Manage Digital Risk
Address Critical Business Needs
Blockchain: the New Crutch for Fraud
Fraudsters have started to adopt blockchain technology to host their websites.
Read more
RSA's CTO: Bullish on Security, Bearish on Blockchain
Is blockchain the new cyber dark art?
Ransomware Rules for Payment: Do Extortionists Have the Advantage?
When an entire health system fell prey to cybercriminals and medical records were locked up by a ransomware attack in early February, there seemed no choice but to pay the sum demanded in order to avoid the impact on patient care: $17,000 in 40 Bitcoin. And in that single moment, one hospital became the obligatory...
Never Let Your Guard Down. Aroo!
Use this 4-step fight plan to thump attackers in the MMA-like SOC.
Does DDoS Takedowns Really Change Extortion Rules of Engagement?
Will DDoS takedowns change our rules of engagement for cyber extortion?
The Era of Proportional Ransomware Has Arrived
According to the FBI the incursion of ransomware has just gone from bad to worse. In a recent alert, the U.S. Federal Bureau of Investigation (FBI) warned that recent ransomware variants have targeted and compromised vulnerable business servers to identify and target hosts, thereby multiplying the number of potential infected servers and devices on a network. More...
Cybersecurity's Poverty Gap
As we pass the halfway point of 2016, the United States Presidential election process is in full swing. Candidates continue to make the case for why their worldview is in the best interests of the nation. Perhaps no other topic polarizes the candidates and receives more prominence in this context than wealth inequality. Within cybersecurity,...
Phishing Lives On with New Bait
The saying “Gone Fishing” on the once prosaic signs hanging from rural-based gas stations or car repair shops has evolved to mean something completely different in 2016. While phishing attacks are not growing by leaps and bounds like other types of cyber threats, it is certainly showing no signs of slowing down. Last year, RSA...
Ransomware: The New Cyber Kryptonite
And then, there was irony. While Apple has been able to hold out against the FBI demanding it produce a backdoor into the iPhone used in the recent San Bernardino attack, it was unable to render a similar defense against a strain of ransomware that recently, albeit briefly, infected its own Mac computers. The recent...
The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files?
Advanced ransomware—malicious software designed to take control of a computer system and hold it hostage until the victims pay for its release—is one of the fastest-growing areas of cybercrime. Another closely related threat is cyberextortion, where attackers threaten to cause harm to a company by releasing sensitive information to the public or sustaining...
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.