Threat Detection and Response

Cloud Ready Threat Detection & Response

Organizations are leveraging third party cloud environments for increasingly critical data, applications, and infrastructure. The agility and potential cost savings that both public and private (virtual) clouds offer mean that the business can be more efficient and gain operational and financial advantages. While some organizations – dependent on vertical and “risk” appetite – may be…

Joining RSA’s Mission To Deliver Business-Driven Security – From RSA’s New President Rohit Ghai

I am delighted to be joining RSA at such an exciting and transformational time in the security industry. 2016 brought an unprecedented focus on the global cybersecurity situation. From the use of IoT vulnerabilities to halt the largest global websites, to politically motivated intrusions, to power grids being targeted – threats that were previously unimaginable…

Threat Detection: What Goes Into a Successful Strategy?

The cat’s officially out of the bag when it comes to threat detection: The majority of the industry simply isn’t satisfied with its current solutions. In fact, 76% of respondents in a recent RSA survey indicated that they were not confident in their ability to detect and investigate threats to their environment. Where did matters…

Forensics Meets Continuous Security Monitoring to Achieve Optimal Visibility

Digital forensics is estimated to be a $3.2 billion industry by 2020, according to research from RnR Market Research summarized by WhaTech. The industry has grown due to the virtually ubiquitous use of IT systems in personal, corporate, and governmental settings. The need for the IT department to “see” from the network command center out…

Four Characteristics of Top-Notch Threat Intelligence

Threat intelligence is a hot topic these days and was arguably one of the top themes of RSA Conference 2016. However, organizations need to realize that simply having more data about the latest threats, vulnerabilities, and exploits is not the answer to all their cybersecurity problems. On the contrary, threat intelligence is only helpful if…

The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files?

Advanced ransomware—malicious software designed to take control of a computer system and hold it hostage until the victims pay for its release—is one of the fastest-growing areas of cybercrime. Another closely related threat is cyberextortion, where attackers threaten to cause harm to a company by releasing sensitive information to the public or sustaining distributed denial-of-service…