RSA Blog - November 2017

  • 11/30/2017 Protecting privileged user credentials with integrated MFA If there’s anything worse than a user’s account being compromised, it’s a privileged account being compromised. Reduce your risk with an integrated set of multi-factor authentication and identity governance capabilities for managing privileged access.
  • 11/30/2017 Are You a Regulation Rebel or a Regulation Realist? In a new report by the Security for Business Innovation Council (SBIC), security executives and thought leaders from Global 1000 enterprises share advice for organizations looking to minimize the burden of legislation that may impact their security postures, as well as offer three strategies to handle what’s ahead in the security landscape.
  • 11/29/2017 New Account Fraud: How to Apply Fraud Data to Reduce Risk Understanding patterns of fraud and what contributes to them can enable you to better distinguish between genuine and fraudulent transactions and adjust your risk policies accordingly. Find out why new accounts and devices are particularly reliable indicators of fraud and how you can respond to the risk.
  • 11/29/2017 Firewall Meets MFA: Secure Access at the Network Level You can count on your next-generation firewall to protect your network against attacks. But when intruders come with seemingly legitimate credentials, a firewall alone can’t keep them out. For that, you need multi-factor authentication (MFA)—and an easy way to integrate it with the firewall.
  • 11/28/2017 2018 Cybercriminal Shopping List When you hear that another organization has been hit by a data breach, your first reaction might be relief it wasn’t yours. But the credentials stolen during that breach could be used to target your organization with account takeover and new account fraud. Here is what you can do to protect your customers.
  • 11/28/2017 Identity Brings Opportunity at the Gartner IAM Summit Identity is transforming to address modern IT challenges. At this year’s Gartner IAM Summit, RSA and others are sharing best practices, exploring new risk-based strategies and expanding technology ecosystems that transform authentication and further mitigate identity risk.
  • 11/21/2017 The Carbanak/Fin7 Syndicate: A Historical Overview Of An Evolving Threat While Carbanak/Fin7 may use APT-style tactics and demonstrate persistence, RSA Research does not consider them to be an APT. Read the full report to understand why.
  • 11/15/2017 Translate Consumer Authentication into Happy Customers and Increased Revenue Consumer authentication can be so much more than a simple check of the box on your next compliance audit. Learn how risk-based authentication actually increased revenue by 20% through improved customer experience, increased transactions, and reduced fraud losses.
  • 11/15/2017 Ready, Set, Shop: Practical Tips To Avoid Cyber Monday Fraud Holiday shopping season brings great opportunities for revenue growth, but it also brings great risks of chargebacks, fraud losses and brand damage. Consider these simple tips to help your organization minimize those risks.
  • 11/13/2017 Answering The Security Sales Question Of The Day Four simple, but key steps give your security clients a reason to come back to your business. Learn more about why RSA thinks trust is paramount.
  • 11/13/2017 3D Secure 2.0: An Outlook on Merchant Adoption 3-D Secure 2.0 promises to eliminate many of the customer experience issues that plagued early implementations and deliver better fraud detection through rich data collection. But are merchants ready for adoption?
  • 11/7/2017 The Role of Choice in Consumer Authentication Despite changing consumer attitudes towards cybersecurity, many organizations are still slow in moving beyond simple username and password. As organizations look to attract business, especially among the millennial generation, choice in authentication will be a key consideration to their digital strategy.
  • 11/1/2017 Blockchain: the New Crutch for Fraud Blockchain is no longer used solely for cryptocurrencies such as Bitcoin; fraudsters are now adopting this technology to host their websites and use blockchain-based DNS in order to make their websites bulletproof.
Recommended for you