Security Operations

Playing Pokemon Go? Read this.

Hands up those who would leave their front door unlocked and all their personal information like passports, identity cards, bank details, their children’s details and even passwords left out for cybercriminals to exploit? Not many of you? Well, you will be surprised because that’s exactly what Pokemon Go players are doing.  If you sign up…

Tales from the BlackHat NOC: Learning from the right people

The week I spent in the BlackHat NOC was great exposure to both new and evolving technology and new people. As a team member of the RSA team in the BlackHat NOC I tried to approach my time there by learning as much as I could about not only the data on the network, but how our products function…

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2)

In Part 1 of “Tales of the Black Hat NOC: The Stages of Security Adolescence,” I discussed the maturation process of the Black Hat NOC, and security strategies in general.  In the blog post below – you can see the adjustments we made and additional steps we took towards optimizing our NOC at Black Hat. …

After Black Hat: Shaming is Easy (When You Don’t Encrypt)

During the Black Hat 2016 NOC outbrief session, Grifter, aka Neil Wyler made a counter-intuitive statement to a crowd of roughly 500 attendees, eager to see which of their online activities would be exposed center stage: “I look forward to the day when I can’t see anything you’re doing on the Black Hat network”. Wait… what?…

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 1)

Maturity is often spoken of in the security community as a binary value – “Customer X is mature,” “Customer Y is immature…” This notion was not dispelled at Black Hat where one vendor after another claimed, “Evolve your security. Buy our product and stop breaches today!” But we know that maturity is not binary, and neither is…

TALES FROM THE BLACK HAT NOC: WHAT’S IN YOUR CLASSROOM?

  Hanging in the NOC these last couple of days has confirmed one thing.  Creation of content to support an information security program is an ongoing process.  It starts with the identification and deployment of out-of-the-box content useful for the audience, but a good security operations plan does not stop there. The RSA NOC team…