Application Security , Next-Generation Technologies & Secure Development

Improving Application Security

Arxan Technologies' Rusty Carter on Addressing Current Threats
Rusty Carter, vice president, product management, Arxan Technologies

As attackers get increasingly sophisticated in reverse-engineering applications, it is imperative that enterprises secure trusted applications that are reaching back into the datacenter from beyond the perimeter, says Rusty Carter of Arxan Technologies.

See Also: 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys

In this video interview at the RSA Conference 2018, Carter discusses:

  • Detecting attempts to tamper with application integrity;
  • Cryptography and application security;
  • Application security analytics and measuring risk.

Carter, vice president of product management at Arxan Technologies, has over 20 years' experience in the field. Previously, he led product management at Symantec, McAfee and Pulse Secure (formerly Juniper). Carter holds international patents in the fields of information security, AI/machine learning, telecommunications, mobile devices and user interaction.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.