Blog: RSA Point of View

Uniquely linking business context with security incidents to help organizations manage risk & protect what matters most.

  • 7/8/2020 Risk Manager: The Top Career of the Future? In a time of change, risks will follow. As organizations look to navigate their next normal, expect the demand for risk management professionals to expand greatly in the months and years ahead.
  • 6/25/2020 Voice to Tweet Fuels New Fears for Deep Fakes and Cybercrime With the introduction of voice to Tweet, consumers get a powerful new tool. As with innovation, there is risk. Learn how voice can be exploited across many domains if it falls into the wrong hands.
  • 6/23/2020 Making the Next Digital Transition Will Require Extensive Security Planning Consulting firms have outlined a 90-day plan for moving into the digital future. Often, these overlook critical security functions. David Strom offers three considerations for how to navigate these potential challenges.
  • 6/22/2020 Introducing the RSA Cybersecurity Summit As your organization charts a path into an uncertain future, the security operations team needs the tools and knowledge to help manage and respond to cyberattack risk. Gain valuable insight during the RSA Cybersecurity Summit.
  • 6/17/2020 Passwordless Authentication: Will remote work accelerate the journey? Amid a workforce revolution, organizations must pivot to respond quickly and support distributed workforces capable of working securely. The journey to passwordless authentication will dramatically accelerate as organizations look to provide simple and secure access to resources for remote employees.
  • 6/16/2020 The Changing Face of Insider Threats The traditional insider threat is evolving. Digital transformation, the chaos of our world stage and modern business environments are forcing a new view of this complex threat vector. In Part I of this series, we explore what’s changing and where things are headed.
  • 6/16/2020 RSA Archer Summit: A Virtual Experience This year, RSA Archer Summit comes to you – wherever you are! Register today for the RSA Archer Summit virtual experience.
  • 6/10/2020 Strong Customer Authentication: How Will it Affect Merchants? While it’s tempting for merchants to view SCA requirements as inconvenient, the new requirements is an opportunity to transform the online shopping experience. Merchants that adopt 3D Secure 2.0 will now be able to add more data elements for risk analysis, resulting in better decisioning and less likelihood of being challenged by issuers.
  • 6/4/2020 Is Municipal Ransomware Something to Lose Sleep Over? Does a recent drop in reported municipal malware attacks indicate that attackers have moved on to greener pastures? Or, is there a more insidious, coordinated attack looming? The probability is difficult to gauge, but the potential impact is not. Municipalities' soft digital underbelly demands digital risk management.
  • 6/2/2020 Security Considerations for the Dynamic Workforce The way we work has changed forever. From offices to homes and remote locations, what do security operations need to consider? And how do they need to adapt to this dynamic workforce? There are five security considerations that should be top of mind in this new reality.
  • 5/27/2020 Time to Talk Governance: Managing Access in the New Workplace For organizations that have successfully achieved business continuity, rolling out a remote workforce, it’s now time to focus on governance. While the remote workforce is productive, identity management leaders may be struggling to gain full visibility across the explosion of devices and applications creating the challenge of distinguishing legitimate users from malicious ones.
  • 5/26/2020 There May Be Trouble Ahead As the risk landscape multiplies, proactive organizations will treat cybersecurity and fraud prevention as two sides of the same coin to best inform their threat intelligence.
  • 5/20/2020 Preparing for the Risk Challenges of an Uncertain Tomorrow Here are four risks organizations will likely face in the new normal.
  • 5/19/2020 Lay the Foundations of Digital Risk Management Digital transformation has blurred the boundary between cybersecurity and risk management. As companies’ security and risk functions break down silos to deal with today’s challenges, an integrated approach should emerge to deal with tomorrow’s emerging risks. Digital Risk Management must bring IT, Security and Risk teams together in a unified approach and address fundamental areas of digital risk.
  • 5/19/2020 Fraudsters Exploit Benefits Programs in New Round of Global Attacks Cybercriminals are exploiting benefits insurance programs when people are undergoing a historically vulnerable moment.
  • 5/17/2020 GRC and Security: Finding Balance in the New Normal The Securities and Exchange Commission recently issued guidance on how the pandemic might impact company filings of 10-Qs and Ks. What are some considerations and challenges related to this guidance?
