RSA Blog
Products & Solutions
-
How RSA Identity Governance and Lifecycle Improves Remote Work
3/3/2021Password management can be an overlooked IAM function until you need it. Slow down the pace and cost of Service Desk requests to reset users’ passwords and onboard new users with RSA Identity Governance and Lifecycle.
-
Three Essential Qualities of Modern Identity Management Solutions
2/25/2021Today’s identity and access solutions should empower organizations to take on new challenges, promote flexibility to meet business needs, and offer convenient ways for users and customers to connect.
-
How RSA NetWitness Platform® Protects against Ransomware Attacks
2/17/2021Ransomware attacks are becoming more targeted, sophisticated, and expensive. See how RSA NetWitness Platform can help your organization protect its IP and defend against attacks.
-
RSA SecurID® Access is on Track for FedRAMP Authorization
2/8/2021See why the FedRAMP JAB prioritized RSA SecurID Access.
-
Introducing RSA NetWitness® Detect AI
2/3/2021RSA NetWitness Detect AI is the all-new pure SaaS analytics module for RSA NetWitness Platform. It makes threat detection better, faster, and easier for advanced security operation centers.
-
Why Your Business Should Consider Modern IAM Strategies Now
2/2/2021The coronavirus pandemic will permanently change how and where we work. Businesses need to think through these changes today and invest in IAM strategies for the long-run.
-
Are superior macOS authentication capabilities on your holiday wish list?
12/15/2020In speaking with prospects about their identity management wish lists, we were surprised to hear that better authentication protection and ease-of-use for macOS were at the top of their lists. Learn about the three features that topped their list and the ways RSA is helping their wishes come true.
-
4 Tips for End-to-end Passwordless Authentication for Hybrid Deployments
12/10/2020Most applications are still protected only by passwords that are prone to man-in-the-middle and phishing attacks, increased operational costs, and user frustration. Today, organizations are looking to implement security practices that eliminate passwords. Get four tips on how to go from a password-laden infrastructure to a passwordless one.
-
20 years of Securing eCommerce shopping against fraud and still innovating
11/23/2020Technology has dramatically changed the ways we shop online over the past 20 years, and RSA has been innovating to secure it from fraud along the way.
-
The XDR Perspective: RSA’s View on Extended Detection and Response
10/28/2020Although XDR is a new framework for the cybersecurity industry, RSA has been delivering on the vision of XDR for years. See how RSA NetWitness Platform meets and exceeds the critical components of XDR and helps defend organizations against today’s most sophisticated threats.
-
Managing Risk During a Pandemic: A Discussion with Discover Financial Services
10/6/2020The Security Ledger's Paul Roberts sits down with Discover Financial Services to learn how they've adapted their risk management program to address the unique risk challenges that have emerged during the global pandemic.
-
9/14/2020
Learn why RSA was positioned a leader in the 2020 Gartner Magic Quadrant for IT Vendor Risk Management Tools for a fifth consecutive time.
-
RSA (Again) Named a Leader in Gartner Magic Quadrant for IT Risk Management
8/27/2020Learn why RSA Archer is recognized again as a market leader in IT risk management.
-
Interpretability of Machine Learning Models for Fraud Detection
8/26/2020In the domain of fraud prevention, there’s extensive use of machine learning based decision models. These models offer flexibility and adjust for new fraud patterns. However, it’s essential for model owners to have the ability to explain why a decision was made.
-
Four Trends in Cybercrime Amid Crisis
8/18/2020Amid the on-going health crisis, cybercriminals are using familiar tactics to take advantage of the chaos and emotions surrounding current events.
-
Navigate Your Path to Governing Access and Managing Risk
8/11/2020In the race to enable a remote workforce, it’s important to understand what vulnerabilities may have been created. Gaining visibility and managing changes in access and entitlements is essential to your security posture, but it doesn’t have to be hard.
-
7/30/2020
The concept of enabling a dynamic workforce has shifted from a “nice to have” to a mandate to help the organization remain productive. Many organizations ask how RSA, and more specifically RSA NetWitness Orchestrator, can help them overcome the new security risks associated with the dynamic workforce. Hear what one of our System Engineers has to say.
-
What EU-GDPR Fines Tell Us about Privacy Management
7/28/2020The most comprehensive and widely adhered to privacy law, EU-GDPR, has been in effect for over two years with many fines having been assessed. The biggest fines for violating the law have been assessed for insufficient technical and organizational measures around information security. This blog discusses key program components necessary to avoid this category of fines.
