Cyber Security 2019 Reading Time: 5 minutes

There’s no better time than the present, or so they say. And when it comes to protecting sensitive data and finding increased guardianship in the digital age, this adage has never felt more true. Looking around at today’s online threats, one thing becomes perfectly clear—the realm of cybersecurity has become, hands down, one of the most relevant and dynamic fields in the modern world. For anyone paying attention, the emergence of malware attacks on networks of all kinds has been a stark reminder of the critical need for a strong defensive posture, in both our personal and professional lives. From social engineering to the hacking of IoT devices to the spread of computer viruses, the news has been fraught with tales of unprecedented breaches and the growing demand for industry solutions.

For cybersecurity experts around the globe, the time is now to meet these challenges with determination, skill, and a big dose of collaboration. And right on cue, just when the scales began to feel forever tipped towards lawlessness, the RSA Conference of 2018 has appeared on the scene once again to remind us all that intelligence, expertise, and a strong commitment to integrity is still alive and well in cyberspace. And Comodo Cybersecurity will be there in force to share its vision of a more secure future and how our unique proactive technology can make that goal a reality. As Comodo Cybersecurity expert Dr. Phillip Hallam-Baker reminds us, technology developed in 90s has been largely ignored because the problems they solved had not yet emerged. “But now, it’s time to go back and see what we have in the toolbox and how they can be applied.”

The RSA Conference theme this year— “Now Matters”— highlights a key concept in information security today. No matter how you slice it, our digital landscape has taken on an unprecedented level of urgency and pressure. Cyber threats have begun to feel bigger, scarier, and more devastating, ushered in by the realization that current solutions are just not robust enough to handle this evolution. As Illinois Board of Elections Executive, Steve Sandvoss, poetically stated in a recent interview to 60 minutes, his IT department’s effort to battle the recent Russian cyber attack on the U.S. voting system was nothing more than “bows and arrows against the lightning.” Threat analysis tells us there is no waiting for tomorrow to address these types of cyber-threats; our safety and livelihood hangs in the balance. And now all eyes are on the cybersecurity industry to make the necessary changes and find the creative strategies to come out on top.

As a top innovator in the field, Comodo Cybersecurity understands this timeline and the need for a vigorous yet realistic approach. Yes, internet technologies have revolutionized the way people communicate and do business, but they have also created ongoing risk and the demand for trust. As a principle, Comodo Cybersecurity believes all users have the right to a safe and secure digital environment, an experience that can only be ensured through proactive software solutions. With the emergence of more and more malicious actors, establishing trust in the digital realm will require more than just an assurance—it will demand proof. And this is precisely why Comodo Cybersecurity containment technology is so effective. It enables systems to analyze all file types, including potentially harmful ones, and find a definitive verdict in less than one minute. Voilà. Trust established.

Attended by approximately 43,000 people, the week-long RSA event held this year at San Francisco’s Moscone Center kicked off this morning with a strong focus on education, risk management, compliance, and the need for organizational diversity. With a wide range of expert keynotes, including upcoming sessions with Comodo Cybersecurity’s Dr. Kenneth Geers and Dr. Phillip Hallam-Baker, there was no shortage of discussion around pivotal issues like trust, online privacy, and future ethics. As principal scientists for Comodo Cybersecurity, both Geers and Hallam-Baker will be using their expertise to heighten awareness around future strategies and the need for improved alliances in cyberspace.

Dr. Geers will be conducting three dynamic sessions this week at RSA, each one specifically targeted at learning more about the cyber-war we face and how it can be vanquished:

  • Cyber-Comrades: Alliance Building in Cyberspace: The first of three presentations, this discussion will focus on the fascinating ways our cultural history and national sovereignty have been affected by nation-states, and how our military, political, and economic alliances have formed as a result. Of course, these realities have done much to shape the IT challenges of today, with regards to data collection, information, and global intelligence. As we move into the next phase of our cyber reality, the way the world’s countries handle digital diplomacy, cyber laws, and all government-related organization will have a massive impact on the future of the internet. Tuesday, April 18th @ 1pm.
  • POTUS Is Posting: Social Media and National Security: Sure, we’ve been telling our kids for years about the need for increased safety online, but the U.S. president? It would seem so. After Russia’s recent manipulation of the 2016 election and Trump’s arsenal of reckless tweets, it has become painfully clear just how powerful social media has become in the digital landscape. For nation-states looking to spread their influence, social media has become not only a platform for crime, espionage, terrorism, and war—it has also become one of the most dangerous weapons in the world today. Tuesday, April 18th @ 8am.
  • Cyberwar on a Shoestring: How Kim Jong Un Stole My Malware: The internet is for everyone, not just those superpowers who wield the biggest keyboard. And someday soon, smaller nations and even non-state actors will find new ways to harness digital strength for their own purpose. This increase in usage will essentially create a cyber-battlefield where reverse engineering, re-weaponization of malware, and APT digital strategies will take center stage. The question is, are you ready? Tuesday, April 18th @ 2:15pm.

On a more cryptographic note, Dr. Hallam-Baker will be discussing the security applications and challenges users face in today’s digital world:

  • Why Did We Make Security So Hard?: Great question! Using his mathematical mesh theory as a foundation, Dr. Hallam-Baker will explore concepts around making computer use easier and more secure. If digital security is too unwieldy and difficult to use, the reality is people won’t use it—so even some measure of mediocre security is better than nothing at all. He will present innovative solutions related to personal PKI, key escrow, and offline master root, all of which can be effectively used to improve application profiles.
    Thursday, April 19th @ 8:30 am.
  • Two Keys Are Better Than One, But Three Keys Are Better Than Two: While sharing how the use of three or more key encryptions could have stopped breaches of massive organizations like the NSA and the CIA, Dr. Hallam-Baker will also offer insight into the next generation of public key protocols and how proxy re-encryption can be effectively applied. Friday, April 20th @ 9am.

And for those who aren’t worn out after a week of pondering the world’s digital security, there will be book signings, sandbox competitions, drinks and hors d’oeuvres, plenty of information security vendors to check out, including Comodo Cybersecurity, and even an RSAC bash on Thursday evening from 6-10pm. Learning, networking, and enjoying the industry’s most talked about event of the year should be on everyone’s calendar this week!