Manage Digital Risk
Address Critical Business Needs
Enabling the Advantaged Enterprise
I was in my 36th floor hotel room in Las Vegas one afternoon last week, after a day of presentations at EMC World, when I was startled by something banging the side of the building above my window. A man in a rope sling winched slowly into sight, swaying from side to side, twirling slightly....
Read more
Hey RSA Archer Summit fans – Pre-Summit Training Course(s) are Discounted!
Don’t miss out on RSA Archer Pre-Summit Trainings – at a discount.
RSA in Leader's Quadrant in Three Gartner Magic Quadrants
We have all heard the adage that great things come in threes. Stooges. Pigs. Blind Mice. The list goes on and on. I have am very pleased to announce another thrilling combination of three – Gartner Magic Quadrants. EMC (RSA) has been positioned in the leader’s quadrant in three Gartner Magic Quadrants: Operational Risk Management,...
The Industrialization of Cybercrime: Driving Innovations in Security
If you compare the world of cybercrime now to that of 10 years ago, there really is no comparison. Whether one measures its impact through estimated profits – which some estimate as now surpassing those of the profits for illegal drugs – or from the scale, scope, and sophistication of available “black hat” services and...
RSA Archer is a 2016 Gartner Magic Quadrant Leader
For the third year in a row, RSA Archer has been named a Leader in Gartner’s Magic Quadrant (MQ) for Business Continuity Management Planning Software (BCMP)! Gartner states in their report that the business continuity management (BCM) market is changing because “continuity of operations is being seen by organizations as a growing risk that needs to...
"I am an imposter."
I was invited to give a keynote at the Cloud Security Alliance (CSA) Congress in Dublin recently, on behalf of my EMC colleague Said Tabet. Two years before, I had spoken at the CSA Congress in Rome about the EU-funded SPECS and SPARKS projects and their relevance to cloud in terms of GRC and security analytics....
How to Speed Up Incident Response
Having an incident response plan in place is key if you want the ability to speed up your company’s reaction to security incidents. However, a recent survey by the Security for Business Innovation Council (SBIC) found that just 30 percent of large organizations have an incident response plan, and of those that do, 57 percent...
Cyber Security is not for the Faint of Heart
It’s only midweek, but we’ve already witnessed an incredibly active week in the technology and especially the cyber security market: the closing of the Dell/EMC merger; HPE’s sale of its non-core software assets, including Arcsight, a leader in the SIEM space, to British firm Micro Focus, Intel’s sale of a majority ownership stake of McAfee...
Two-Factor Authentication Is a Must for Mobile
For the past few decades, two-factor authentication has been used by businesses to enforce entitlements to access sensitive corporate applications and data. It provides an extra layer of security beyond username-and-password authentication mechanisms, which are notoriously insecure and burdensome for users to remember. Now, as the use of mobile devices in the...
A Brief History of NetWitness
For almost a quarter-century, NetWitness has led the fight against hackers and bad actors, evolving constantly to stay ahead of threats. This is the story of that journey, and the next evolution to come.
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.