-
Passwordless Authentication: Will remote work accelerate the journey?
6/16/2020Amid a workforce revolution, organizations must pivot to respond quickly and support distributed workforces capable of working securely. The journey to passwordless authentication will dramatically accelerate as organizations look to provide simple and secure access to resources for remote employees.
-
Strong Customer Authentication: How Will it Affect Merchants?
6/9/2020While it’s tempting for merchants to view SCA requirements as inconvenient, the new requirements is an opportunity to transform the online shopping experience. Merchants that adopt 3D Secure 2.0 will now be able to add more data elements for risk analysis, resulting in better decisioning and less likelihood of being challenged by issuers.
-
Time to Talk Governance: Managing Access in the New Workplace
5/27/2020For organizations that have successfully achieved business continuity, rolling out a remote workforce, it’s now time to focus on governance. While the remote workforce is productive, identity management leaders may be struggling to gain full visibility across the explosion of devices and applications creating the challenge of distinguishing legitimate users from malicious ones.
-
GRC and Security: Finding Balance in the New Normal
5/17/2020The Securities and Exchange Commission recently issued guidance on how the pandemic might impact company filings of 10-Qs and Ks. What are some considerations and challenges related to this guidance?
-
Announcing the Launch of the RSA IoT Security Monitor
5/11/2020The Internet of Things (IoT) is a key driver of digital transformation, but also introduces digital risks. RSA IoT Security Monitor offers a new, comprehensive approach to security across the range of IoT devices and software.
-
RSA Archer Offers Rapid Response for Business Resiliency
4/28/2020Your organization may qualify for a free 6-month trial of RSA Archer SaaS configured with the Crowe Pandemic Response app to help you immediately respond to pandemic-related issues. Centralize data needed to identify emerging risks, adapt business initiatives, and care for employees. Get a quick start to support your growing business resiliency needs.
-
RSA Continues User Experience Evolution with RSA Archer Release 6.8
4/28/2020In keeping with our vision to “Inspire Everyone to Own Risk,” RSA Archer Release 6.8 continues the evolution of the RSA Archer user experience. Available April 28, 2020, this release delivers new features and enhancements designed to streamline access to key data and provide a cohesive, actionable view of risk and compliance at all levels of an organization.
-
Gaining Visibility and Control of the Dynamic Workforce
3/30/2020Digital transformation and a changing and dynamic workforce can create challenges. This blog discusses some of the typical challenges and suggestions and insight into the control of a remote workforce.
-
Get RSA SecurID® Access for Free to Help in This Time of Uncertainty
3/12/2020From cyberattacks to natural disasters to outbreaks of illness, business disruptions come in all forms. It’s why RSA is offering new customers the ability to securely extend the convenience of working remotely to their employees for free. Read about this limited time offer.
-
2020 Vision: Driving the Future of Identity
2/19/2020Digital transformation journey is a continuous process, one that comes with unprecedented identity risks, threats and challenges. RSA is driving innovation of the RSA SecurID® Suite to help customers secure their journeys and a passwordless future.
-
2/12/2020
RSA® customers have legitimate reasons to be concerned when reading that RSA certificates are vulnerable. Those concerns are addressed by explaining how RSA products use, and generate, RSA certificates and cryptographic keys.
-
Managing the Future of Digital Risk
2/11/2020Gearing up for RSA Conference 2020, RSA announces three key product innovations to help customers manage their digital risk.
-
The FIDO Alliance Anniversary and YubiKey for RSA SecurID® Access
2/11/2020To address the risks associated with today’s dynamic workforce, customers need choice and simplicity. In commemoration of the FIDO Alliance anniversary, RSA® shares why choice is a key reason they support the FIDO standard and is launching the new YubiKey for RSA SecurID® Access product.
-
Should FIDO2 Be on Your Christmas Wishlist?
12/9/2019It may be getting colder outside but FIDO is just heating up. How can organizations take advantage of this latest authentication trend and what are the best practices for using the technology securely? RSA and Yubico team up to provide the answers.
-
More Stolen Credit Cards Top Fraudsters’ Holiday Wishlist
12/9/2019More shoppers are going online for their holiday purchases – including fraudsters looking to buy stolen credit card data. They’re finding CVVs, data dumps and other goodies posted for sale in chat rooms and other online venues, in greater numbers than ever. Learn which countries are at most risk and how consumers can protect their credit card data.
