RSA Blog - June 2018

  • 6/28/2018 UEBA and Evolved SIEM – Foundations of the Intelligent SOC Using the analogy of a driverless vehicle, the role of UEBA in your security platform is explored. Find out how analytics based on patterns and unusual behavior help security analysts target threats, while complimenting rule-based analytics within a SIEM solution, much like knowing driving patterns and behaviors of other cars on the road helps make driverless vehicles safer.
  • 6/28/2018 Rallying the Troops for GDPR The EU GDPR continues to drive organizations to change their processes. No where is this more apparent than in the risk assessment piece. It’s a new risk-based approach.
  • 6/20/2018 Multi-Factor Authentication Makes Digital Workspaces More Secure When you add multi-factor authentication to a digital workspace, you make access that much more secure. And it’s even better if you can do it without sacrificing convenience for admins and users. After all, isn’t convenience what digital workspaces are about in the first place?
  • 6/13/2018 RSA's CTO: Bullish on Security, Bearish on Blockchain RSA Chief Technology officer discusses the practical applications of blockchain. Find out more about the distributed ledger technology’s potential and limitations.
  • 6/13/2018 RSA Labs: Staying Secure Means Staying Relevant Keeping up with, if not a step ahead, of the bad guys isn’t all that security researchers find themselves battling. Staying upright on a rapidly shifting terrain is made all the more difficult as companies embrace cloud computing, microservice architectures and mobility.
  • 6/7/2018 Making Sense of Tomorrow’s Cybersecurity Trends RSA and Secureworks Chief Technology Officers, Dr. Zulfikar Ramzan and Jon Ramsey, discuss next-gen technologies and how taking a risk-based approach is critical as businesses face an evolving threat landscape.
  • 6/6/2018 Maximum Privileged Account Protection with Multi-Factor Authentication When it comes to privileged accounts, cybercriminals don’t stand a chance against the combined power of privileged access management and multi-factor authentication. Together, they provide the protection your most valuable and sought-after accounts need.
  • 6/5/2018 What Are My Options? Session Encryption Protocols Looking Forward TLSv1.3 is a game changer for some enterprises and data centers, what if I can’t switch to end-to-end and need a transition phase or alternate solution? This provides some options as well as some possibilities for design and development work *if* there is motivation from industry.
  • 6/4/2018 Ovum on Business-Driven Security A new report from Ovum Ltd., “Business-Driven Security: An Essential Approach to Enterprise Protection and Compliance” describes the practicality of the situation facing many digitally enabled organizations, reinforcing the need of business-driven security to effectively manage digital risk.
  • 6/4/2018 They Are Looking At WHAT? Service Provider Monitoring At the start of an adoption curve there is much apprehension. This is true of TLSv1.3 and those managing enterprise networks and data centers. The IETF working group spent much time listening to operators and their concerns in order to better address and improve adoption.
Recommended for you