RSA Blog - July 2016

  • 7/31/2016 - Tales from The Black Hat NOC: Organizing the Chaos A glimpse into training day. Yesterday marked the official start of Black Hat 2016, kicked off with various training courses spread throughout the convention center. For the RSA NOC team this meant a chance to validate yesterday’s installation and get an initial glimpse into the activity within and around the classroom and conference networks before the...
  • 7/31/2016 - Tales from the Black Hat NOC: I'll Show You Mine, We Can Already See Yours With the start of Black Hat 2016 merely a day away, white, black, and grey hats from around the world are whetting their appetites – eagerly waiting to show off and consume the fruit of an entire year’s research. Whether for education, research, bragging rights, or mal-intent, the Black Hat network will host anything from basic brute force attacks to...
  • 7/29/2016 - Account Takeover Gains Full Visibility with Web Behavior Analytics Interest in and adoption of web behavior analytics is surging because of its ability to interpret the navigation and intent of each visitor to the website and as one of the best ways to protect the business against the skyrocketing rates of website fraud.  Account takeover is one of the predominant threats plaguing organizations with...
  • 7/28/2016 - RSA NetWitness Suite: Changing the Security Paradigm In technology – especially information security – the pace of change can be overwhelming. Adversaries continually invent new (and more often, reinvent old) ways to infiltrate and compromise organizations, while the good guys try to take advantage of the innovation in technologies, techniques, and processes to protect their organizations against these adversaries. But there are...
  • 7/25/2016 - Web Threat Detection Services Deliver SWIFT Remediation With the dust settling on a series of high profile cyber heists against international banks SWIFT’s network used to facilitate international payments between banks, the service provider is weighing changes that would effectively exclude from its network banks that have, according to reports, “demonstrated weak information security.” The Brussels-based SWIFT (Society for the Worldwide Interbank...
  • 7/22/2016 - RSA SecurID Access Takes Top Honours at Computerworld Hong Kong Awards 2016 Earlier this month, Computerworld Hong Kong recognised RSA’s identity assurance solution line, as a winner in its Computerworld Hong Kong Awards 2016. We’re humbled to have received such a prestigious award for the second year in a row, and encouraged as we continue to see the industry’s firm belief and support in our vision and...
  • 7/22/2016 - RSA at Black Hat 2016 - Can't Wait! Black Hat 2016 is fast approaching and I can’t wait!  The main event will take place on August 3rd and 4th at Mandalay Bay in Las Vegas.  Will you be there? If you are attending Black Hat, please stop by the RSA booth – #1108.  We have a lot of “goodness” planned for the security analysts...
  • 7/19/2016 - Wearables leaking your passwords? We can solve that. Recently, I wrote about  a newly published white-paper showing the power of wearable devices to help determine if users are who they claim to be, on a continuous basis. The paper describes a method, which in part relies on correlating a user’s gestures and movement on 2 devices in proximity of each other: The user’s...
  • 7/19/2016 - Hacking the Mr. Robot Season 2 Premier The psychological thriller Mr. Robot, which airs on the USA Network, is a fan favorite among cybersecurity professionals. What differentiates the show from its predecessors in the cyber-thriller genre is the depth of technical research involved in developing each episode. I’ll plan to dissect each episode from a technical perspective, examining the extent to which...
  • 7/18/2016 - EMC (RSA) Archer Named a Leader in the 2016 Gartner Magic Quadrant for Business Continuity Management Planning Software For the third year in a row, RSA Archer has been named a Leader in Gartner’s Magic Quadrant (MQ) for Business Continuity Management Planning Software (BCMP)! Gartner states in their report that the business continuity management (BCM) market is changing because “continuity of operations is being seen by organizations as a growing risk that needs to...
  • 7/15/2016 - Play Pokemon Go? Know the Risks and How to Mitigate Them Unless your home has been inside of a cave for the past week, you’ve certainly heard of Pokemon Go. Scratch that. Even if you have been living inside of a cave, chances are that someone inadvertently entered in hopes of locating Pikachu. While the game has become seemingly ubiquitous, you should be cognizant of some...
  • 7/14/2016 - Hackers Hunt for Healthcare Records What’s the difference between data theft from a bank account versus a healthcare record? For starters, think of theft from a bank account as the equivalent of a single withdrawal; one and done. Sooner than later it’s discovered, a new account number is issued and, as a hacker, you’re effectively cut off. When it comes...
  • 7/13/2016 - Dude, Where Is My Archer Summit? We have all had that moment walking out of the shopping mall or the airport.  Everyone knows the feeling when that rush of doubt takes hold of our brains.  We stand frozen and frantically wait for our cerebral cortex to do its thing and pluck that single memory out of our vast network of synapses…...
  • 7/12/2016 - RSA Named a Leader in IT Risk Management RSA Archer is very excited to be recognized by Gartner once again as a Leader in the 2016 Magic Quadrant for IT Risk Management! Of the nearly dozen vendors evaluated, RSA was cited as a leader with the highest rating for “Ability to Execute”. According to Gartner, “RSA Archer’s fulfillment of critical needs, customer understanding, and...
  • 7/11/2016 - Cyber Scams to Beware of at the 2016 Summer Olympics Are you planning to cheer on your country’s athletes in-person at the Summer Olympics in Rio and need some discounted tickets? Or maybe you can’t afford to actually travel there, but would love to win a ticket lottery that would increase your chances of doing so? Or maybe you’re not planning to attend at all...
  • 7/7/2016 - Part 4: Fundamentals of the Game - There is no intelligence without data After having identified the set of fundamental skills needed to set up a successful SOC, highlighted the importance of the alignment between SOC and business goals, and  understood how people, processes, and technology must work together for a SOC to be successful, we now investigate the next SOC fundamental skill: focus on data through visibility...
  • 7/7/2016 - GDPR Post Brexit - Are You Getting Ready? The European General Data Protection Regulation presents the most significant change to data protection in the UK and EU since 1995.  It’s been discussed in the EU for the last four years so hopefully, they have taken that time to ensure that in practical terms it will work. It will come into force in May...
  • 7/6/2016 - Cybersecurity's Poverty Gap As we pass the halfway point of 2016, the United States Presidential election process is in full swing. Candidates continue to make the case for why their worldview is in the best interests of the nation. Perhaps no other topic polarizes the candidates and receives more prominence in this context than wealth inequality. Within cybersecurity,...
  • 7/5/2016 - Enter at Your Own Risk: The Perils of Livestreaming Content There’s no such thing as a free lunch, not even on the Internet. But if you do decide to splurge, new research finds your lack of willpower may come with a side order of malware. In this case, that free lunch actually refers to websites that offer free livestreaming of things like sporting events, concerts, and so on. Turns...
  • 7/1/2016 - Great Things Come in 3s - EMC (RSA) Positioned in Leader's Quadrant in Three Gartner Magic Quadrants We have all heard the adage that great things come in threes. Stooges. Pigs. Blind Mice. The list goes on and on. I have am very pleased to announce another thrilling combination of three – Gartner Magic Quadrants. EMC (RSA) has been positioned in the leader’s quadrant in three Gartner Magic Quadrants: Operational Risk Management,...