Manage Digital Risk
Address Critical Business Needs
Hypothesis in Threat Hunting
Today’s threat landscape requires organizations to operate more proactively to keep up with advanced and persistent threats. There is no doubt that the practice of threat hunting has emerged as a key capability to detect stealthy threat actors trying to gain access to the organizational IT infrastructure by evading traditional security measures. Hunting aims to...
Read more
E6 - Ghost in the Machine - Curtain Call
The Hunter’s horse panted heavily and churned up dust as it raced down the dirt road towards the Frontier. The moonlight glanced off the swirling clouds of powder in the horse’s wake. The Hunter gritted his teeth as the horse careened around a corner. His mind raced. He wondered if he would make it in...
Tales from the BlackHat NOC: Fish and Chips Edition
We’re in the first day of training at Black Hat Europe 2016, and once again – the RSA Black Hat NOC team is volunteering. This round, we’ll have more full packet capture, log analysis, session reconstruction, and analytics for both the wired and wireless networks provided by RSA NetWitness. Except this time, there is one difference (besides...
Enabling the Hunt: RSA NetWitness Platfrom Updates & Enhancements
RSA Charge 2016, a gathering of more than 2,000 RSA customers, is off to a great start in New Orleans this week. Bringing together RSA product experts with our users and cybersecurity thought-leaders makes for great conversation, collaboration, innovation – and a little bit of fun! Our RSA NetWitness® Platform solution teams and customers have...
E6 - Ghost in the Machine - No Longer Fun and Games
Dave Reinhardt, gritty, determined, wizard of MagnaCorp security, arranged his notes on the conference room table once more. He sat alone briefly while the team took a break. As he arranged the pages for his upcoming briefing to his fellow executives, he paused to look around the room. The whiteboards of the breach war room...
Skills Shortage: The Intelligent Application of Force Multipliers
Many organizations struggle to staff and maintain security operation teams. The struggle is to drive the needed productivity of the resources already in house to make sure the alert that matters doesn’t go unnoticed.
Defend the Kingdom - My Final Thoughts
Episode #6 of Defend the Kingdom, “Ghost in the Machine”, brings to close the dramatic battle between good and evil in both Marty’s imagination and his daily work as a security “hunter”. The episode reveals a highly skilled, persistent, maniacal adversary bent on the Kingdom’s ultimate destruction. In Marty’s alter-universe, he sees this as an...
E4 - Storms on the Horizon - Technical Dialogue
Defend the Kingdom security mini series
Introducing the RSA Cybersecurity Summit
Get a preview of the RSA Cybersecurity Summit
HAFNIUM Attacks Microsoft Exchange Users
Another major state-sponsored attack is impacting Microsoft Exchange email on-premises users.
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.