Identifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6

Online fraud remains as much a part of digital life as URLs. Fraudsters are constantly devising new ways to separate consumers from their money, login credentials, Personally Identifiable Information (PII), healthcare data and anything else that can be monetized. Even more, they are doing it with speed and sophistication, but most damaging, they do it…

Behind the Glass Walls of the Black Hat NOC 2016: RSA Takes the Challenge

Every year, the increased sophistication of threat actors and the expanding attack surface makes it more challenging for the Black Hat NOC security teams to maintain a highly functional environment that is safe and secure but doesn’t stifle productivity and learning. When you have an assembly of the best and most advanced security experts, hackers,…

Privacy and the Smart Grid

Although much of the focus in the SPARKS project, for which I’m the technical director, has been on cybersecurity’s role in minimizing the risks and costs of power disruption, the project has also been concerned with identifying and mitigating risks to privacy that may be entailed by the deployment of Smart Grid.  One of the…

Consumer Security vs. User Experience in a Mobile World

Most people have had to go through the slow, and sometimes frustrating, process of standing in an airport security line at least once in their life. While not convenient for frequent flyers, we understand that although it is time consuming, it is vital to ensure security for people’s lives. However, this is not how customers…

RSA Via Lifecycle and Governance Named a ‘Leader’ in 2016 Forrester Wave: Identity Management and Governance Report

RSA is happy to announce that RSA Via Lifecycle and Governance has been recognized as a ‘Leader’ in The Forrester Wave™: Identity Management and Governance Q2, 2016 report!  (View and download the report here) Forrester evaluated 9 of the most significant Identity Management and Governance providers across 17 criteria, and recognized RSA Via Lifecycle and…

Beginning the Journey to Cybersecurity Maturity

RSA just released results of our second annual RSA Cybersecurity Poverty Index. We’re really excited about the results, but it may not be for the reasons you think. We’re excited because of the number of respondents (more than double the 2015 Index), the breadth of industries and governments represented, and the amount of time organizations…

Announcing RSA Archer GRC 6.1

RSA Archer GRC 6 (6.0) was launched in November 2015 under the theme “Inspire Everyone to Own Risk.”  GRC 6 focused on providing organizations with an industry leading GRC platform to transform risk management by engaging everyone within an organization in the risk process. Today, organizations must implement the “three lines of defense,” making risk…

Current State of Cybercrime in 2016

The bon mot that “crime doesn’t pay” certainly predates the advent of cybercrime. Today, these digital hold-ups against businesses are highly profitable.  Let’s face it: if cybercrime was a publicly traded stock, realizing the return on investment, we’d all be on the phone with our respective broker begging for them to include it in our…

Building rockstars in SOC

What makes detection most effective? I know you are thinking technology. However, if you have been in the security operations domain for long, you know the answer. It’s the “people” who use the technology. As a infosec leader/member for your organisation, you should continuously look for methods and tools that make your teams better and…

How to Speed Up Incident Response

Having an incident response plan in place is key if you want the ability to speed up your company’s reaction to security incidents. However, a recent survey by the Security for Business Innovation Council (SBIC) found that just 30 percent of large organizations have an incident response plan, and of those that do, 57 percent…