  • 5/11/2020 Digital Transformation: Innovation Amid Disruption Companies pursue digital initiatives to improve customer experiences, deliver new products and services and optimize operations, reduce costs and improve margins. Today’s disruption has accelerated the need for digital transformation to meet unprecedented business challenges.
  • 5/6/2020 Who is Responsible for Securing Telemedicine? There are areas of our lives and society that might not go back to exactly the way they were before the pandemic. Those could include working from home versus in an office. Retail will likely begin to transform digitally in ways not seen before. Corporate travel might decrease as more people work from home. I’m not sure how I feel about those changes, but one area I have embraced is telehealth or telemedicine.
  • 5/5/2020 Securing the New Digital Reality The current disruption is paving the way for a more digitally-enabled future. Learn what steps organizations should take to prepare their security and risk management strategies for this new reality.
  • 5/3/2020 New Healthcare Legislation: Striking a Balance Between Privacy and Convenience As the healthcare industry focuses on managing the current disruption, new interoperability guidance from the 21st Century Cures Act offers patients secure access and open exchange of health information via third-party applications.
  • 4/29/2020 The Future of Preventing Digital Fraud and Improving the Customer Experience Organizations should prepare for a new normal that includes greater proliferation of digital channels and more digital fraud risk. See what steps a business should take now to mitigate future challenges.
  • 4/26/2020 Security & Risk Controls: Why You Need Them It's time to assess the organization's security and risk controls.
  • 4/15/2020 Tips for Applying the Known in a Time of Uncertainty While the future is unclear, turn to the certainties to help your business navigate today's disruption.
  • 4/7/2020 Managing Risk in Times of Disruptions Disruption isn’t a new concept for security and risk leaders. Minimizing the impact of disruptions is a big part of the job. But most organizations are experiencing a whole new level of disruption lately, with unprecedented speed and magnitude of impact. The speed of change alone has many security and risk leaders’ heads on a swivel.
  • 4/1/2020 It Takes Two to Tango Cooperation between fraud and risk departments and information security departments is essential. After all, these are two sides of the same coin: the failure to address cyber risk invariably leads to fraud.
  • 3/29/2020 Pandemic Fuels Cybercrime: 8 Scams to Watch For From phishing, to account takeovers, social media attacks and more – fraudsters are leveraging the global pandemic to prey on public’s fears. Here’s what consumers need to know.
  • 3/24/2020 Think Long-Term: Learning from Today’s Lessons in Business Resiliency The definition of business continuity is changing in today’s climate. By assessing your preparedness now, you can plan for the future and enable continuity in a world of unexpected and changing disruptions.
  • 3/19/2020 Cyber Resiliency Begins at Home As organizations send employees home, so too do educational institutions. With everyone relying on the home network as never before, it is important to take time securing it – and your family.
  • 3/16/2020 Renaissance of the OTP hardware token Multi-factor Authentication is just that – multi-factor. There are a number of ways to implement MFA including the use of OTP hardware tokens.
  • 3/15/2020 Conquering Cyberthreats as the Cloud Booms As the cloud proliferates rapidly into every corner of an organization, it’s time to reimagine your approach to cybersecurity.
  • 3/1/2020 Reality Check: The Story of Cybersecurity It’s our stories that make us human. We love a memorable narrative and often exaggerate characters and fudge reality to fit the narrative. The cybersecurity industry has an incomplete and overly simplified view of the characters in our story: the human element. It’s time to review the facts and set the story straight.
  • 2/19/2020 2020 Vision: Driving the Future of Identity Digital transformation journey is a continuous process, one that comes with unprecedented identity risks, threats and challenges. RSA is driving innovation of the RSA SecurID® Suite to help customers secure their journeys and a passwordless future.
  • 2/18/2020 Why I am Excited for RSA's Next Frontier RSA NetWitness enters the next frontier while helping customers manage cyber attack risk.
  • 2/18/2020 New decade, new possibilities 2020 is a new chapter for the storied journey of RSA in helping businesses manage digital risk.
  • 2/18/2020 With a New Decade Comes a New Chapter At a momentous time in the history of RSA Archer, it is time to look forward to future innovations
  • 2/18/2020 Our Next Episode RSA President Rohit Ghai believes the future will create new opportunities to help customers manage digital risk. Symphony Technology Group announces intent to acquire RSA.
  • 2/12/2020 The RSA Homonym RSA® customers have legitimate reasons to be concerned when reading that RSA certificates are vulnerable. Those concerns are addressed by explaining how RSA products use, and generate, RSA certificates and cryptographic keys.
