Manage Digital Risk
Address Critical Business Needs
Defend the Kingdom - My Final Thoughts
Episode #6 of Defend the Kingdom, “Ghost in the Machine”, brings to close the dramatic battle between good and evil in both Marty’s imagination and his daily work as a security “hunter”. The episode reveals a highly skilled, persistent, maniacal adversary bent on the Kingdom’s ultimate destruction. In Marty’s alter-universe, he sees this as an...
Read more
Hypothesis in Threat Hunting
Today’s threat landscape requires organizations to operate more proactively to keep up with advanced and persistent threats. There is no doubt that the practice of threat hunting has emerged as a key capability to detect stealthy threat actors trying to gain access to the organizational IT infrastructure by evading traditional security measures. Hunting aims to...
"Up Your Game" to Close the Security Skills Gap
Ask any CISO to name the top challenges of the job, and their first response is likely to be the security “skills gap” – the inability to find enough skilled people to handle an organization’s security needs. With over 200,000 security jobs unfilled in the U.S. alone, organizations, especially security operations centers (SOCs), are continuously...
E5 - The Flies and the Hornet - Technical Dialogue
Episode #5 of Defend the Kingdom, “The Flies and the Hornet”, begins with Marty briefing Dave Reinhardt the CISO on a significant compromise of MagnaCorp’s security. Improper logins, remnants of cracking utilities and other evidence clearly indicates a serious problem. The source of the intrusion, while still unknown at this time, points towards a nefarious...
Strategies for Insider Threat Mitigation
Understand key strategies to mitigate insider threat risks.
The Changing Face of Insider Threats
Learn how digital transformation is changing insider threats.
Is Canada really better at Cyber?
The 2016 Cyber Readiness Study of Canadian Organizations was published today by Scalar Decisions, a solution provider based in Toronto, and RSA partner. Scalar was recently rated #1 for Security among Information Communications and Technology companies in Canada by The Branham Group. When we compare the results of the second annual Scalar Security Study with...
E5 - The Flies and the Hornet - Swatting Flies
“How’s it coming?” Marty entered Erin’s office unannounced. They had spent so much time shuttling back and forth between his desk and her office that they dropped all formalities and decorum. Erin looked up from her screen. “Swatting flies,” she said wearily. ‘Swatting flies’ had become their slogan as they tracked down compromised accounts and...
Anatomy of an Attack: CARBANAK
Discovering CARBANAK often means ‘Game Over’. To RSA IR, it means ‘Game On’.
The Realm of Threat Intelligence - It's all about the Packets, or is it?
Full Packet Capture (FPC), those three little words are enough to make most security analyst salivate at the prospect of finding and detecting attacks. Back in the days before anyone realized that you could build an Intrusion Prevention System to actually stop attacks, the Intrusion Detection System was king. If you were very lucky you...
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.