An All Access Sweep – RSA Wins Big at SC Mag Awards

Another year, another RSA Conference, and the continued battle to keep companies and assets secure.  Unfortunately each new week brings us stories of major US corporations compromised and growing sophistication of attackers in gaining a foothold on networks.  However, while the circumstances, the targets and the data stolen vary, at the beginning of all of…

Building a Next Generation SOC – Using Intelligence to Find the Threats; Podcast #245

In this edition of the RSA Speaking of Security Podcast, Tom Chmielarski, Practice Lead with RSA’s Advanced Cyber Defense consulting practice, talks about specific threat intelligence strategies that organizations can take in the defense against malware and advanced attackers. Tom is one of the lead consultants bringing RSA’s Next Generation Security Operations Design and Implementation…

Next Generation Security Operations: The Breach Escalated

To continue with my series on the Next Generation of Security Operations, I want to look at how well the operations are positioned for the be-all, end-all of security – the actual Security Breach.  Security incidents have a life of their own.  How it all turns out is very dependent on how soon the problem…

Risk-Based Authentication: What’s Context Got to Do With It?

Contributed by Lauren Horaist, Senior Product Marketing Manager, RSA Identity and Data Protection Group I sometimes find myself making strange comparisons between real life and work life.  One of those stream-of-consciousness moments happened a few weeks ago while I was driving home in a snowstorm.  I was minding my business driving along my normal route,…

Emerging UPnP Vulnerabilities

By Tom Chmielarski, Practice Lead – RSA Advanced Cyber Defense Practice (Americas) Several vulnerabilities with multiple implementations of Universal Plug and Plan (UPnP) were announced January 29 by security firm Rapid7. These vulnerabilities can result in remote code execution and affect “between 40 and 50 million” internet connected devices (according to Rapid7). Said another way,…

The Man in the Middle: Advantages of SSL Decryption

By Rui Ataide, RSA Advanced Cyber Defense Advisory Practice Consultant More and more we hear about mobile app/phone companies and other cloud-based services acting as a sort of “man-in-the-middle” attack with their services. Some are well perceived and even accepted, others are not. The common point in all of them is the reason why they…

“What’s your question?” – Next Generation Analysis in the Compromise Landscape

By Alex Cox, Sr. Researcher, RSA FirstWatch team The FirstWatch team recently had its team planning meeting, where we discussed plans for the year, current events and experiences.   One of my teammates and fellow analysts, Pat Belcher, raised an interesting point in regards to security analysis, consulting and understanding your environment. Threat analysts, as a…

The Iris System: Tidying Up Under the Rug

Virtualization helps conceal hardware complexity, one of its many benefits for programmers and administrators. But it’s also a rug under which security and reliability concerns can be all too easily swept. Here’s a simple example. Suppose that a file system replicates data across two storage devices to prevent data loss in the advent of a…

The Hacks Get Hacked and Their Passwords Get Dumped

By Liz Robinson, Principal Product Marketing Manager, RSA Identity and Data Protection On January 30, the New York Times acknowledged that it had been a victim of a security breach.  The Times claims this was the result of a long, targeted attack allegedly committed by attackers located in China to gain access to corporate email…