Blog

Driving Resiliency Through Operational Risk Management

I recently had the pleasure of presenting with a panel of RSA Archer customers on the topic of “Building Resiliency Across the Value Chain” for a Disaster Recovery Journal webinar. Two key questions were posed to the attendees. The first question was: “Where is your organization on the business resilience scale?” The responses were: Recovery…

Protecting Identities in a hacker’s world

Imagine being in a place where everyone around you is smarter than you and are, in fact, admitted hackers.  Welcome to protecting the identities behind Black Hat Asia 2017’s infrastructure. With a large contingency of attendees at this year’s conference there is a constant need to protect the identities of the team maintaining and monitoring…

Six Keys to a Successful Identity Assurance Strategy: Business Context

Traditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. Today’s enterprise needs more to effectively protect critical applications when delivering access in a world without boundaries. By applying a risk-based approach to our authentication strategy with identity assurance, we can go beyond simple authentication approaches. We can deliver…

RSA NOC at Black Hat Asia

The RSA NOC team is back in action, this time at Black Hat Asia at the Marina Bay Sands in Singapore. Our primary goal is to provide Operational Threat Intelligence and deep visibility into the Black Hat network to ensure the Black Hat infrastructure remains protected and available. Top priorities include protecting the Black Hat…

Testing a Threat Pattern: Quality is Never an Accident

John Ruskin, one of the great visionaries of the 19th century, said “Quality is never an accident; it is always the result of intelligent effort”, in our continuing journey through the lifecycle of a threat pattern, we are now at the testing phase. After analyzing  requirements, asset and threats, designing a general and reusable model for the threat pattern and implementing the…

The GDPR and your data protection obligations

The focus is growing for the European Union’s forthcoming “General Data Protection Regulation,” or GDPR. As its May 25, 2018 implementation date draws nearer, organizations are starting to understand the magnitude of change this major regulation will drive. It is not only EU-based organizations that are subject to the GDPR’s requirements. If your company stores…