Stalking the Kill Chain: Tying it All Together

By Alex Cox, Sr. Researcher, RSA FirstWatch team The Single Event Mentality Historically, security technologies tend to be focused in a single place, or at most, two places on the kill chain, but lack the entire context behind an event that a complete analysis system imparts. When using the phrase “stalking the kill chain”, we…

Don’t Just Tokenize Your PCI Data…PII and PHI Can Be Perfect Candidates Too!

By Liz Robinson, Principal Product Marketing Manager, RSA Identity and Data Protection People tend to associate tokenization with payment card data, debit and credit card numbers. And while this has been the main use case for the technology, this is not the only use case. For those of you not in the know, tokenization is…

A Deeper Look in the Watering Hole – Inside the VOHO APT Campaign

By Will Gragido, Senior Manager, RSA FirstWatch Team On July 21, 2012 the RSA FirstWatch team blogged about a new campaign we had identified and discovered – a new campaign that we believed met the criteria for advanced persistent threats (APT) and subversive multi-vector threats (SMT). We conducted intensive, in-depth reconnaissance that saw us collect…

Dark Side of Shamoon

By Christopher Elisan, Principal Malware Scientist, RSA FirstWatch team Recently, there has been some media noise generated by a new malware reportedly attacking targets in the Middle East such as Saudi Aramco. But what exactly does this attack look like once the malware compromised the system? Most malware nowadays, especially those used in targeted attacks,…

Report Provides Tips for Transforming Traditional Security into Early Warning Systems – Podcast #240

RSA’s latest Security Brief provides insights from security leaders and other industry executives for how organizations can transform traditional security into an early warning system for advanced threats.  RSA’s CISO, Eddie Schwartz highlights the capabilities needed in next-generation information security strategies- including hot topics like “big data” security analytics: using vast volumes of information from…

Introducing RSA Advanced Cyber Defense Services – Podcast #239

RSA’s Peter Tran talks to Speaking of Security about new Advanced Cyber Defense Services being offered to help orgnanizations in North America and Europe create proactive strategies for defending their digital assets against a wide range of threats, and provide incident response expertise designed to help customers react aggressively to active attacks and critical incidents.…

EMC Acquires Silicium Security

              We’re pleased to announce that Silicium Security has been acquired by EMC. Going forward we will operate as a line of business under RSA, The Security Division of EMC. Our team stays in place and will continue to support our customers and partners. The full text of the announcement from…

The Natural Selection of Fraud

One of the common criticisms of the evolution theory by those who side with intelligence creation is that it is improbable for natural selection to create structures as complex as those that are observed in nature. However, science has proven over and over that these claims aren’t true – and evolution is in fact a…

Security Strategy and Big Data

There’s been quite a lot of discussion recently about applying big data to improving security.  My colleagues Rashmi Knowles and Barrett Mononen have written a couple of blogs about it.  Our RSA/Netwitness CSO Eddie Schwartz spoke about it at RSA Conference China and the Splunk IPO in April certainly created lots of buzz around big…

The Advent of Adaptive IAM: Security in Motion

“Opportunities multiply as they are seized” -Sun T’zu, the Art of War “It is difficult to understand the universe if you only study one planet” -Miyamoto Musashi, Book of Five Rings   Go Rin No Sho, Source RSA announced today a new solution to help customers ensure trusted identity and access management across enterprise and…