Manage Digital Risk
Address Critical Business Needs
The Elephant in the Room for Endpoint Security
Stop me if you’ve heard this story before… Three blind men are traveling down the road to visit a friend. On the way, they encounter an elephant. Not being able to see it, they each stopped and felt the elephant to figure out what sort of creature it was. The first one grabbed the trunk...
Read more
Turbocharge your Threat Detection and Response with Endpoint Data
Much like the first internal combustion engine, SIEM needs a turbo boost.
RSA NetWitness Endpoint Now Supports RSA Live Connect
In a previous life, I remember spending time at a company’s co-location facility where many organizations hosted their production and testing environments. There was a shared workspace, and I remember having quite a few conversations with industry peers about various topics. Not surprisingly, the one topic that came up more frequently than others was security...
Detecting "Petya/NotPetya" with RSA NetWitness Endpoint and RSA NetWitness Packets
By Alex Cox, Christopher Elisan and Erik Heuser, RSA Research A Ransomware variant known as “Petya/NotPetya” began making the rounds on June 27, 2017. This ransomware takes a different approach to denying access to the victim’s files. Instead of the usual displaying of a message and letting the victim browse to really see that the...
Moving from Low to High-Fidelity Security
In the 1940s and 50s home audio systems went through a high-fidelity revolution. This is the period when the music recording industry and stereo manufacturers dramatically improved the audio experience for consumers. Technically it had to do with the improved audio capture, more sophisticated mastering (stereophonics), and dramatically improved reproduction of...
Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk
Your SOC can be the cornerstone of your organization’s effort to manage digital risk
Endpoints are our new perimeters
As more devices in our lives exist on the internet and public domains, the perimeters become harder to define, and control. The endpoint has become the new perimeter.
Get to the Choppah
A new variant of this tool, previously reported in 2013 by TrendLabs, was submitted to VirusTotal from the Philippines on March 27th, 2017. Its original filename, 2017.exe, was prescient since it has the ability to exploit CVE-2017-5638 and other previous Apache STRUTS vulnerabilities. File Details File Name: 2017.exe File Size: 107008 bytes MD5: ...
Security Is No Longer A Binary Decision
Learn why David Strom believes cybersecurity is no longer a binary decision.
Cat-Phishing Hackers for Fun and Profit
On June 14th, 2017, a new variant of ZXShell appears to have been uploaded from the Marmara region of Turkey. The Trojan itself is well known and contained x32 and x64 rootkits. This blog describes the functionality of ZXShell, as well as the associate rootkits. The Trojan source code is available here. Metadata File Name:...
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.