Manage Digital Risk
Address Critical Business Needs
The Realm of Threat Intelligence - Journey from the past into an Advanced SOC
Using Intelligence to gather information on your adversary is not a new concept, Military and Government Agencies have been involved gathering information to use against their opponents since the days of Sun-Tzu and Chanakya. Cyber Intelligence has also been the domain for Government agencies like the UK’s GCHQ and the US’s NSA for many years;...
Read more
Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk
Your SOC can be the cornerstone of your organization’s effort to manage digital risk
The Journey to an Intelligent SOC
Find out how to build your roadmap for maximum impact.
Part 4: Fundamentals of the Game - There is no intelligence without data
After having identified the set of fundamental skills needed to set up a successful SOC, highlighted the importance of the alignment between SOC and business goals, and understood how people, processes, and technology must work together for a SOC to be successful, we now investigate the next SOC fundamental skill: focus on data through visibility...
Behind the Data: Analyzing the SOC Findings from RSA Conference 2020
Conference. If you're not familiar, the goal of the RSAC SOC is to use technology to educate attendees about what happens on a typical open, unsecured ...
Part 3: Fundamentals of the Game - People, Process and Technology Alignment
The first post in the Fundamentals of the Game series listed a set of skills that characterize successful SOCs, just like the excellence in offensive and defensive fundamental skills characterizes the greatest players in basketball or any other sport. The second article provided details on one of these fundamental skills (established alignment between SOC and...
Perspectives: It's Not If, It's When, A Cyber Attack Will Hit
How to prepare your threat team to respond to the inevitable.
Metrics (Not Just Fun Facts!) Are key to driving a Business-Driven Security Strategy
Dave Gray & Azeem Aleem “What’s Measured Improves” Peter Drucker It’s mid-2017 and we have already witnessed the conundrum across organizations as the pressure of building a more efficient business creates loopholes for cyber criminals to gain an advantage. In a previous blog we talked about the traditional perimeter melting away and how the “not...
Introducing the RSA Cybersecurity Summit
Get a preview of the RSA Cybersecurity Summit
RSA Academic Alliance Programme – Plugging the cybersecurity talent gap
RSA tackles the cybersecurity talent gap through educational partnerships.
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.