CALIFORNIA RSA CONFERENCE: A GOOD PLACE TO FIND FOR FUNDING SECURITY COMPANIES RED HERRING | RSA Conference: New Threats, Fresh Funding Converge: "RSA Conference: New Threats, Fresh Funding Converge When the information security industry’s biggest confab convenes in But that incident only highlighted for the public what many companies had already learned the hard way—security breaches are becoming scarily common. Intrusions are cropping up everywhere, from UCLA to the company that runs retail chains T.J. Maxx and Marshall’s. Businesses are scrambling to plug the holes as cyber criminals grow ever bolder and more sophisticated and the sheer number of different types of malicious software—viruses, worms, Trojans, and other afflictions—doubles on a yearly basis. “The bad guys are coming up with so many pieces of malware, they are flooding the analysis labs of security companies,” says Andrew Jaquith, a senior analyst at the Yankee Group. The RSA Conference, to be held February 5-9 in “Maybe you’ve locked the front door,” says conference attendee Bob Egner, vice president of product management and global marketing for Chicago-based Pointsec Mobile Technologies, which makes encryption software for mobile data. “But you didn’t think about locking the garage door, or maybe you didn’t think about the back door.” With an estimated $1 billion a year of investment money flowing into the coffers of security startups, according to the Yankee Group, and much blue chip interest, this year could be a make or break year for many of these niche companies. Securing the network with a firewall and antivirus software is no longer enough, industry executives say. The clutter of today’s portable media craze, everything from flash drives and PDAs to cell phones and iPods, means that it’s easier than ever for data to flow out. Protecting consumers with new authentication technologies, above and beyond the password and login, is also a priority. Not only does it protect customers, it also staves off bad press.
Startups and established vendors will hawk ways to stave off fresh data security threats.
February 2, 2007
By Andrea Quong
Legend
Location Of Theft in AQUA BLUE
URL Of Linked Article In STEEL BLUE or GREEN
Full Content Of Article In BLACK
Theft Description In Body Of Article in RED
URL Of Linked Article In STEEL BLUE or GREEN
Full Content Of Article In BLACK
Theft Description In Body Of Article in RED
Saturday, February 03, 2007
Labels:
Data And/Or Identity Theft Issue
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment