centralized so it can correlate data from information controls such as data loss prevention, identity controls like risk-based authentication, and infrastructure controls such as patch, configuration and vulnerability management systems. This approach to security operations is designed to accelerate how quickly security analysts can get the intelligence required to distinguish a benign security event from something more threatening to the business.

5. Security must be both outside-in and inside-out focused -- RSA argues security must include a two-pronged approach that protects both the perimeter (the outside-in) and the information itself (inside-out). Since users are accessing information from a variety of devices inside and outside the network as well as in the cloud, security policy and controls must adhere to information as it moves throughout the information infrastructure.

6. Security has to be dynamic and risk-based -- Organizations need to be positioned to dynamically correlate information from a number of sources and respond to real-time risks related to both infrastructure and information. RSA will announce this week that it is offering new consultative and advisory services to help enterprises implement or improve their security operations function to more effectively manage both risk and IT compliance programs.

7. Effective security needs to be self-learning -- The dynamic nature of IT infrastructures and the malicious attacks launched against them is outpacing the ability of human beings to keep up with their speed and complexity. For this reason, information security strategy must be dynamic and behavior-based. To help support this goal, RSA today also announced it is teaming up with Trend Micro to leverage real-time intelligence of spyware, viruses, spam and other data generated by their Trend Micro's Threat Resource centers.

Popular posts from this blog

June Malia Hot Lip Kiss Scene

Hanshika Motwani Biography

Born in Mangalore, India, on August 9, 1991, Hansika is currently studying in Poddar International School. She is the daughter of Pradeep Motwani and Mona Motwani. She has a brother by the name of Prashant Motwani. Although Hansika knows a number of languages, she mainly speaks Tulu and Hindi. She started her career as an child artist and went on to undoubtably become on of the best child artists the Indian Film and TV Industry has ever seen. She impressed everyone with her acting talents. She entered the film industry in the movie Yahoo where she acted as a child artist with Juhi chawla and Govinda the film though was delayed and never actually hit the silver screen, Hanshika’s talents were noted by Juhi and thanks to her efforts she got a role in the Hyundai Santro advert with Shahrukh khan. She bagged quite a lot of offers after that. She played major roles in popular TV serials like Kyunki Saas Bhi Kabhi Bahu Thi, Desh Mein Nikla Hoga Chaand, Shaka Laka Boom Boom etc. She also kept...

Another Try for a Windows Phone, but It’s Still Clunky

If you’ve never heard of a Windows Mobile phone, or never particularly cared what kind of software runs on your phone, prepare yourself. In the coming months, Microsoft will release a steady drumbeat of ads intended to make you want a device powered by its software. Related Should you care? Probably. Should you make a Windows phone your priority? Not necessarily. If you already have a phone that runs Windows Mobile and want to upgrade, the new 6.5 version will improve your life slightly. Otherwise, other mobile phones are probably a better bet. Windows phones have been around for years, mostly competing with BlackBerrys for the allegiance of business users. But while BlackBerry crossed over into the consumer realm with more user-friendly phones, Windows Mobile remained in its corporate cube, because of devices that could be so frustrating to use that few people would choose one without a corporate mandate. For much of the last year, Microsoft has been saying that its ...