Dyn DDoS Attack – How IoT Can Take Down the “Global Information Grid” Backbone (Part II)

Authored by Nick Murray, Demetrio Milea, Peter Tran and Davide Veneziano In Part I, How IOT Can Take Down The “Global Information Grid” Back Bone, we discussed the mechanics of DNS in context of the Dyn DDoS attack. In Part II of this blog, we will dive a bit deeper into the anatomy of the…

Enabling the Hunt: RSA NetWitness Suite Updates & Enhancements

RSA Charge 2016, a gathering of more than 2,000 RSA customers, is off to a great start in New Orleans this week. Bringing together RSA product experts with our users and cybersecurity thought-leaders makes for great conversation, collaboration, innovation – and a little bit of fun! Our RSA NetWitness® Suite solution teams and customers have…

The Dyn Attack – How IoT Can Take Down the “Global Information Grid” Back Bone (Part I)

Authored by Nick Murray and Peter Tran Imagine that you are driving through downtown New York City (NYC) and only relying on your GPS for directions. All of a sudden, the GPS stops working and you are stuck in mid-town Manhattan traffic during rush hour. If you have ever tried to drive in NYC, you…

Recognizing and Combating Cybercrime: A Virtual Chat

The goal of cybercrime doesn’t change, but the tactics do.  This week’s theme for National Cyber Security Awareness Month is Recognizing and Combating Cybercrime.  One of the questions to be addressed is: What are cybercriminals looking to gain from attacks? With the impact of cybercrime costing the global economy about $445 billion in 2016, which is more than the market…

Cybersecurity – Let’s Make It A Chick Thing

Time flies when you’re having fun fighting cybercriminals – we are already more than halfway through October and into the third week of Cybersecurity Awareness Month. This week’s theme is Recognizing and Combating Cybercrime, which is quite literally RSA’s raison d’etre. The focus this week is on the collaborative nature of fighting cybercrime as well…

Why a Cyber Risk Assessment Is Essential for M&A Due Diligence

According to J.P. Morgan, the global mergers and acquisitions (M&A) market amounted to $5 trillion in 2015 and continues to show strong levels of growth. When it comes to M&A, the due diligence process involves investigating the health of another business before engaging in any sort of transaction. This process will take many factors into account,…

Multi-layered Analysis of a Threat Pattern

If you do not fully know the asset, how can you protect it? This is the first challenge security practitioners face during any activity, whether it is a penetration test, code review, risk assessment, or design of a threat pattern. In a previous post, author Davide Veneziano provided an overview of the building-block required to design a consistent…

Identity and Access Management Strategies: IAM Spending to Increase in Europe

Businesses around the world recognize that it’s crucial to take the necessary precautions to verify identities and manage digital credentials when conducting business online. In fact, a recent study by Pierre Audoin Consultants (PAC) found that 93% of 200 polled European businesses claimed that they planned to maintain or increase their identity and access management…

Where Is My Cybersecurity Rosetta Stone?

This week’s theme for National Cyber Security Awareness Month is “Cyber from the Break Room to the Board Room.” Communication, like anything else worth getting better at, takes practice. Sometimes it takes planning to know what we want to say and how we want to say it. We also need to anticipate who our audience is…

New Research Reveals: Phishers Launch a New Attack Every 30 Seconds

As long as users can be fooled, phishing will continue to proliferate.  In fact, many major breaches start as a targeted phishing email.  According to the latest statistics from RSA FraudAction researchers, more than one million unique attacks have been identified in the last 12 months, or, more simply put, a new phishing attack is launched every 30…