-
RSA and NIST Agree - MFA a Critical Technology to Secure eCommerce
8/18/2019As eCommerce fraud continues to grow in an omnichannel world, how can businesses keep pace with focused fraud attempts? MFA has proven resilient and effective against eCommerce fraud. NIST recently worked with companies, such as RSA, to produce an MFA best practices document to prevent eCommerce fraud.
-
RSA Labs Project Iris: Edge Monitoring and Analytics for IoT
8/6/2019While IoT is core to digital transformation the proliferation of endpoints creates a strain on effective operational security. . . With Project Iris, RSA Labs data scientists explore new methods and algorithms for monitoring and detecting compromised devices based on anomalous behavior.
-
Fraudsters Bring Fresh Bait to Tax Phishing This Year
2/27/2019The IRS reported a 60 percent increase in phishing scams in 2018 aimed at stealing money or sensitive data from taxpayers and businesses. Here’s what that portends for tax season this year.
-
Build a Global Anti-Fraud Operations Center in Five Steps
12/10/2018Fighting global cybercrime is not an easy job, but someone must do it. As organizations undergo digital transformation, the opportunity for attack expands creating unwanted exposure, challenges and vulnerabilities. The RSA Anti-Fraud Command Center has been fighting cybercrime for 15 years with over two million cyber attacks shut down. Learn how they started and the five steps needed to build a world-class anti-fraud operations center.
-
RSA and NIST Partner to Reduce E-Commerce Fraud Risk
8/27/2018In partnership with the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST), RSA and other industry leaders have partnered to develop a framework to help retailers reduce the risk of online fraudulent purchases. Learn more about the recommendations for multi-factor authentication and how your organization can provide public feedback.
-
Realize the Significant Business Value of Identity Governance
7/17/2018For executive leadership it is becoming even more important to translate technology success into its value to the business. Read this blog to learn new ways you can show Identity Governance is providing business value.
-
Here’s to FIDO Alliance: In Praise of Authentication Protocols
4/10/2018How many types of authentication are enough? The simple answer is: as many as the organization needs to be sure users really are who they say they are. That’s what the relationship between RSA and the FIDO Alliance is all about.
-
The RSA Archer Business Risk Management Reference Architecture
1/30/2018The RSA® Archer® Business Risk Management Reference Architecture is a high-level visual representation of the framework needed within an organization to understand and manage risk and compliance obligations across the enterprise.
-
3 Ways Proximity Authentication Is Revolutionizing Access
12/11/2017Proximity authentication for Microsoft Windows Hello protects access at the first stop a user makes on the way to a multitude of resources: the desktop. It’s a major step toward eliminating the need for passwords, making multi-factor authentication more consumable and, ultimately, enabling continuous authentication wherever users go.
-
Protecting privileged user credentials with integrated MFA
11/30/2017If there’s anything worse than a user’s account being compromised, it’s a privileged account being compromised. Reduce your risk with an integrated set of multi-factor authentication and identity governance capabilities for managing privileged access.
-
Firewall Meets MFA: Secure Access at the Network Level
11/29/2017You can count on your next-generation firewall to protect your network against attacks. But when intruders come with seemingly legitimate credentials, a firewall alone can’t keep them out. For that, you need multi-factor authentication (MFA)—and an easy way to integrate it with the firewall.
-
Identity Brings Opportunity at the Gartner IAM Summit
11/28/2017Identity is transforming to address modern IT challenges. At this year’s Gartner IAM Summit, RSA and others are sharing best practices, exploring new risk-based strategies and expanding technology ecosystems that transform authentication and further mitigate identity risk.
-
Translate Consumer Authentication into Happy Customers and Increased Revenue
11/15/2017Consumer authentication can be so much more than a simple check of the box on your next compliance audit. Learn how risk-based authentication actually increased revenue by 20% through improved customer experience, increased transactions, and reduced fraud losses.
-
Answering The Security Sales Question Of The Day
11/13/2017Four simple, but key steps give your security clients a reason to come back to your business. Learn more about why RSA thinks trust is paramount.
-
Roca: Blaming Infineon Is the Easy Way Out
10/26/2017ROCA isn’t about a weakness in the RSA® algorithm, nor is it about Infineon’s implementation of the algorithm. The problem lies within the method Infineon used to generate the prime numbers for key material.