  • 2/10/2020 Tried and True: Past Cybersecurity Practices Still Relevant Today As you enter this new decade, don’t overlook the industry best practices that have been valid for more than 15 years as you work to manage the digital risk challenges of tomorrow.
  • 1/15/2020 Small Business and the Struggle with Cyber Small businesses often see cybersecurity as expensive and unobtainable, the domain of the large enterprise. While cybersecurity measures are essential for all, small businesses actually have significant advantages over the enterprise and can absolutely play with the big boys, even in sensitive spaces.
  • 1/14/2020 The IoT of Life: When Digital Transformation Becomes Personal Smart medical devices and wearable technologies are revolutionizing the healthcare industry and having a positive impact on the patients who use and rely on them. As with any ground-breaking technology, there is the unintended risk of cyber attacks targeting protected health information (PHI), or even worse, interrupting healthcare delivery.
  • 12/15/2019 Change is Inevitable: Pondering the Near Future Why do we make predictions? It’s not just cybersecurity or technology foretelling the future, either. Everyone does it, to some degree, and we all tend towards rolling our eyes at them. But predictions have a purpose – to envision the future. To make it less unknowable, less scary and enable us to take the risks necessary to create the next game changer.
  • 12/9/2019 Should FIDO2 Be on Your Christmas Wishlist? It may be getting colder outside but FIDO is just heating up. How can organizations take advantage of this latest authentication trend and what are the best practices for using the technology securely? RSA and Yubico team up to provide the answers.
  • 12/8/2019 Why You Need a Chief Trust Officer To address the challenge of digital risk, organizations need to look at creating the role of a Chief Trust Officer to help them navigate the risks of digital transformation.
  • 11/18/2019 A Singular View of Risk: Key Bank Weighs in on Digital Transformation Digital innovation continues to offer a flood of opportunities to traditional banking and risks that are impossible to ignore. Brian Drotleff, Director of GRC and Risk Assessments at Key Bank shares his perspective on how digital transformation is impacting his enterprise and the finance industry.
  • 11/11/2019 Giving Thanks & Looking Forward to 2020 As you prepare for a new year, it’s time to reflect on mistakes and learn from the past.
  • 10/21/2019 To Transform Your Business, You Must Transform Risk Management The nature of risk management is changing as organizations transform digitally. At RSA® Charge, ITSPmagazine talked with RSA thought leaders, partners and customers to gain insight into the risks of digital transformation, and how to manage them. Check out their conversations in this blog.
  • 10/10/2019 The East India Company, Rockefeller and Risk Digital initiatives are changing how companies operate today and how they dream about tomorrow. The risks that are pursued and the opportunities that are uncovered rely on quantifying digital risk effectively. This includes understanding loss exposure in financial terms and the ROI and business case of the positive results as factors in a risk assessment.
  • 10/3/2019 Are You Really Cyber Aware? Are you as prepared as you should be to manage digital risk and address new cybersecurity challenges? See what considerations you should make during National Cybersecurity Awareness Month.
  • 9/10/2019 Experts Weigh In: The Digital Risk Challenges of a Smart City Driving towards Smart City innovation will disrupt the security of many countries. Industry experts weigh in on what challenges could be ahead and how to manage the potential digital risks.
  • 8/20/2019 Digital Transformation: New Security Challenges & Renewed Call for Governance Despite increased investment in security, the number of large-scale breaches continues to grow. PWC's Paul O'Rourke weighs in on what organizations need to do to address the challenge of digital risk.
  • 8/8/2019 How many C-level execs own your security infrastructure? C-Suite involvement in cybersecurity planning is essential, but you need to be organized and share responsibilities across departments and disciplines.
  • 7/31/2019 Real-Time Observations in Security Hygiene The most recent breach is notable in that several missteps occurred. These missteps are good reminders of the importance of security hygiene in a hyperconnected world. Take a moment to review and then ask yourself if there’s anything here you can apply to your organization
  • 7/23/2019 The New Why of Cybersecurity We talk a lot about the what and how of cybersecurity. “What we can do to leverage modern technologies?” “How can we ensure that the future is, indeed, better?” Several hundred billion dollars and a few decades in it is time to rethink the why.
