Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk

No one inside your enterprise knows better than the analysts working inside your security operations center (SOC) the threats your organization faces. For this reason, your SOC is poised to serve as the cornerstone of your organization?s efforts to man… Continue reading Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk

Skills Shortage: The Intelligent Application of Force Multipliers

Many organizations struggle to staff and maintain security operation teams due to a serious shortage of skilled security analysts. The struggle isn’t just about filling open roles; it is equally hard to drive the needed productivity of the resources already in house to make sure the alert that matters doesn’t go unnoticed. Both new and…

The post Skills Shortage: The Intelligent Application of Force Multipliers appeared first on Speaking of Security – The RSA Blog.

Continue reading Skills Shortage: The Intelligent Application of Force Multipliers

Kingslayer – A Supply Chain Attack

Today, RSA is publishing new research on a sophisticated software supply-chain attack – dubbed “Kingslayer”. RSA Research investigated the source of suspicious, observed beaconing thought to be associated with targeted malware. In the course of their investigation, RSA discovered a sophisticated software supply-chain attack involving a Trojan inserted in otherwise legitimate software; software that is…

The post Kingslayer – A Supply Chain Attack appeared first on Speaking of Security – The RSA Blog.

Continue reading Kingslayer – A Supply Chain Attack

Cloud Ready Threat Detection & Response

Organizations are leveraging third party cloud environments for increasingly critical data, applications, and infrastructure. The agility and potential cost savings that both public and private (virtual) clouds offer mean that the business can be more efficient and gain operational and financial advantages. While some organizations – dependent on vertical and “risk” appetite – may be…

The post Cloud Ready Threat Detection & Response appeared first on Speaking of Security – The RSA Blog.

Continue reading Cloud Ready Threat Detection & Response

RSA NetWitness Suite: Changing the Security Paradigm

In technology – especially information security – the pace of change can be overwhelming. Adversaries continually invent new (and more often, reinvent old) ways to infiltrate and compromise organizations, while the good guys try to take advantage of the innovation in technologies, techniques, and processes to protect their organizations against these adversaries. But there are…

The post RSA NetWitness Suite: Changing the Security Paradigm appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading RSA NetWitness Suite: Changing the Security Paradigm