Testing a Threat Pattern: Quality is Never an Accident

John Ruskin, one of the great visionaries of the 19th century, said “Quality is never an accident; it is always the result of intelligent effort”, in our continuing journey through the lifecycle of a threat pattern, we are now at the testing phase. After analyzing  requirements, asset and threats, designing a general and reusable model for the threat pattern and implementing the…

The GDPR and your data protection obligations

The focus is growing for the European Union’s forthcoming “General Data Protection Regulation,” or GDPR. As its May 25, 2018 implementation date draws nearer, organizations are starting to understand the magnitude of change this major regulation will drive. It is not only EU-based organizations that are subject to the GDPR’s requirements. If your company stores…

Answering the #1 Question in Identity Management

Takeaways from a Recent Identity Survey by IDG It’s the infamous joke we’ve all used at one point or another – “Knock, knock. Who’s there?” When it comes to identity management, knowing the answer to this question is mission critical. Whether your employees, contractors, customers and partners are accessing your data, applications and systems in…

PSD2 – Can your transaction risk analysis and strong customer authentication comply?

February 23, 2017 the European Banking Authority (EBA) released the Final Report of the Draft Regulatory Technical Standards on Strong Customer Authentication and Common Secure Communication for the Payment Services Directive 2 (PSD2). This final report heralded a welcome change in the EBA’s position on the exemption to Strong Customer Authentication (SCA) based on transaction…

Business Impact Analysis Relieves “Tempest in a Teapot” Syndrome

Do you ever use the term, ‘you are creating a tempest in a teapot’? It means, don’t make a big deal out of something that isn’t. Doing a little research, I found other similar phrases I thought were entertaining. They are: ‘A storm in a teacup’ – Cicero; or ‘Billows in a ladle’ – translation…

Fraud Management Metrics that Drive Investment

If your role is responsible for a budget, your work ultimately revolves around one word: metrics.  It is a word we often dread, because we can never seem to get it right.  I live and breathe metrics in marketing, and if you are the gal or guy responsible for the fraud management or cyber security…

RSA NetWitness® Suite named a leader in The Forrester Wave™: Security Analytics Platforms

We are excited to announce the RSA NetWitness® Suite has been named by Forrester® Research as a leader in The Forrester Wave™: Security Analytics Platforms, Q1 2017. RSA NetWitness Suite earned perfect marks in the Forrester Wave report for scalability, detection technologies, user behavior analytics, endpoints, integrated network analysis and visibility, and threat intelligence. According…

MULTI-FACTOR AUTHENTICATION YOU CAN COUNT ON

More than 25,000 organizations worldwide trust RSA SecurID® Access to provide a convenient, secure multi-factor authentication experience for their users. And now RSA SecurID Access is honored to have won the SC Magazine 2017 Trust Award for best multi-factor authentication solution – two years in a row. RSA SecurID Access multi-factor identity solution had to…

RSA and the Power of CommUNITY

After attending RSA Conference 2017 it was clear the theme – The Power of CommUNITY – was a thread throughout the conference. This was seen in several places: Dr. Zulfikar Ramzan, CTO of RSA, mentioned this topic several times in his keynote on Tuesday morning. He urged us as an industry to “draw connections” and…

Facing a Tsunami of Issues?

“Tsunami” is the Japanese term for a series of violent and recurrent waves in the ocean caused by the displacement of a large volume of water. Earthquakes, volcanic eruptions, landslides or other underwater explosions or man-made events are usually the cause. Unlike normal ocean waves that are generated by wind, or tides that are generated…