Manage Digital Risk
Address Critical Business Needs
Does DDoS Takedowns Really Change Extortion Rules of Engagement?
Will DDoS takedowns change our rules of engagement for cyber extortion?
Read more
Ransomware: The New Cyber Kryptonite
And then, there was irony. While Apple has been able to hold out against the FBI demanding it produce a backdoor into the iPhone used in the recent San Bernardino attack, it was unable to render a similar defense against a strain of ransomware that recently, albeit briefly, infected its own Mac computers. The recent...
How RSA NetWitness Platform® Protects against Ransomware Attacks
RSA NetWitness Platform can identify and prevent ransomware attacks. Learn how.
Ransomware Rules for Payment: Do Extortionists Have the Advantage?
When an entire health system fell prey to cybercriminals and medical records were locked up by a ransomware attack in early February, there seemed no choice but to pay the sum demanded in order to avoid the impact on patient care: $17,000 in 40 Bitcoin. And in that single moment, one hospital became the obligatory...
Phishing Lives On with New Bait
The saying “Gone Fishing” on the once prosaic signs hanging from rural-based gas stations or car repair shops has evolved to mean something completely different in 2016. While phishing attacks are not growing by leaps and bounds like other types of cyber threats, it is certainly showing no signs of slowing down. Last year, RSA...
Three Steps for Reducing External Brand Threats
Protect your brand, reputation and revenue against fraud.
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.