Threat Detection: What Goes Into a Successful Strategy?

The cat’s officially out of the bag when it comes to threat detection: The majority of the industry simply isn’t satisfied with its current solutions. In fact, 76% of respondents in a recent RSA survey indicated that they were not confident in their ability to detect and investigate threats to their environment. Where did matters…

The post Threat Detection: What Goes Into a Successful Strategy? appeared first on Speaking of Security – The RSA Blog.

Continue reading Threat Detection: What Goes Into a Successful Strategy?

Conquering the Rising Threat of Malvertising

The recent shift in enterprise application platforms from desktop to mobile has brought with it many exciting benefits, which organizations have recognized and leveraged to provide a more flexible and convenient workplace. Unfortunately, individuals and groups with less honorable intentions have also taken notice of this shift. In fact, a report from ISACA predicts a…

The post Conquering the Rising Threat of Malvertising appeared first on Speaking of Security – The RSA Blog.

Continue reading Conquering the Rising Threat of Malvertising

Identity and Access Management Strategies: IAM Spending to Increase in Europe

Businesses around the world recognize that it’s crucial to take the necessary precautions to verify identities and manage digital credentials when conducting business online. In fact, a recent study by Pierre Audoin Consultants (PAC) found that 93% of 200 polled European businesses claimed that they planned to maintain or increase their identity and access management…

The post Identity and Access Management Strategies: IAM Spending to Increase in Europe appeared first on Speaking of Security – The RSA Blog.

Continue reading Identity and Access Management Strategies: IAM Spending to Increase in Europe

Continuous Monitoring: Not Quite Constant, But a Bit Automated

Visibility is a key security element in every network environment. Without it, IT teams would be flying blind, only able to react as their vulnerabilities are exploited. Fortunately, monitoring solutions give organizations the ability to remain proactive in their security efforts. Through a combination of constant, automated, and continuous monitoring, they can maintain an ever-watchful…

The post Continuous Monitoring: Not Quite Constant, But a Bit Automated appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Continuous Monitoring: Not Quite Constant, But a Bit Automated