Manage Digital Risk
Address Critical Business Needs
Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk
Your SOC can be the cornerstone of your organization’s effort to manage digital risk
Read more
The Journey to an Intelligent SOC
Find out how to build your roadmap for maximum impact.
Considerations Towards Enabling A Virtual SOC Environment
Consider these three things as you enable a virtual SOC
Reimagining the SOC for the Future of Work
Navigate the challenge of enabling a virtual SOC.
Behind the Data: Analyzing the SOC Findings from RSA Conference 2020
Conference. If you're not familiar, the goal of the RSAC SOC is to use technology to educate attendees about what happens on a typical open, unsecured ...
Launching the Security Operations Center (SOC) at RSA Conference
Welcome to RSA Conference 2017! The RSA Conference SOC team set up the Security Operations Center over the weekend. We were here along with scores of construction crews re building huge booth displays for some of the largest security companies in the world. It was a long weekend of building, lighting – and of course...
Revisiting the SOC Structure
Building and maintaining skill sets and expertise in a SOC is a difficult task – and many security leaders face this challenge. They are not able to retain best of the talent for long term. There are too many tools for them to invest in,,, too many alerts that pop up when the tools are...
A View From the #RSAC SOC
First full day at RSA Conference 2017 started with an excellent keynote and the expected rush of mobile devices to the wireless network. After a bit more than a day the Wi-Fi network is regularly pushing 500-700mpbs of traffic, which the RSA NetWitness® packet decoder is handling nicely. The port scanning activity detected on the...
How RSA’s Acquisition of Fortscale Acts as a Force Multiplier for the SOC and IAM Teams
RSA’s acquisition of Fortscale enables better security for the digital enterprise.
Building rockstars in SOC
What makes detection most effective? I know you are thinking technology. However, if you have been in the security operations domain for long, you know the answer. It’s the “people” who use the technology. As a infosec leader/member for your organisation, you should continuously look for methods and tools that make your teams better and...
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.