  • 7/17/2019 Taking the Lead: Addressing the Cyber Skills Gap in Asia-Pacific The cybersecurity talent shortage is a global industry struggle, but one that we can address with time, investment and – most importantly – partnerships. RSA is doing its part with the RSA Academic Alliance Programme across South East Asia.
  • 7/15/2019 RSA Academic Alliance Programme – Plugging the cybersecurity talent gap Since 2014, RSA has been charting its course together with higher learning institutions to address the global shortage in the cybersecurity talent pool, as well as fighting off cyber threats. The RSA Academic Alliance Programme is a gradual and sure way for each country to deliver and close that talent gap. Read what some of the leading institutions in South East Asia are doing.
  • 7/9/2019 Taking hybrid cloud security to the next level Are you managing your cloud environments with care? See three best practices for gaining control of an expanding environment and help mitigate digital risk.
  • 6/6/2019 Extending Zero Trust to Digital Risk Management How do you establish the right level of trust in a Zero Trust world? The answer: It depends. The greater the risk associated with rogue access, the higher the level of trust you need to grant access to a resource. With the right level of visibility, you can gain the insights to accurately gauge risk and take action to protect what matters most.
  • 6/4/2019 Risk Analysis vs. Assessment: The Real Key to Understanding Our Digital Transformation Across industries, legacy security issues persist, but investment in tech innovation also introduces new risks. See how InfoSec teams can work with business leaders to assess and analyze these risks.
  • 5/14/2019 Managing the Security Transformation for the Truly Distributed Enterprise As your workforce spreads across the planet, you’ll need to support a new collection of devices, networks, apps and endpoints. Is your organization equipped to manage the digital risks associated with a dynamic workforce?
  • 5/6/2019 With the Increased Adoption of Advanced Technologies, Can Digital Risk Be Far Behind? Digital transformation results in many organizations using robotics and artificial intelligence (AI). This, in turn, raises issues about privacy, cybersecurity and other digital risks; and now regulations may be on the way. Here’s a look at what’s happening and how to be prepared.
  • 4/15/2019 Third-Party Risk: The Soft Underbelly of Cybersecurity Security vulnerabilities and risk brought on through third-party partners will grow as organizations undergo digital transformation. Here’s how you can begin to manage the risk.
  • 3/25/2019 Understanding the Trust Landscape As the pace of digital transformation quickens, managing digital risk has become essential to maintaining trust in essential systems.
  • 3/18/2019 Thinking about Digital Risk? Learn from Others While challenges in digital business operations are like well-known technology risks, there are nuances to today’s world that require a new perspective. We can certainly look to lessons learned by others to deal with emerging risks related to digital transformation.
  • 3/13/2019 Digital Risk Management: Where do I start? The fast moving, high stakes of digital business takes a new perspective. Knowing where to start clearing out the blind spots will help you understand what exposure there is and create an integrated strategy that enables innovation while managing risk.
  • 3/10/2019 The Trust Landscape Better. The 2019 RSA Conference theme celebrates our successes and urges us to continue improving the security of our digital world. This year's RSA keynote took us on a fictional journey, but also presented many key truths. There are actions we can take now to help bring about our better digital world -- our Bio-Digital era where we win with Trust.
  • 3/7/2019 An Open Letter to the Cybersecurity Industry on International Women’s Day When we come together, we have the power to do remarkable things that have a significant positive impact across the globe. In our mission to help our customers and communities thrive in today’s high-risk world, it means making sure we are looking at problems from new perspectives. Not just technology issues, but people issues.
  • 3/4/2019 Why You Shouldn’t Worry about Risk Risk professionals use the age-old question ‘What keeps you up at night?’ to identify an executive’s biggest concern. But worry is about fear and your executives shouldn’t be afraid in today’s world. They should have informed concerns. And you – as the security or risk person in the room – should be feeding insights to raise their visibility of the likelihood of events and diminish their distress on the negative impacts.
  • 1/22/2019 Data is the New Currency - Own Your Data or Someone Else Will National Data Privacy Day reminds us how important it is to be empowered to take ownership to protect our privacy, control our digital footprints and advocate for the protection of privacy and data.
  • 1/3/2019 Sleepless in Security: Sensor-y Overload A recent gas line explosion is a reminder that in an era of wireless sensors, the protocols used to communicate, and the software that manages them are potentially vulnerable to digital risk.
