Skip to main content
banner image
venafi logo

Super Powers Are Great. But Most Execs Just Want Stronger, Faster Cyber Security.

Super Powers Are Great. But Most Execs Just Want Stronger, Faster Cyber Security.

February 6, 2017 | Brooke Cook

Day in, day out, IT security teams perform superhuman feats every day. All behind the scenes. And often against all odds. When we asked IT security leaders which super power would help their teams defeat cyber crime, a good number wanted to level the playing field with stronger, faster firepower. 

Most of the security leaders that we surveyed wanted super powers that gave them more control over identity and access management, as we highlighted in a previous blog. We also learned that they would like superhuman visibility with super powers like x-ray vision and hyper-awareness. And now let’s take a look at other super powers that would allow security leaders to strike faster and hit harder. They came up with some very creative super powers that have the potential to change the cyber security game in unexpected ways.

“While it isn’t very sexy or exciting, I think that the super power I would like to have is the ability to make changes to assets in the blink of an eye. It could be changes, such as configuration for supported cryptographic algorithms, or rapidly changing out non-complaint keys and certificates in order to remove vulnerabilities and improve the risk profile of the environment.” 
-Steve Jordan, Wells Fargo

“I’d like the ability to draw quality security personnel and have them come to life.”
-Joe Filer, Harland-Clarke

“Keep my IOT crock pot from becoming part of a botnet. It interferes with my cooking schedule.”
-John Sioui, IBM

“I’d like the ability to get application, OS, and hardware manufacturers to take security seriously. Instead of focusing on the next ribbon or navbar, give us apps, OSes, and hardware that are truly resilient.”

“I'd want my security super power to be getting the security budget I want now, without having to suffer a Yahoo level breach to get it.”

These guys aren’t dreaming of wildly exaggerated cyber security innovations. They just want more. And they want it to work better. They’re looking for security that’s smart, strong, and fast—all traits of the best of super heroes. It doesn’t seem like so much to ask for. And at Venafi, we hear them loud and clear. We do one thing. And our customers tell us we do it pretty darn well. Come see our superhuman protection for keys and certificates at RSA 2017.  

We’d love to hear what kind of super power you’d like to have. Share it with us on Twitter and tag @Venafi, on LinkedIn or at the Venafi RSA booth N-3924.

Not attending RSA? You can still picture yourself as a superhero. The first 50 people who upload their photos will be emailed a super hero avatar. Plus, you can enter to win a free VR headset. Find out how.” 

Like this blog? We think you will love this.
image representing big data
Featured Blog

Was ist homomorphe Verschlüsselung, und wie wird sie verwendet?

Was ist homomorphe Verschlüsselung? Zweck der

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Brooke Cook
Brooke Cook

Brooke is Director of Global CISO Community Engagement for Venafi. Her work involves building and expanding a global community of executive IT leaders of CIOs, CISOs, and Security Architectures from the Global 5000

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more