This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Adobe appoints Brad Arkin to position of chief security officer

Share this article:

Adobe has created a new position of chief security officer and appointed Brad Arkin to the position.

Formerly Adobe's senior director of product security and privacy, Arkin will continue to lead the company's secure software engineering team (ASSET) and its product security incident response team (PSIRT), which responds to vulnerabilities and exploits.

In a statement, Arkin said the new position will allow him to further grow Adobe's commitment to building security into its products, as well as collaborating with researchers.

"In my new role, I have the opportunity to lead engineering infrastructure security, a team that builds and maintains security-critical internal services relied on by our product and engineering teams, such as code signing and build environments," he said.

"I will also continue to manage and foster two-way communication with the broader security community, a vital part of the central security function."

Adobe has experienced its share of security incidents in recent months and years. In September, advanced hackers broke into an internal server to compromise a digital certificate that allowed them to create at least two files that appeared to be legitimately signed by the software maker. The company has worked to bolster the resiliency of its popular software, Reader/Acrobat and Flash, the frequent source of vulnerabilities.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.