Access "Marcus Ranum chat: Security startups and security innovation"
This article is part of the April 2012 issue of An expert guide to tokenization and using it effectively
Marcus Ranum: Peter, thanks for taking the time to talk. I know some security people probably wonder why a stock market/financial analyst's views are relevant, so let's get that out of the way first. Whenever I talk to you, I realize the forces outside our little industry, which most security practitioners never see, are probably more powerful than we realize. Vendors buy each other, products that we love disappear, and there's a whole level of stress to the system that we only notice when it blindsides us. I know this is a huge question, but what effect is the recession we're in going to have on the technology pipeline that's available for security practitioners? Peter Kuper: The recession has unfortunately further tilted the advantage to the big vendors as they can weather the tough times far more easily than private companies given their sheer size and customer base. They can also access capital in ways completely unavailable to private companies. Marcus: Well, we’ve certainly seen the trend of “big companies get bigger” even in a tough market. So does ... Access >>>
Premium Content for Free.
Unified threat management devices for the enterprise
by Joel Snyder, Contributor
UTMs aren’t just for SMBs anymore. Here are four requirements for enterprise-grade UTM.
AMI networks: PKI security considerations
by Seth Bromberger, Contributor
PKI components in smart grid and AMI infrastructure introduce new hazards.
- Unified threat management devices for the enterprise by Joel Snyder, Contributor
Understanding tokenization: What is tokenization and when to use it
by Adrian Lane, Contributor
Tokenization protects sensitive data to reduce the compliance burden.
Web browser security features make attacks harder
by Robert Westervelt
Accuvant analysis and hacking contests illustrate browser security improvements.
- Understanding tokenization: What is tokenization and when to use it by Adrian Lane, Contributor
Don’t turn security Big Data analysis into a forgettable cliché
by Michael S. Mimoso, Editorial Director
It’s easy to be cynical about the latest security buzzword, but don’t be so quick to dismiss it.
Marcus Ranum chat: Security startups and security innovation
by Marcus J. Ranum, Contributor
Security expert Marcus Ranum talks with Peter Kuper, a partner with In-Q-Tel focused on funding compelling startups to accelerate innovation for the intelligence community.
Information security roles and technology shifts
by Paul Rohmeyer, Contributor
New technologies and business models are rapidly changing the role of the security pro.
- Don’t turn security Big Data analysis into a forgettable cliché by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...