Data Protection Shouldn’t Be an Afterthought, Says Intel
John Furrier speaking with Jim Greene, Sr. Security Engineer for Intel at Intel Developer Forum, 2012.
When it comes to security architecture, many developments in the stack seem to be an afterthought, particularly in the application layer. Instead of a full replacement approach, Jim Greene is a senior security engineer for Intel proposes an incremental method to updating enterprise infrastructure. In fact, Greene has a very clear take on the state of cyber-security today – he shares his perspective with SiliconANGLE founder John Furrier at the Intel Developer Forum last month.
Greene says that the industry is in a very pragmatic place today: now that the enterprises no longer have a false sense of security and are past the doom and gloom stage, vendors like Intel are tackling the topic of how to make the cloud more secure while accommodating modern workloads.
He elaborated, adding that there are three things to take into consideration in cyber-security today: the hackers, the IT landscape, and the regulatory part. As a chipmaker Intel’s approach is to make the underlying hardware that powers consumer devices and data center products more efficient, reliable, and harder to crack. The firm is also collaborating with partners such as McAfee to offer security software and services that run on top of its processors.
According to Greene it’s impossible for enterprises to start implementing more modernized security measures. Implementing new technologies is an incremental process, much like the step-by-step transition to the cloud that these organizations take. The theme right now is rationalizing this process.
This is on one end. Over at the application layer, Greene says that it’s best to develop applications with security in mind from the get-go, rather than bolting on data protection features as an afterthought. He notes that this concept of ‘security DNA’ is also what defines the next generation cloud service providers: vendors that focus on keeping the data that customers store on their servers safe.
The emphasis on data is something Greene stressed. The security perimeter is changing –the cloud is nullifying traditional technological boundaries, and the perimeter is now around the data itself rather than the business infrastructure. See Greene’s entire interview below.
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.