Phishing: They Should Just Call It Catching

When I was 8 years old I went on my first fishing trip with my grandfather. He was an avid fly fisherman and would spend hours lazily flicking his line into the pools and eddies of rivers inSouth Africa’s Drakensberg mountains. I had a great time for the first hour or so, after which I…

Cherrypicking Virtual Machines in a Public Cloud

How often do you pass over a bruised apple at the supermarket in favor of a nice, smooth, red one? We all know that although the apples in a bin are priced identically by weight, they vary in quality. So you can buy better apples at a given price through careful selection. Resources in public…

Security and Big Data: a match made in Heaven

“God does not care about our mathematical difficulties. He integrates empirically.” -Albert Einstein “The human mind has first to construct forms, independently, before we can find them in things.” -Albert Einstein “Do not worry about your difficulties in mathematics, I assure you that mine are greater.” -Albert Einstein It’s time to shake up security with…

Understanding Indicators of Compromise (IOC) Part III

Introduction In the second installment of this blog series we built off of the first installment by discussing in greater detail many key principles and concepts for the comprehension of indicators of compromise (IOC) by security analysts.  We continued our conversation related to how IOCs relate to observables and how observables relate to measurable events…

‘Tis the season for a debate

Debates.  They seem to be everywhere – especially now in the thick of the political season.   Political debates are serious stuff.  Other debates – like who was the better baseball player or who has the best burger – are much more frivolous.   As an Oakland Raider fan in the middle of Kansas City Chiefs country,…

Risk and Reward See-Saw for Mobile

At RSA Conference Europe recently, the latest report from the Security for Business Innovation Council was launched entitled ‘Realizing the Mobile Enterprise’. It is really about balancing the risk and rewards for mobile devices and incorporating them in the overall enterprise Security strategy. BYOD is not a new concept and most organizations today have some…

Understanding Indicators of Compromise (IOC) Part II

Introduction In the first installment of this blog series we discussed several principle ideas and concepts necessary for security analysts as they seek to master an understanding of indicators of compromise (IOC).  We discussed how IOCs relate to observables and how observables tie or relate to measurable events or stateful properties on a host.  We…

Citadel V1.3.5.1: Enter the Fort’s Dungeons

By Limor Kessem What can be said about the Citadel Trojan that we have not yet said? This advanced banking Trojan, exclusively available in the deep web, has been a game changer ever since it appeared in the most clandestine of cybercrime communities. Fit for crime king(-pins), it was built over the old Zeus’ (v2)…

You Down with PPI?

By Liz Robinson, Principal Product Marketing Manager, RSA Identity and Data Protection We’ve all heard of Personally Identifiable Information or PII (social security number, drivers license number, birth dates) and Protected Health Information or PHI (medical diagnosis codes, medical history), but have you heard of Personal Password Information or PPI?  No? How important are your…

Split-value Cryptographic Authentication: Building Advanced Threat-Resistant Software

By Eric Baize, Senior Director, EMC Product Security Office Advanced Threats are deeply impacting the way we develop secure products by fundamentally changing our working assumptions. We used to design and develop products to be attack resistant assuming that the environment where they will be deployed may be compromised. We now have to develop and…