-
10/9/2017
RSA Laboratories has been in existence since the early '90s when it was the resource for Cryptography Research and Education. The RSA Labs organization has since evolved, even going underground for a period of time, to re-emerge now with a renewed mission and purpose for RSA.
-
Making Access More Secure and More Convenient with Facial Recognition
9/22/2017Flexible authentication is one of the keys to successful identity assurance. With its careful balance of high security and low friction for users, facial recognition technology seems poised to become an important component in any program of flexible authentication.
-
Skills Shortage: The Intelligent Application of Force Multipliers
8/9/2017Many organizations struggle to staff and maintain security operation teams due to a serious shortage of skilled security analysts. The struggle isn’t just about filling open roles; it is equally hard to drive the needed productivity of the resources already in house to make sure the alert that matters doesn’t go unnoticed.
-
Enterprise Network Security at the Black Hat 2017 NOC
8/9/2017Standing up a complete enterprise Network Operations Center (NOC) in two days is no small feat, but doing so for one of the biggest security conferences – Black Hat 2017 - is truly daunting. But it’s not just setup, it’s also running the NOC and giving tours. Providing unified log management, network capture and dashboarding for the many tours and media events is an involved process putting analysts’ skill to the test. Creativity is required … appliances but no rack? No problem! Moving carts work just fine in a pinch.
-
7/24/2017
Did you know only approximately one in 200, or about 0.5%, of high school senior boys playing interscholastic baseball will eventually be drafted by an MLB team? That includes all levels of professional baseball. Only a small percentage of players drafted actually make it to the Major Leagues. The competition to make it to the...
-
Threat Hunting and the Cloud - A Dynamic Tension
7/19/2017In the 1920s, fitness innovator Charles Atlas developed and introduced the Dynamic Tension exercise method. The essence of Dynamic Tension is that it pits muscle against muscle, with a workout intensifying proportionally for both muscles as force increases. As generations of comic book fans have learned since, nobody kicked sand in Charles Atlas’s face after...
-
7/18/2017
By Mike Adler, VP Product, NetWitness Suite If you’re like a lot of IT security professionals, you’ve always been able to rely on your SIEM to provide log data for threat detection. But that’s just not enough to keep up with all the new threats from new sources that are bombarding organizations today. Can your...
-
The Myth of the Easy Button Approach to Information Security
7/11/2017By: Wes Riley and Erik Heuser In twenty plus years navigating the complexities of the information security (InfoSec) industry a common theme emerges: the fascination with creating the digital panacea, or Easy Button. Marketing departments highlight their product in the best light possible and tell you it will solve all your InfoSec headaches. Years of...
-
Cat-Phishing Hackers for Fun and Profit
7/5/2017On June 14th, 2017, a new variant of ZXShell appears to have been uploaded from the Marmara region of Turkey. The Trojan itself is well known and contained x32 and x64 rootkits. This blog describes the functionality of ZXShell, as well as the associate rootkits. The Trojan source code is available here. Metadata File Name:...
-
Ready, Set, Authenticate: Why You Need RSA SecurID Access to Win the Race
6/29/2017There are times when trying to put together an effective authentication strategy feels like competing in track-and-field events. Business and IT are supposed to be on the same team, but far too often seem to be racing toward completely different goals. Sure, it’s important to get to the finish line fast, but not at the...
-
Protecting PingFederate Users with RSA SecurID Access
6/21/2017It’s 10 o’clock. Do you know where your users are? Believe it or not, there was once a time when this question was easy to answer. If “Steve” was logged into the corporate network, there was a very high-level of certainty you would find him sitting in his cube, on the 4th floor of building...
-
Protecting VMware Workspace ONE Users with RSA SecurID Access
6/19/2017While 1999 brought us the Breitling Orbiter 3, Warner Bros. sci-fi thriller “The Matrix,” and Britney Spears mega-hit “Baby One More Time,” it was also a banner year in cybersecurity. During the last twelve months of the millennium, we witnessed the advent of Microsoft’s Windows 98 release, the arrival of the American Express “Blue” card...
-
6/12/2017
In a previous blog I reviewed the real world pay back for being a risk leader. Let’s say your company gets it, they know that good risk management increases the likelihood objectives will be fulfilled and profits improved, and now you’ve been given the assignment to start the risk management program to make your organization a...
-
6/7/2017
Risk is the effect of uncertainty on objectives. Managing risk well increases the certainty that objectives will be achieved. Not surprisingly, organizations leading in risk management “capture the prize”. According to a PWC Risk Review, organizations more frequently achieve their objectives, are more profitable and less likely to experience a negative profit margin than those...
-
Eliminating Access Blind Spots in the Modern Enterprise
6/7/2017Last year, 63% of data breaches involved compromised identities. This year, it’s up to 81%. As the world settles into the “new normal” of mobile, cloud and other nontraditional access points for applications and other resources, the problem of identity-related attacks isn’t going anywhere; to the contrary, it’s getting bigger. We can’t promise those numbers...
-
Delivering Convenient and Secure Access to the Modern Workforce
6/6/2017In the relatively quick journey from don’t-even-think-about-bringing-your-own-device to please-absolutely-bring-your-own-device, identity management has experienced some dramatic transformations. And it’s still evolving now, as security policy continues to move away from limiting user options and toward expanding them. Organizations haven’t taken long to come around to thinking that giving users more ways to access the resources they...
-
Metrics (Not Just Fun Facts!) Are key to driving a Business-Driven Security Strategy
5/17/2017Dave Gray & Azeem Aleem “What’s Measured Improves” Peter Drucker It’s mid-2017 and we have already witnessed the conundrum across organizations as the pressure of building a more efficient business creates loopholes for cyber criminals to gain an advantage. In a previous blog we talked about the traditional perimeter melting away and how the “not...
-
The Business Value of RSA Archer
5/17/2017Implementing an effective governance, risk, and compliance program can be a costly and time-consuming effort: Hardware, software, and the active engagement of a lot of people in the first, second and third lines of defense. Before implementing a program, and periodically throughout the life of the program, the question always arises from senior management: Is...
-
Six Keys to Successful Identity Assurance - Flexible Authentication
5/15/2017So far, we’ve discussed the first five keys to a successful identity assurance: business context, anomaly detection, machine learning, broader ecosystem, and consistent experience. Let’s close the series with an important topic for both end users and administrators: flexible authentication. Administration Flexibility When we think of providing flexibility for administrators, we focus on the authentication...
-
The Next Generation in Consumer Authentication and Fraud Prevention
5/11/2017Fraud risk management has become a burden in recent years, and not just because the attackers have gotten better at their game. The tools and technologies used to detect and mitigate fraud events are better, but they are also plentiful. A recent RSA survey found that 57% of organizations use between 4 – 10 different tools...
-
Authentication Your Way: Have Your Security and Convenience, Too
5/9/2017Your diverse, dynamic user base demands fast, convenient authentication and access—no matter where they are or what devices they are using. But you need authentication to be secure above all, with visibility across all applications and resources (cloud to ground),the assurance that your users are who they say they are and entitled to the access...
-
Your Cell Phone has a dirty little secret it does not want to tell you
5/9/2017If you are a fan of the CBS Show 60 Minutes you may have seen a couple of well-done episodes around the espionage and intrigue of spies hacking cell phones. The problem is that these episodes don’t go far enough informing the average user as to the extent of the vulnerabilities. Inter-telco communications leverages a protocol...
-
RSA Identity Governance and Lifecycle: An Executive View from KuppingerCole
5/2/2017When one of the leading independent analyst organizations in the identity space weighs in favorably on your approach to identity governance, that’s news worth sharing. In the KuppingerCole Report “Executive View: RSA® Identity Governance and Lifecycle,” analyst John Tolbert gets at the heart of RSA’s belief in the effectiveness of an integrated, comprehensive, end-to-end approach:...
-
Black Hat Asia NOC: Malware visibility
4/17/2017By Chris Thomas and Mike Sconzo In the Black Hat Asia NOC we worked to ensure the wireless network was available for presenters and attendees. As part of our monitoring, we kept an eye open for any malware present on the network. RSA NetWitness® Suite’s Malware Detection capabilities look for network sessions containing file-types typically...
-
Choosing a Modern Authentication Solution: 3 Key Considerations
4/5/2017Today’s organizations need to deliver convenient, secure access for the modern workforce. Users want the ability to access systems and applications from anywhere and any device. But before providing them with this access, organizations must be able to verify that users are, in fact, who they say they are. RSA SecurID® Access is an award-winning...
-
Driving Resiliency Through Operational Risk Management
4/3/2017I recently had the pleasure of presenting with a panel of RSA Archer customers on the topic of “Building Resiliency Across the Value Chain” for a Disaster Recovery Journal webinar. Two key questions were posed to the attendees. The first question was: “Where is your organization on the business resilience scale?” The responses were: Recovery...
-
The Latest From The RSA NOC At Black Hat Asia
4/3/2017When sitting in the Network Operations Center (NOC) for one of the world’s largest hacker and security conferences, sometimes no news is good news. Here in the Black Hat Asia NOC, we anticipated and prepared for the region’s hackers to come and share a wireless network. Following initial set-up, during the training days, we observed...
-
Protecting Identities in a hacker's world
3/31/2017Imagine being in a place where everyone around you is smarter than you and are, in fact, admitted hackers. Welcome to protecting the identities behind Black Hat Asia 2017’s infrastructure. With a large contingency of attendees at this year’s conference there is a constant need to protect the identities of the team maintaining and monitoring...
-
Answering the #1 Question in Identity Management
3/21/2017Takeaways from a Recent Identity Survey by IDG It’s the infamous joke we’ve all used at one point or another – “Knock, knock. Who’s there?” When it comes to identity management, knowing the answer to this question is mission critical. Whether your employees, contractors, customers and partners are accessing your data, applications and systems in...
-
PSD2 - Can your transaction risk analysis and strong customer authentication comply?
3/15/2017February 23, 2017 the European Banking Authority (EBA) released the Final Report of the Draft Regulatory Technical Standards on Strong Customer Authentication and Common Secure Communication for the Payment Services Directive 2 (PSD2). This final report heralded a welcome change in the EBA’s position on the exemption to Strong Customer Authentication (SCA) based on transaction...
-
RSA NetWitness Platform named a leader in The Forrester Wave: Security Analytics Platforms
3/13/2017We are excited to announce the RSA NetWitness® Suite has been named by Forrester® Research as a leader in The Forrester Wave™: Security Analytics Platforms, Q1 2017. RSA NetWitness Suite earned perfect marks in the Forrester Wave report for scalability, detection technologies, user behavior analytics, endpoints, integrated network analysis and visibility, and threat intelligence. According...
-
Multi-Factor Authentication You Can Count On
3/8/2017More than 25,000 organizations worldwide trust RSA SecurID® Access to provide a convenient, secure multi-factor authentication experience for their users. And now RSA SecurID Access is honored to have won the SC Magazine 2017 Trust Award for best multi-factor authentication solution – three years in a row. RSA SecurID Access multi-factor identity solution had to...
-
Fraud Insights Through Integration
2/22/2017Another great conference at the Moscone Center in San Francisco. On the heels of RSA Conference, it’s fair to ask: When was the last time you counted the number of anti-fraud tools you are using to protect your consumer-facing environment? Now, when was the last time you thought about the connective tissue tying data sources...
-
A View From the #RSAC SOC - Part 2
2/17/2017In today’s world, cameras are just about everywhere – in stores, on the streets, inside of cars, and many other locations. Now, imagine you are a bank employee and your bank had no cameras – would you feel secure? Probably not. The reality is that many organizations have no “security cameras” on their networks to...
-
Business-Driven Security to Lead through Chaos
2/16/2017My last post discussed the changing nature of security. The impact of today’s cyberattacks aren’t limited to stealing financial information or personal data. Instead, these attacks seed chaos. With this reality at hand, the need for business-driven security is even more pronounced. Security professionals must draw connections between the technical details of a security incident...
-
2/15/2017
First full day at RSA Conference 2017 started with an excellent keynote and the expected rush of mobile devices to the wireless network. After a bit more than a day the Wi-Fi network is regularly pushing 500-700mpbs of traffic, which the RSA NetWitness® packet decoder is handling nicely. The port scanning activity detected on the...
-
2/14/2017
Consider… American Authorities are confident that the Russian Government was behind the cyberattack on the Democratic National Committee. Did that attack change the course of the U.S. presidential election? We’ll never know. But it definitely changed the discourse that followed. The idea of a foreign power mounting a cyberattack to undermine a U.S. election went...
-
Delivering on the Promise of Business-Driven Security Globally
2/13/2017Today, with the introduction of RSA Business-Driven Security, we also introduced the RSA Risk and Cybersecurity Practice. This Practice includes more than 650 globally deployed, employee-based cybersecurity and risk experts to help our clients operationalize their unique business-driven security strategy. Our primary tenant is enabling and accelerating the business while reducing risk, thus creating the...
