Blog: RSA Fundamentals

Elevate your organization’s cybersecurity and GRC maturity with best practices from a global leader in both disciplines.

  • 9/19/2017 - Loyalty Fraud: Are You a Sitting Target? Cybercriminals are increasingly turning to loyalty schemes as a rich source of rewards. In the wake of many high-profile data breaches, account takeover attacks targeting loyalty and rewards accounts are growing, and organizations need effective ways to combat the threat.
  • 9/18/2017 - In the Wake of Recent Breach It’s Time to Revisit Your Fraud Strategy In light of the recent mega breach, where over 143 million U.S. citizens were impacted, it is critical for organizations to pause for a moment and reflect on critical steps they must immediately focus on to align information security and fraud strategies to mitigate risk.
  • 9/12/2017 - 7 Steps to a GRC Risk Management Framework-7: Provide Visibility This last step in the process involves providing visibility into and reporting on risk. Remember, in creating the framework, you’re examining business processes and outcomes that can introduce risk to the organization. For business leaders to make informed decisions to manage that risk, they need easily visualized, timely information about it.
  • 9/5/2017 - 7 Steps to a GRC Risk Management Framework – 6: Enterprise Risks & Controls Enterprise-wide documentation is a vital step because if you want to exert control over activities that create risk—such as unauthorized persons accessing information categorized as important and at risk—you have to be able to identify those activities. And documenting information-related business processes is how you do that.
  • 8/29/2017 - Big Hearts lead to Big Cybercrime Watching the news over the weekend has revealed a global outpouring of support for people impacted by the latest hurricane. These are the times when humanity shines and many corporations look beyond their bottom line, offering both money and employees to help. However, what brings out the best in humanity also brings out the worst in cybercriminals. They know any time there is a natural disaster many of us are desperate to help and so they play on our emotions – and wallets.
  • 8/29/2017 - 7 Steps to a GRC Risk Management Framework-5: Residual Risk Of the many challenges managing information risk, perhaps the greatest is knowing where to focus risk management resources. If you don’t have a clear understanding of the risk associated with the information in your organization, you may end up misdirecting scarce resources.
  • 8/23/2017 - A Security Decision – Build or Buy We are sometimes asked to compare our threat detection and response solutions to those custom assembled by security experts using various open source products. With a wide array of quality point solutions available, it’s natural to consider whether a combination of best-of-breed open source solutions can be a better option for a particular organization...
  • 8/22/2017 - 7 Steps to a GRC Risk Management Framework-4: Evaluate Risk Treatments Continuing our journey through the seven steps to build a risk management framework for information leads us to evaluating the risk treatments available to you. In evaluating risk treatments, as in the previous steps, documentation is key.
  • 8/21/2017 - My Summer Defending the Digital Universe In RSA’s quest to build out a deeper pool of future Defenders of the Digital Universe I had the pleasure of having Meghan O’Connor as a summer intern on my team. During her exit interview I asked her what she didn’t realize about cybersecurity and fraud prevention prior to her internship and what advice she would now give.
  • 8/17/2017 - Addressing Identity Risk Factors Mobile and Cloud have raised the stakes for security in general and for identity-related security challenges in particular. But while identity-related risk has grown tremendously, in many ways, the risks themselves are ones we’ve long recognized – such as orphaned accounts, segregation of duties (SoD) violations and privileges following users to new roles, among others.