Blog, Page 2

7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—1: IDENTIFY INFORMATION

Managing information risk can be a paralyzing challenge, given the amount of data and information that comes pouring in daily. It’s hard to know what information needs to be protected, let alone the most effective way to do it. RSA has developed a practical seven-step methodology for building a risk management framework for information. Derived…

Operational Rhythm at the Black Hat 2017 NOC

By Matt Tharp Operational rhythm is the term for the nebulous flow of information between parts of a team that makes it so effective. Who needs what, and when to be successful? In the Black Hat NOC, we have very little time to establish such a rhythm. However, a process for distributing critical information isn’t…

Black Hat NOC 2017: CAN YOUR SIEM DO THIS?

Setup of the Black Hat NOC is an exciting time. The entire network infrastructure is dropped in place at Mandalay Bay. Multiple Black Hat NOC teams work long hours to get the network in place, configured and tested. The attention then turns to the NOC setup where the infrastructure is tied together. RSA, one of…

DON’T MISS RSA AT BLACK HAT USA 2017

Wondering where you’ll find RSA at Black Hat? Where won’t you find RSA is more like it. In addition to hosting our Business Hall booth, where we’ll be showcasing the latest version of RSA NetWitness® Suite, you’ll find us in the Black Hat Network Operations Center (NOC), as well as in speaking sessions on some…

Swinging for the Fences

Did you know only approximately one in 200, or about 0.5%, of high school senior boys playing interscholastic baseball will eventually be drafted by an MLB team?  That includes all levels of professional baseball.  Only a small percentage of players drafted actually make it to the Major Leagues.   The competition to make it to the…

DEMAND MORE FROM YOUR SIEM

By Mike Adler, VP Product, NetWitness Suite If you’re like a lot of IT security professionals, you’ve always been able to rely on your SIEM to provide log data for threat detection. But that’s just not enough to keep up with all the new threats from new sources that are bombarding organizations today. Can your…

Threat Hunting and the Cloud – A Dynamic Tension

In the 1920s, fitness innovator Charles Atlas developed and introduced the Dynamic Tension exercise method. The essence of Dynamic Tension is that it pits muscle against muscle, with a workout intensifying proportionally for both muscles as force increases. As generations of comic book fans have learned since, nobody kicked sand in Charles Atlas’s face after…

Hypothesis in Threat Hunting

Today’s threat landscape requires organizations to operate more proactively to keep up with advanced and persistent threats. There is no doubt that the practice of threat hunting has emerged as a key capability to detect stealthy threat actors trying to gain access to the organizational IT infrastructure by evading traditional security measures. Hunting aims to…

Nip Those Incidents in the Bud!

I’m dating myself here, but I used to love to watch the Andy Griffith Show. I liked Andy’s calm demeanor as he tried to raise little Opie. Barney Fife was his neurotic sidekick. I enjoyed this exchange between the two of them as they discussed raising kids: Barney Fife: Well, today’s eight-year-olds are tomorrow’s teenagers.…

3 Ways to Make Multi-Factor Authentication Easier for Everyone

The case for multi-factor authentication (MFA) is clear. The harder you make it for cyber attackers to get to your data, the lower your risk of a breach—and MFA definitely makes it harder, by requiring people who request access to authenticate their identity in more than one way. The downside is that if you don’t…