Logo Header Menu

The state of the cyber security market, according to BlackBerry’s CTO

Charles Eagan, the CTO at BlackBerry, gives his impression of the cyber security market and what organisations can do to get ahead The state of the cyber security market, according to BlackBerry’s CTO image

“The largest cyber security strategy being deployed in the cyber security market is hope, ‘hope that it doesn’t happen to me’,” said Charles Eagan, CTO, BlackBerry.

Over the last few years there has been an explosion of connected endpoints and an explosion of technologies — things are moving to quickly and this pace has created a lack of standards. Indeed, almost daily, the news is full of ransomware, data theft and cyber attack headlines.

“We’re running a bit loose with all the connected data being generated,” continued Eagan.

But, organisations can improve with an improved security posture — an overall strategy that includes technology, education/training and best practice.

“There’s a lot of best practices that organisations can put in place to protect themselves and take care of consumers’ personal information,” he added.

BlackBerry’s transition to a cyber security company, its 2020 goals and the importance of trust

BlackBerry has moved from a device company to a software cyber security leader. It’s CTO, Charles Eagan, takes Information Age on this journey, while revealing the company’s 2020 goals and the importance of trust

Continuous authentication

More development is needed on what Eagan referred to as “continuous authentication or continuous security”.

The password is flawed. Once a malicious actor has it, they have access to all your information.

Instead, BlackBerry is looking at a way to build a behavioural model that determines whether or not the user is you, even if the correct password has been used.

“If the user is exhibiting unusual behaviour (time of use, file access etcetera), the program will be able to ask for multi-factor authentication and/or lock the user out,” explained Eagan. “This type of continuous security is really important — we need to leapfrog prevention security that is needed to provide the protection and be proactive.”

“We need to step up our game to be properly prepared for the future”

How does this continuous authentication work in practice? The more data an organisation has on its employee — location, time, patterns — the more comfortable the model will be at effectively authenticating people. Done effectively, this will lead to more security and fewer passwords.

Passwords are very ineffective as a one and only security infrastructure. Instead, organisations need a dynamic security model. And, in the interim, “multi-factor authentication is essential,” added Eagan.

Cyber security will always be an issue, “until we get rid of passwords” — Frank Abagnale Jr

How can organisations beat malware and ransomware; and get a stronger foothold in the cyber security landscape? Frank Abagnale Jr, security consultant and former con man, says the tables will never be turned “until we get rid of passwords”. Read here

Awareness and education

For all technology’s potential, improving education and awareness is the biggest source of protection for any organisation.

In BlackBerry’s case, similar to other large organisations, it will test employees with phishing emails based on known compromises in the industry. It will then publish a breakdown analysis of the results to share, educate and future-proof staff awareness. “Although, this is a continuous exercise,” Eagan said.

BlackBerry CTO discusses his role, Cylance and meeting evolving security needs

Information Age caught up with BlackBerry’s CTO to discuss what his position entails, now that the former device giant is a leader in cyber security. Read here

Cyber security advice

Eagan provided his best advice for succeeding in the cyber security market:

• Think about the security of the solution that you’re using.
• Think about the data that you’re sharing.
• The consumer should insist on cyber security, even on the installation of a connected doorbell.
• Ask questions; how is this data secure?

“Asking more about the security posture of the technologies that people are using will go a long way,” he concluded.

Sign up for Information Age Newsletters

Latest news

divider
Data Protection & Privacy
How can companies protect their digital advertising content?

How can companies protect their digital advertising content?

28 February 2020 / Retailers can use IP proxy networks to view digital advertising they’ve paid for in the [...]

divider
Cybersecurity
What’s the role of security testing in software development?

What’s the role of security testing in software development?

28 February 2020 / Security threats are on the rise, and they are relentless. As almost every company is [...]

divider
Emerging Technology & Innovation
Cracking the uncertainty around quantum computing

Cracking the uncertainty around quantum computing

28 February 2020 / Today’s leaders are inundated with the disruptive power of quantum computing and its potential applications [...]

divider
Releases & Updates
Capita study shows 58% of companies find cloud pricier than expected

Capita study shows 58% of companies find cloud pricier than expected

27 February 2020 / This result from the ‘From Cloud Migration to Digital Innovation’ report by Capita comes despite [...]

divider
AI & Machine Learning
Will Google Translate’s latest update end professional translations?

Will Google Translate’s latest update end professional translations?

27 February 2020 / Google Translate is on the cusp of releasing a brand new feature which will allow [...]

divider
Business Skills
How can directors be proactive over climate change?

How can directors be proactive over climate change?

27 February 2020 / Increasingly, climate change has become a global talking point. Following the Climate Change Act 2008, [...]

divider
Releases & Updates
Information Builders records growth in ARR in 2019

Information Builders records growth in ARR in 2019

27 February 2020 / Much of this has been attributed to ARR growth in cloud offerings from Information Builders [...]

divider
Cybersecurity
The seen and unseen scene at RSA Conference 2020

The seen and unseen scene at RSA Conference 2020

27 February 2020 / Welcome to the RSA Conference 2020 in beautifully sunny downtown San Francisco, California. While this [...]

divider
Cybersecurity
The c-suite and cyber security: taking the blame and taking action

The c-suite and cyber security: taking the blame and taking action

27 February 2020 / Across every industry, every country and every size of business, one thing is certain: the [...]

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest