Manage Digital Risk
Address Critical Business Needs
The Carbanak/Fin7 Syndicate: A Historical Overview Of An Evolving Threat
Carbanak/Fin7 is recognized for using APT-style tactics, but are they an APT?
Read more
An Update on Terracotta VPN
An update on the Chinese VPN service Terracotta, research reported by RSA in August 2015. Linked to APT threat groups Deep_Panda / Shell Crew
The Realm of Threat Intelligence - It's all about the Packets, or is it?
Full Packet Capture (FPC), those three little words are enough to make most security analyst salivate at the prospect of finding and detecting attacks. Back in the days before anyone realized that you could build an Intrusion Prevention System to actually stop attacks, the Intrusion Detection System was king. If you were very lucky you...
Tales from the Black Hat NOC: Are We Broken?
Walking through the expo hall at Black Hat Europe was uplifting – if the vendor booths were to be believed, APT’s can be stopped in their tracks, Ransomware protection can be guaranteed, and phishing can become a term applied to lake activities again. All it requires is buying this tool! It made me wonder why people...
Does DDoS Takedowns Really Change Extortion Rules of Engagement?
Will DDoS takedowns change our rules of engagement for cyber extortion?
Is Canada really better at Cyber?
The 2016 Cyber Readiness Study of Canadian Organizations was published today by Scalar Decisions, a solution provider based in Toronto, and RSA partner. Scalar was recently rated #1 for Security among Information Communications and Technology companies in Canada by The Branham Group. When we compare the results of the second annual Scalar Security Study with...
E5 - The Flies and the Hornet - Technical Dialogue
Episode #5 of Defend the Kingdom, “The Flies and the Hornet”, begins with Marty briefing Dave Reinhardt the CISO on a significant compromise of MagnaCorp’s security. Improper logins, remnants of cracking utilities and other evidence clearly indicates a serious problem. The source of the intrusion, while still unknown at this time, points towards a nefarious...
E5 - The Flies and the Hornet - Swatting Flies
“How’s it coming?” Marty entered Erin’s office unannounced. They had spent so much time shuttling back and forth between his desk and her office that they dropped all formalities and decorum. Erin looked up from her screen. “Swatting flies,” she said wearily. ‘Swatting flies’ had become their slogan as they tracked down compromised accounts and...
Defend the Kingdom - My Final Thoughts
Episode #6 of Defend the Kingdom, “Ghost in the Machine”, brings to close the dramatic battle between good and evil in both Marty’s imagination and his daily work as a security “hunter”. The episode reveals a highly skilled, persistent, maniacal adversary bent on the Kingdom’s ultimate destruction. In Marty’s alter-universe, he sees this as an...
Two-Factor Authentication Is a Must for Mobile
For the past few decades, two-factor authentication has been used by businesses to enforce entitlements to access sensitive corporate applications and data. It provides an extra layer of security beyond username-and-password authentication mechanisms, which are notoriously insecure and burdensome for users to remember. Now, as the use of mobile devices in the...
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.