Threat Detection

“Up Your Game” to Close the Security Skills Gap

Ask any CISO to name the top challenges of the job, and their first response is likely to be the security “skills gap” – the inability to find enough skilled people to handle an organization’s security needs. With over 200,000 security jobs unfilled in the U.S. alone, organizations, especially security operations centers (SOCs), are continuously…

The Elephant in the Room for Endpoint Security

Stop me if you’ve heard this story before… Three blind men are traveling down the road to visit a friend.  On the way, they encounter an elephant.  Not being able to see it, they each stopped and felt the elephant to figure out what sort of creature it was.  The first one grabbed the trunk…

Cloud Ready Threat Detection & Response

Organizations are leveraging third party cloud environments for increasingly critical data, applications, and infrastructure. The agility and potential cost savings that both public and private (virtual) clouds offer mean that the business can be more efficient and gain operational and financial advantages. While some organizations – dependent on vertical and “risk” appetite – may be…

Threat Detection: What Goes Into a Successful Strategy?

The cat’s officially out of the bag when it comes to threat detection: The majority of the industry simply isn’t satisfied with its current solutions. In fact, 76% of respondents in a recent RSA survey indicated that they were not confident in their ability to detect and investigate threats to their environment. Where did matters…

Faster Threat Detection through Shared Intelligence: RSA NetWitness Endpoint Now Supports RSA Live Connect

In a previous life, I remember spending time at a company’s co-location facility where many organizations hosted their production and testing environments.  There was a shared workspace, and I remember having quite a few conversations with industry peers about various topics.  Not surprisingly, the one topic that came up more frequently than others was security…

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2)

In Part 1 of “Tales of the Black Hat NOC: The Stages of Security Adolescence,” I discussed the maturation process of the Black Hat NOC, and security strategies in general.  In the blog post below – you can see the adjustments we made and additional steps we took towards optimizing our NOC at Black Hat. …

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 1)

Maturity is often spoken of in the security community as a binary value – “Customer X is mature,” “Customer Y is immature…” This notion was not dispelled at Black Hat where one vendor after another claimed, “Evolve your security. Buy our product and stop breaches today!” But we know that maturity is not binary, and neither is…

Tales from the Black Hat NOC: I’ll Show You Mine, We Can Already See Yours

With the start of Black Hat 2016 merely a day away, white, black, and grey hats from around the world are whetting their appetites – eagerly waiting to show off and consume the fruit of an entire year’s research. Whether for education, research, bragging rights, or mal-intent, the Black Hat network will host anything from basic brute force attacks to…

Behind the Glass Walls of the Black Hat NOC 2016: RSA Takes the Challenge

Every year, the increased sophistication of threat actors and the expanding attack surface makes it more challenging for the Black Hat NOC security teams to maintain a highly functional environment that is safe and secure but doesn’t stifle productivity and learning. When you have an assembly of the best and most advanced security experts, hackers,…

How Organizations Think About Threat Detection: Results from the RSA Threat Detection Survey

The famous British naturalist Charles Darwin believed that it isn’t the strongest or fastest who survive, but rather it’s those who are most adaptable to change. For RSA’s customers, that requires acknowledging and understanding how effective they are at detecting as well as investigating cyber threats today, and determining how they should best evolve moving…