In-depth

Q&A: Adobe's Brad Arkin on dealing with security

We spoke to Brad Arkin, Adobe's director for product security and privacy, about coping with security threats and future plans.

Adobe has been under the security spotlight recently, having to patch various vulnerabilities, some considerably more serious than others.

Given around 98 per cent of machines run some kind of Adobe software, it comes as no surprise that cyber criminals go after the firm's products.

So what is Adobe doing to improve its systems and what is it like working on the security in some of the most widely used products in the technological world?

We spoke to Brad Arkin, the software giant's director for product security and privacy, about how his team has coped with some serious issues in the past and what his plans are for the future.

Advertisement
Advertisement - Article continues below

How seriously does Adobe, as a whole, take security?

We understand that the ubiquity of our software implies a responsibility that we feel very keenly in order to protect our users from the threats that are out there.

Everybody at the organisation understands the priority that we need to address security in order to protect our users against what is happening.

One of the initial reasons given by Apple for not allowing Flash on iPhone was because of security. Was it justified in saying that?

The Flash Player/iPhone topic is more of a business issue. There may have been claims made about security - that's not the real problem there.

From a security perspective, Flash Player because it is ubiquitous software it's definitely in the spotlight right now, but when you compare it to other widespread products, so things like Apple Preview, QuickTime, Real Player, all of these have the potential for security vulnerabilities that attackers can leverage. They are all getting attention, it is not just Flash Player.

Having said that, we are not happy with where Flash is today, that is why we are doing so much work to make it more robust.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019