Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
Posted by: Adrienne Hall, General Manager, Trustworthy Computing
If I had to choose one word to describe this year’s RSA conference it would be “buzzing.”
That was the feel on the floor of the conference earlier this month, as security professionals from across the globe came together to discuss the core security and privacy topics of today’s computing industry. From the keynotes and panel sessions to casual conversations and demonstrations in the expo hall, there was a strong sense that we (the security industry) are making progress despite increasingly determined adversaries.
Much of what I heard and discussed with fellow delegates reaffirmed my view that the industry is getting better about designing, developing and deploying secure products and services. This is especially encouraging as the industry is experiencing a flurry of activity around new cloud computing and mobile solutions.
Of course the point of events like RSA is also to bring together industry thinkers and opinion leaders. I bumped into Jim Reavis, executive director of the Cloud Security Alliance, whose perspectives on cloud security are always interesting, in fact so much so that I asked him if he would consider posting a guest blog. I’m delighted to say that he agreed. Expect to see his take on RSA and future security challenges shortly.
You can now find the post here: http://blogs.technet.com/b/trustworthycomputing/archive/2012/03/15/guest-post-jim-reavis-on-the-rsa-conference.aspx