Manage Digital Risk
Address Critical Business Needs
MySpace and Tumblr Breaches Put Other Consumer Brands on Alert
With the unveiling of two more “mega breaches” this morning, the headlines and news cycles are clamoring for continued updates. The more serious of the two involved the breach at MySpace with 427 million email addresses and linked passwords stolen. The other involved 65 million unique emails and passwords stolen from the popular site, Tumblr. ...
Read more
Account Takeover Surge Results from Mass Data Breaches and Phishing
Find out what is behind the surge in account takeover attacks.
New Survey: Consumers Increase Security Expectations in Wake of Password Breaches
Several years ago, I was talking to an organization which had recently deployed risk-based authentication on its online customer portal. Based on their business model, I was especially curious to learn why they had selected to add consumer authentication to their website. The answer was simple, “It is a competitive advantage for us.” Fast forward...
Chances are your account has been breached
When it comes to protecting personal data, there are three types of people in the world: Those who go to great lengths to protect their personal information, using unique passwords and trying to remain un-breached. Those who are ignorant or ambivalent to the impact of breaches and the personal security risk they entail. Those who...
Applauding the President's Cybersecurity National Action Plan
“The Cybersecurity industry is fundamentally broken… and the problem is not technology, but mindset.” These recent remarks by RSA President Amit Yoran have been echoed around the country and in the halls of government in the wake of serious breaches to the Federal government. From last year’s OPM breach, to last week’s breaches impacting DHS...
Reducing The Noise
Today, enterprise infrastructures are borderless and are generating more data than ever. Coupled with the fact that more and more breaches are happening every year, it’s not a matter of “if we get breached”, it’s “when we get breached.” Organizations not only require a team of skilled security professionals, but also advanced security controls to detect and respond...
How Breach Readiness Is Enhanced by Threat Intelligence
Breach readiness is essential to limiting the impact of data breaches, regardless of industry or company size. Recent RSA research determined the current state of breach readiness and response at large organizations. The four critical areas considered in the survey were threat intelligence, content intelligence, analytic intelligence, and incident response....
Behind the Crime: New Phishing Attack Launched Every Two Minutes
Learn which global fraud trends had the most impact on businesses in 2019.
Operational Forensics and Visibility: It's About Time
The information security community is well aware of the current state of play between attackers and defenders. Attackers are quick to gain access to enterprise systems and quick to start getting enterprise data out, whereas defenders have been painfully slow to detect threats, then respond and recover. The fact-based analysis and insights that are now...
Eliminating Access Blind Spots in the Modern Enterprise
Last year, 63% of data breaches involved compromised identities. This year, it’s up to 81%. As the world settles into the “new normal” of mobile, cloud and other nontraditional access points for applications and other resources, the problem of identity-related attacks isn’t going anywhere; to the contrary, it’s getting bigger. We can’t promise those numbers...
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.