  • 12/13/2018 A Theoretical Riskicist's Guide to the Universe Risk has so many variables it is really overwhelming to investigate the future and predict how risk management will transform. When thinking about the future of risk management, it must be approached much like we approach another really, really complex concept... the universe. The Riskicist's Guide leads you through the complexity and come out the other side with a better understanding of how best to manage risk in your organization.
  • 12/10/2018 Build a Global Anti-Fraud Operations Center in Five Steps Fighting global cybercrime is not an easy job, but someone must do it. As organizations undergo digital transformation, the opportunity for attack expands creating unwanted exposure, challenges and vulnerabilities. The RSA Anti-Fraud Command Center has been fighting cybercrime for 15 years with over two million cyber attacks shut down. Learn how they started and the five steps needed to build a world-class anti-fraud operations center.
  • 12/4/2018 7 Security Trends to Watch in the New Year In time for the New Year, David Strom shares seven things security professionals need to be thinking about and how they could impact their organization.
  • 11/15/2018 Santa's Little Helpers? The Surge of Seasonal Workers Brings Additional Risk Learn how to quickly onboard temporary holiday staff without over entitled access and avoid abandoned accounts upon their departure.
  • 11/1/2018 How Secure is Your Digital Presence? Hacking is now big business for criminals. With the creation and availability of data exploding, it’s time to look at how we got here, and what we can do to secure our identities.
  • 10/25/2018 Will you miss your favorite passwords? We rely on passwords to reach our digital destinations, much like we once relied on printed maps to get from point A to B. Technology, like Global Positioning Systems (GPS), made printed maps virtually extinct. Now, with new technology from Microsoft, could passwords finally go the way of the dinosaur, or at least become an endangered species?
  • 10/22/2018 Three Ways to Ensure We Win the AI Cyber Arms Race Artificial Intelligence and Machine Learning are considered by many to be the next evolution of the cybersecurity mousetrap. However, the security community must first proactively work together to win the AI cyber arms race and keep what could be our greatest ally from becoming our greatest enemy.
  • 10/9/2018 The Other Cyber Skills Gap: Educating Tomorrow’s CISOs While the cyber skills gap discussion has focused on educating the next generation to fill critical practitioner-level roles in cyber defense, few talk about how education will play a significant role in helping the current generation to take their place in that future fight as senior security executives at the board and briefing room tables.
  • 10/4/2018 Experts Speak Out: Managing Digital Risk During NCSAM – and Beyond In today’s threat landscape, risk is everywhere. See what tips and best practices top industry experts share for protecting yourself, your family and your organization from fraud or a cyberattack.
  • 10/1/2018 Practice Cybersecurity Every Day, Not Just October After a year of several high-profile attacks, remember that demonstrating good cyber hygiene should be done year-round, not just during National Cybersecurity Awareness Month.
  • 8/27/2018 RSA and NIST Partner to Reduce E-Commerce Fraud Risk In partnership with the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST), RSA and other industry leaders have partnered to develop a framework to help retailers reduce the risk of online fraudulent purchases. Learn more about the recommendations for multi-factor authentication and how your organization can provide public feedback.
  • 8/21/2018 Ready or Not, Here Comes the Next Big Digital Attack The recent ATM hack that netted cybercriminals $13.5 million from a bank in India happened just days after the FBI warned it was coming. Consider this the latest reminder about the importance of being ready for attacks before they happen, not after they’re already imminent.
  • 8/17/2018 Leave the Stone Age (and Spreadsheet) Behind People have been using spreadsheets for all sorts of applications, regardless of whether they were appropriate or not. Including using them for risk management. At the RSA Archer Summit 2018 this week, a mention of replacing spreadsheets by product manager Emily Shipman got some cheers from the audience.
  • 8/8/2018 Digital Transformation, Opportunity and Risk: How Will You Manage? There’s a lot to like about digital transformation and the opportunity it creates, but there’s also a lot to lose, if you don’t manage the risk it brings. Today, digital risk extends to every part of the organization, and you need a well-constructed risk framework to manage it. Here’s what you should know—and do—if you want to come out ahead.
  • 8/1/2018 New Ways to Manage Digital Risk Read why adaptive authentication and SIEM are essential tools to better detect changes in user behavior – fundamental to digital risk management.
  • 7/19/2018 GDPR and Data Governance: Take Advantage The EU GDPR represents a shift in how businesses must address data governance, breach preparedness and risk and compliance management – not just protecting personal data. Take advantage of the connection between GDPR and Data Governance to evolve your digital risk management strategy.
