RSA Blog - January 2016

  • 1/29/2016 Automate Detection and Detect Early with Leading Indicators The ultimate goal of any security monitoring program or Security Operations Center (SOC) team is to automate threat detection, to detect earlier in the attack lifecycle and to stop the threat actors from achieving their desired objectives of disrupting their business or stealing their IP or money. “Automating Threat Detection”, sounds simple enough, but how...
  • 1/28/2016 First principles of a Cyber Threat Intelligence Program Recently, as part of the scope in establishing a Security Operation Center for a European telecommunications company, I have been asked to develop a cyber threat intelligence (CTI) program. The goal is to better understand the motives, capabilities and objectives of threat actors that might seek to target the organization so that adequate countermeasures could...
  • 1/27/2016 Who to Trust? Effectively Assessing Third-Party and Vendor Risk assessing third party risk
  • 1/26/2016 E5 - The Flies and the Hornet - Holes in the Screen Door The Hunter sat in the shadows cast by the immense castle tower. Beneath his right hand purred his intrepid companion, The Cat. Together they languished in the relatively coolness of the shade waiting patiently. Their position gave them an excellent view of the gate leading into the inner realm of the castle. Staring across the...
  • 1/25/2016 Cybersecurity Insurance Companies Look to Raise the Bar in 2016 Cybersecurity insurance is a direct product of a growing dependence on digital data. Enterprises are investing more in their data gathering and analytics to drive competitive advantage, so it’s only logical that cybersecurity would be a top priority for IT-driven organizations. However, those who insure cybersecurity are not convinced enterprises are doing enough to protect...
  • 1/22/2016 Compensating for Control Issues Whoa wait a minute…is this a psychology lesson? Well if so hopefully it’s no less comfortable than your favorite chair! Last week we kicked off a new blog series on Issues Management. Read Steve’s initial volley here which neatly frames up the problem of the “Issues Pit”. This week we’ll discuss the process of compensating for control...
  • 1/21/2016 Behavior Analytics: The Key to Rapid Detection and Response? The use of detective analytics is now a central piece of security architectures, as security professionals are increasingly encountering a needle-in-a-haystack problem.  Security tools – especially rule based ones – as well as systems, applications, and infrastructure, create so much data that it’s tough to uncover the signal of a real attack. Analytic tools help...
  • 1/21/2016 Part 3: Fundamentals of the Game - People, Process and Technology Alignment The first post in the Fundamentals of the Game series listed a set of skills that characterize successful SOCs, just like the excellence in offensive and defensive fundamental skills characterizes the greatest players in basketball or any other sport. The second article provided details on one of these fundamental skills (established alignment between SOC and business...
  • 1/20/2016 Threat Intelligence Cooperation: Creating Shared Value The Value of Sharing Threat Intelligence
  • 1/19/2016 E4 - Storms on the Horizon - Technical Dialogue Defend the Kingdom security mini series
  • 1/18/2016 Taxpayers Beware: Phishing and Other Scams Coming to an Inbox Near You The phone rang. My first mistake? Answering it. My second? Listening to the well-scripted gentlemen relay the following information: “Hello Ma’am” announced a voice with a distinct, almost halting South African accent, “I am calling from the IRS in Washington D.C. and you owe us money. If you do not send me a wire transfer...
  • 1/15/2016 Saving two birds with one stone: A new fast and robust coding scheme There is a lot of important data in our digital world, which – whether in transit or at rest – we want to keep secure and available in the face of unexpected loss or corruption. Error correcting codes (ECCs) are an important tool for achieving reliable data transmission or storage over unreliable networks or media,...
  • 1/13/2016 Incident Response: Implement a Communications Plan How to develop an effective communications plan
  • 1/12/2016 Know your Gaps; Take Action Issues – we all have them.   I should clarify that statement.   I am not talking about you personally or referring to the ‘lie on the couch, tell me about your relationship with your mother’ types of issues.  I mean – all organizations have issues.   Some are big and some are little but all organizations find...
  • 1/12/2016 E4 - Storms on the Horizon - Gathering Forces Defend the Kingdom security series
  • 1/11/2016 Does EMV Make Online eCommerce Transactions Safer? EMV does not make online eCommerce transactions safe - these best practices will though
  • 1/6/2016 How Mobile Is Changing the Face of Identity Management How mobile is changing the face of identity management
  • 1/5/2016 E4 - Storms on the Horizon - The Weather Turns Cold Defend the Kingdom security series
Recommended for you