-
Defining Business-Driven Security for the Modern Enterprise
2/13/2017As I travel around the world and meet with CISOs and security teams, I continue to be amazed at the organizational disconnects around managing cyber risk. Security Operations and Identity & Access Management teams operate their own business processes with very few connection points. Security and Risk & Compliance teams have different world views of...
-
What Peanut Butter Cups Can Teach Us About Fraud Prevention
2/13/2017Reese’s® Peanut Butter Cups are a “so-good-it-has-to-be-bad-for-you” treat adored by candy lovers everywhere. The combination of peanut butter and chocolate is such a classic it’s hard to remember there was a time no one thought about putting these two together. In fact, Reese’s built an entire advertising campaign around the odd couple concept. The original...
-
2017 is the Year for RSA Business-Driven Security Solutions
2/13/2017This week, RSA will be making a global announcement during the 2017 RSA Conference to formally unveil RSA Business-Driven Security solutions, a new approach to help customers manage cyber risk. This architecture, along with several concurrent solution and service announcements, enables customers to take command of their risk posture and secure what matters most. BUSINESS-DRIVEN...
-
Reimagine Your Identity Strategy
2/13/2017We are at the edge of yet another evolution for the Identity and Access Management (IAM) industry. Applications are being deployed at incredible speeds with user populations demanding access from wherever they are, whenever they want, from any device. The network is no longer clearly defined, in fact, identity is the new perimeter. Regulations and...
-
Calm the Churn with the RSA Archer Ignition Program
2/13/2017If as a child you marveled at watching the simple, fascinating micro-example of physics of a pebble dropped into a puddle, you know what the results are. The pebble drops; the water’s surface is broken; ripples fan out from the point of impact… such an unassuming yet beautiful study of cause and effect. Now, imagine...
-
The Elephant in the Room for Endpoint Security
1/23/2017Stop me if you’ve heard this story before… Three blind men are traveling down the road to visit a friend. On the way, they encounter an elephant. Not being able to see it, they each stopped and felt the elephant to figure out what sort of creature it was. The first one grabbed the trunk...
-
Cloud Ready Threat Detection & Response
1/13/2017Organizations are leveraging third party cloud environments for increasingly critical data, applications, and infrastructure. The agility and potential cost savings that both public and private (virtual) clouds offer mean that the business can be more efficient and gain operational and financial advantages. While some organizations – dependent on vertical and “risk” appetite – may be...
-
Defending a Decade of Phishing and Cybercrime
12/13/2016With holiday shopping season in full swing, many of us are feeling just like the guy in the song, “The 12 Pains of Christmas.” I have my own two personal pains with the holidays, and I am still deciding which one is more annoying: Elf on the Shelf, or, the mountain of phishing emails I have...
-
Proximity-Based Identity Assurance: Balancing Act Between Security & Convenience
12/1/2016For years, finding the right balance between security and usability has been one of the biggest challenges for identity and access management (IAM) solution architects and designers. There are ongoing efforts in the industry to replace password-based authentication with something more secure, more convenient, and with minimum investment; such proposed methods seem to fall into...
-
PSD2 and the E-Commerce Ecosystem
11/21/2016Authored by Ian Newns The European Banking Authority recently drafted the latest Directive on Payment Services II (PSD2), which serves as the legal foundation for a cross-EU payments market. In 2016, European e-commerce sales are expected to increase 17% to €183 billion and the use of payment service providers (PSPs) is increasing significantly. Couple this with...
-
Blues and Bridging the Gap of Grief
11/7/2016The sound of blues flooded our ears, as approximately 2,000 information security professionals settled into the Ernest N. Morial Convention Center in New Orleans, LA, for the third annual RSA user conference, RSA Charge, from Oct 25-27. With our stomachs stuffed with local popular fare inclusive of crawfish, oysters & biegnets as we traversed Bourbon Street to...
-
Enabling the Hunt: RSA NetWitness Platfrom Updates & Enhancements
10/27/2016RSA Charge 2016, a gathering of more than 2,000 RSA customers, is off to a great start in New Orleans this week. Bringing together RSA product experts with our users and cybersecurity thought-leaders makes for great conversation, collaboration, innovation – and a little bit of fun! Our RSA NetWitness® Suite solution teams and customers have...
-
The Most Important Visitor On Our Premises
10/5/2016A customer is the most important visitor on our premises, he is not dependent on us. We are dependent on him. He is not an interruption in our work. He is the purpose of it. He is not an outsider in our business. He is part of it. We are not doing him a favor...