As IT continues to empower a new, digitally-transformed world, infrastructure capability isn’t the only thing that needs to become more agile and flexible. IT security must also evolve to be more adaptable, more proactive and less reactive to let today’s workforce embrace the cloud.
After all, it doesn’t make sense to unleash new, agile IT applications only to weigh them down with traditional security strategies that create delays, restrictions and outright denials.
For example, in some cases with IT as a Service, a user can provision a virtual machine (VM) in five minutes but then must wait three to five days before security allows access to the data he or she wants to work with.
The question is, how is IT security going to change in this new digitally transformed world so that we can fully take advantage of the agility and simplification of cloud-enabled infrastructure.
A key part of the answer lies in a new approach to trust and risk assessment.
If your organization is struggling with how to keep your enterprise data secure in the cloud, you aren’t alone. The fact is, the modern data center poses some fairly new security challenges and there is no rule book on how to meet them. Even in security, we are learning as we go.
As we in IT security scramble to put more and better controls in place to combat a changing array of cyber threats, we as an industry are facing an interesting dilemma: How do we assess the usefulness and value of all the controls we have deployed over the years and continue to have in place?
After all, as I talk to people across the cyber security industry, I almost never encounter anyone who can tell me a story about having turned off a security control once they turned it on. Yet, with the changing threat landscape, we clearly need to be adding new security technologies and processes to our already substantial arsenal. (more…)
Technologies such as mobile, social networking, analytics and cloud computing are changing the security landscape, and security technologies are rapidly evolving to address that change.
It’s not just the technology that needs to change, however: security teams need to change as well.
EMC has evolved and must continue to evolve our security team to effectively combat the threats of today and tomorrow. The core skills essential to expand include business engagement and awareness; a consultative approach; the ability to sell or “market” security; and creative control design for the mobile and cloud-enabled world of tomorrow.
Data-hacking hound dogs beware. EMC recently got a little help from Elvis in battling cyber criminals.
The “King” was at the center of an integrated marketing campaign our Global Security Operations ran this spring to encourage IT users to avoid clicking on suspicious email links that could lead to phishing attacks on our company’s data.
The several-week advertising effort featured a videotaped parody of the Elvis Presley song “Suspicious Minds,” in which ITers acted out why users shouldn’t click on “Suspicious Links,” It also featured a security awareness contest.
The campaign resulted in more than double the number of users reporting phishing attempts via suspicious emails. It also substantially increased the number of users going to our security awareness site, which we call FirstLine in recognition of the fact that the actions of IT users are the first line of defense against cyber-attacks.
The opinions and interests expressed on Dell EMC employee blogs are the employees' own and do not necessarily represent Dell EMC's positions, strategies or views. Dell EMC makes no representation or warranties about employee blogs or the accuracy or reliability of such blogs. When you access employee blogs, even though they may contain the Dell EMC logo and content regarding Dell EMC products and services, employee blogs are independent of Dell EMC and Dell EMC does not control their content or operation. In addition, a link to a blog does not mean that EMC endorses that blog or has responsibility for its content or use.