RSA Blog - October 2018

  • 10/30/2018 - Immediate Steps Organizations Need to Do Now, Post-NCSAM In the ever more connected digital world, identity is no longer just who is accessing your application, but what is accessing it. Prediction of more than 42 billion connected entities by 2022 and it’s easy to understand how data is the new currency. Now ask yourself: are you ready to protect your organization’s data?
  • 10/29/2018 - What Skiing Taught Me About Managing Digital Risk: Be Prepared Every organization in today’s digital world faces a choice: Pursue digital transformation and the opportunity it brings, or get left behind by those who do. Identity and access management (IAM) has an important role to play in helping manage risks that come with seizing the moment.
  • 10/25/2018 - Will you miss your favorite passwords? We rely on passwords to reach our digital destinations, much like we once relied on printed maps to get from point A to B. Technology, like Global Positioning Systems (GPS), made printed maps virtually extinct. Now, with new technology from Microsoft, could passwords finally go the way of the dinosaur, or at least become an endangered species?
  • 10/24/2018 - Beyond Your Bank Account: Ten Astounding Finds Uncovered by Financial Malware Financial malware is prevalent and capable of stealing more than your bank account number. Across many cybercrime investigations, RSA intelligence analysts have uncovered astounding finds stolen by financial malware. It is an alarming trend that should raise awareness among every digitally connected individual about how vulnerable we really are.
  • 10/22/2018 - Three Ways to Ensure We Win the AI Cyber Arms Race Artificial Intelligence and Machine Learning are considered by many to be the next evolution of the cybersecurity mousetrap. However, the security community must first proactively work together to win the AI cyber arms race and keep what could be our greatest ally from becoming our greatest enemy.
  • 10/10/2018 - Protect Your Network How do you help your SOC deal with attacks that are well-hidden, already inside the corporate firewall, and have bypassed perimeter-based controls? Leveraging network detection and response, security analyst can reduce mean-time-to-detection (MTTD) and extend its detection outreach to identify even the stealthiest attacks hiding in your network.
  • 10/9/2018 - The Other Cyber Skills Gap: Educating Tomorrow’s CISOs While the cyber skills gap discussion has focused on educating the next generation to fill critical practitioner-level roles in cyber defense, few talk about how education will play a significant role in helping the current generation to take their place in that future fight as senior security executives at the board and briefing room tables.
  • 10/4/2018 - Experts Speak Out: Managing Digital Risk During NCSAM – and Beyond In today’s threat landscape, risk is everywhere. See what tips and best practices top industry experts share for protecting yourself, your family and your organization from fraud or a cyberattack.
  • 10/3/2018 - Prepare for PSD2: Understanding the Opportunities and Digital Risks PSD2 introduces a new open banking environment in Europe, bringing the promise of more innovative products and services. PSD2 is expected to dramatically increase transaction volume and thus the threat of more fraud. The regulation’s technical requirements zero in on keeping open banking secure. Here’s what you need to know about the requirements and how to address compliance.
  • 10/1/2018 - Practice Cybersecurity Every Day, Not Just October After a year of several high-profile attacks, remember that demonstrating good cyber hygiene should be done year-round, not just during National Cybersecurity Awareness Month.