Digital Universe CyberSecurity Student Defenders in Action

After writing my blog about Students – Be the Next Defenders of the Digital Universe I received several inquiries about what RSA’s Anti-fraud Command Center does and how Purdue University works with that team.  Since this week’s national cyber security awareness month theme is Building the Next Generation of Cyber Professionals  it is perfect timing…

Hunting for Sharks’ Teeth (and Other IOCs)

Sometimes new lessons about our information security world can arrive from unexpected places. A couple of weeks ago, following the remarkable twenty-fifth (!) iteration of RSA’s TechFest technical training week for RSA presales staff & partners, I took a few extra days to drive out to Florida’s Atlantic coast to unwind and enjoy some beach…

Disruptive Innovation

Innovation is a continual process, building upon the past to improve the future.  Often this means small, incremental steps that chip away at a larger problem.  Sometimes, by accident or design, those changes aren’t so small.  These massive changes are a disruptive innovation that can redefine what is possible. It used to be that the winner…

E2 – The Maestro’s Score – Technical Dialogue

In Episode 2 “The Maestro’s Score”, the Hunter digs deeper into the nefarious plot being composed by the Maestro.  After identifying a shadowy band of men stalking key locations in the Kingdom, the Hunter launches an investigation that leads him and his intrepid companion the Cat from the meagre, dusty abode of his trusted guru,…

How a Selfie or Finger Swipe Can Help Prevent Mobile Fraud

RSA is delighted to announce the availability of RSA Adaptive Authentication Mobile SDK 3.0 and with it our agreement with EyeVerify, the creator of Eyeprint ID™. RSA’s Adaptive Authentication Mobile SDK allows organizations to embed risk-based authentication capabilities directly into their mobile app. Mobile SDK 3.0 integrates in app biometric step up authentication for high risk login…

Making Permission (and Access) Easier Than Users Begging for Forgiveness

Organizations frustrate authorized users when it comes to controlling and allowing access to enterprise resources and applications, wherever they may reside. This user frustration has slowed business productivity, created dangerous security risks and vulnerabilities, and allowed incredibly costly hacks, threats, and intrusions. Today, while we have powerful mobile devices able to remotely access data-filled applications…

E2: The Maestro’s Score – The Crescendo

The cloaks that the Hunter had confiscated from the men lay in the corner of the Mentor’s cabin.  They had been summarily cut to ribbons but the Hunter’s intuition, and the Cat’s exhaustive inspection, had served him well.  Sewn in the hems of each cloak was a secret pocket holding a series of numbers.  The…

When It Comes to Your Identity Infrastructure Don’t Carve the Chasm

As organizations increasingly leverage cloud-based applications, they are struggling to extend their identity infrastructures to this new model. Most organizations have been working for years – with some success – to provide a common identity infrastructure across all of the applications they provide to their employees and customers, so that users can have a better…

We are the World – Internet of Things, Mobile and Social Media

October is National Cyber Security Awareness month (NCSAM), sponsored by StaySafeOnline.org to help remind us all to do our part to make the internet safer and more secure for everyone. Although that is quite literally the job of everyone who works for RSA, even those who don’t work for a security firm can play a…

E2: The Maestro’s Score – Dance of the Foe

Marty slumped in the chair in the conference room and dejectedly paged through his notebook.  He couldn’t focus on this own scribbles.  He merely hoped that something would jump off the page at him with an answer to his questions.  With a sigh, he looked at his watch and waited for the inevitable.   The inevitable…