Manage Digital Risk
Address Critical Business Needs
Living With The Hacker-Industrial Complex
To protect our networks, we have to really know our networks and try to get to know our attackers. This requires us to admit to 3 basic “Ground Truths.”
Read more
Protecting Identities in a hacker's world
Imagine being in a place where everyone around you is smarter than you and are, in fact, admitted hackers. Welcome to protecting the identities behind Black Hat Asia 2017’s infrastructure. With a large contingency of attendees at this year’s conference there is a constant need to protect the identities of the team maintaining and monitoring...
The Hacker Wish List
What are hackers adding to their holiday wish list this year?
Wearables leaking your passwords? We can solve that.
Recently, I wrote about a newly published white-paper showing the power of wearable devices to help determine if users are who they claim to be, on a continuous basis. The paper describes a method, which in part relies on correlating a user’s gestures and movement on 2 devices in proximity of each other: The user’s...
The Latest From The RSA NOC At Black Hat Asia
When sitting in the Network Operations Center (NOC) for one of the world’s largest hacker and security conferences, sometimes no news is good news. Here in the Black Hat Asia NOC, we anticipated and prepared for the region’s hackers to come and share a wireless network. Following initial set-up, during the training days, we observed...
Hackers Hunt for Healthcare Records
What’s the difference between data theft from a bank account versus a healthcare record? For starters, think of theft from a bank account as the equivalent of a single withdrawal; one and done. Sooner than later it’s discovered, a new account number is issued and, as a hacker, you’re effectively cut off. When it comes...
POS Malware and Other Hacks Plague the Hospitality Industry
The days of making “analog accommodations” at hotels — filling out a reservation slip, taking ownership of a door key and having only a telephone handset to communicate with the outside world— are long over. Today’s hotels are rife with digital trapdoors, metaphorical sinkholes that have the capacity to compromise your personal information and identity....
Planning for a Breach Crisis
If your company doesn’t have a crisis communication function and doesn’t have a breach readiness plan, in the event of a public security incident it’s highly likely the marketing department will be the one everyone looks at when the CEO says ‘now what do we do?’ How do we manage the media? What do we tell customers,...
Multi-Factor Authentication Made Simple for Legacy and Custom Apps
What to do when there’s no time or budget for a major development project.
The IoT of Life: When Digital Transformation Becomes Personal
Smart medical devices are making digital risks very personal for many.
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.