  • 7/12/2018 Evolving the Way Businesses Work in a Post-GDPR World The EU GDPR represents a shift in how businesses must address data governance, breach preparedness and risk and compliance management – not just protecting personal data. Take this opportunity to evolve your digital risk management strategy.
  • 6/28/2018 Rallying the Troops for GDPR The EU GDPR continues to drive organizations to change their processes. No where is this more apparent than in the risk assessment piece. It’s a new risk-based approach.
  • 6/13/2018 RSA's CTO: Bullish on Security, Bearish on Blockchain RSA Chief Technology officer discusses the practical applications of blockchain. Find out more about the distributed ledger technology’s potential and limitations.
  • 6/7/2018 Making Sense of Tomorrow’s Cybersecurity Trends RSA and Secureworks Chief Technology Officers, Dr. Zulfikar Ramzan and Jon Ramsey, discuss next-gen technologies and how taking a risk-based approach is critical as businesses face an evolving threat landscape.
  • 6/5/2018 What Are My Options? Session Encryption Protocols Looking Forward TLSv1.3 is a game changer for some enterprises and data centers, what if I can’t switch to end-to-end and need a transition phase or alternate solution? This provides some options as well as some possibilities for design and development work *if* there is motivation from industry.
  • 6/4/2018 They Are Looking At WHAT? Service Provider Monitoring At the start of an adoption curve there is much apprehension. This is true of TLSv1.3 and those managing enterprise networks and data centers. The IETF working group spent much time listening to operators and their concerns in order to better address and improve adoption.
  • 5/31/2018 Network Monitoring is Dead… What Now? TLS, QUIC and Beyond Recent conference discussions revealed much about what is top-of-mind for decision makers as they look towards session encryption and when and where to adopt TLSv1.3.
  • 5/24/2018 Unintended Consequences as Marketing and New Data Privacy Regulations Collide Marketing leaders must anticipate the unintended consequences of data privacy regulations as they may be highly disruptive and potentially stall your program execution. Learn more about these consequences on the eve of the latest in data privacy regulation.
  • 5/21/2018 Secure Payments of the Future Protecting the safety and integrity of the U.S. payment system is a top priority and the responsibility of all stakeholders in the payments industry. Learn more about how the Secure Payments Task Force is enabling stronger, safer payments and the challenges and opportunities that come with a secure payments infrastructure.
  • 5/18/2018 Yanny or Laurel? Integrated Risk Management or GRC? The debate rages on – Yanny or Laurel? Which do you hear? This isn’t the only dispute blistering across media. While not featured on Ellen or The Today Show, risk management has its own version of Yanny and Laurel.
  • 4/23/2018 Cybersecurity Silver Linings Cybersecurity must pay attention not just to the technology of defense, but the psychology of defense. The spirit of the defender matters as much as the shield she or he wields. For years we have motivated ourselves by the fear of what happens if we fail. Lets inspire ourselves with the glory of what we enable when we are successful.
  • 4/16/2018 "Pain and Progress" in Managing Digital Risk Recently, RSA® commissioned the Cybersecurity and Business Risk Survey, executed by Enterprise Strategy Group (ESG), to learn more about the challenges and priorities of IT security and business risk professionals. “Pain and Progress: The RSA Cybersecurity and Business Risk Study” provides a glimpse into the minds of security and risk leaders.
  • 4/10/2018 Here’s to FIDO Alliance: In Praise of Authentication Protocols How many types of authentication are enough? The simple answer is: as many as the organization needs to be sure users really are who they say they are. That’s what the relationship between RSA and the FIDO Alliance is all about.
  • 4/5/2018 How RSA’s Acquisition of Fortscale Acts as a Force Multiplier for the SOC and IAM Teams For years, the industry has thought of the SOC and IAM as separate teams and capabilities, but they’re really two sides of the same coin. RSA’s acquisition of Fortscale enables customers to leverage UEBA capabilities as a force multiplier for both disciplines.
  • 3/1/2018 Cybercrime Operations: Where Will Fraudsters Go Next? The recent takedowns of several major underground marketplaces have forced fraudsters to move their cybercriminal operations to new platforms. Some newly favored options include social media platforms, websites hosted on the blockchain, and perhaps even your refrigerator.
Recommended for you