Our ability to secure data has been around for decades. The problem is trying to use secured data, that’s where we get into trouble, said Richard Rushing, CISO, Motorola Mobility in our conversation at Cybertech 2020 in Tel Aviv.

Once you start putting all these rights and permissions and slice and dice up data, it becomes a very cumbersome exercise that’s fraught with usability issues.

Thanks to Morphisec for sponsoring this video

Detection-based security technologies are by definition reactive, responding to threats after they’ve hit. Morphisec takes an offensive strategy to advanced attacks, dismantling the attack pathways to prevent an attack from ever landing. No detection, no hunting, no clean-up. Watch the on-demand webinar to see how it works. More at www.morphisec.com.

Got feedback? Join the conversation on LinkedIn.