Ready, Set, Authenticate: Why You Need RSA SecurID® Access to Win the Race

There are times when trying to put together an effective authentication strategy feels like competing in track-and-field events. Business and IT are supposed to be on the same team, but far too often seem to be racing toward completely different goals. Sure, it’s important to get to the finish line fast, but not at the…

The post Ready, Set, Authenticate: Why You Need RSA SecurID® Access to Win the Race appeared first on Speaking of Security – The RSA Blog.

Continue reading Ready, Set, Authenticate: Why You Need RSA SecurID® Access to Win the Race

YIN AND YANG: TWO VIEWS ON IAM – Global Risk Standards or States & Nations Policies

By Steve Mowll and Chris Williams POINT: Chris Williams – Advisory Architect, RSA Identity In our last blog, I stated the following about why we most commonly engage in security practices. And these two items were represented: We embrace identity projects because we need to satisfy compulsory mandates. We need to provide competitive protective services…

The post YIN AND YANG: TWO VIEWS ON IAM – Global Risk Standards or States & Nations Policies appeared first on Speaking of Security – The RSA Blog.

Continue reading YIN AND YANG: TWO VIEWS ON IAM – Global Risk Standards or States & Nations Policies

Key Considerations for Selecting a Consumer Authentication

The EU’s Payment Services Directive II (PSD2) has generated many questions from the financial services and payments industry. So much so we have found some in the industry turning to RSA for advice and guidance on the key considerations they need to put forth as they prepare to issue requests for proposals from potential consumer…

The post Key Considerations for Selecting a Consumer Authentication appeared first on Speaking of Security – The RSA Blog.

Continue reading Key Considerations for Selecting a Consumer Authentication

Protecting PingFederate® Users with RSA SecurID® Access

It’s 10 o’clock. Do you know where your users are? Believe it or not, there was once a time when this question was easy to answer. If “Steve” was logged into the corporate network, there was a very high-level of certainty you would find him sitting in his cube, on the 4th floor of building…

The post Protecting PingFederate® Users with RSA SecurID® Access appeared first on Speaking of Security – The RSA Blog.

Continue reading Protecting PingFederate® Users with RSA SecurID® Access

Blank Slate: A Tale of Two Malware Servers

In March 2017, Palo Alto Networks Unit 42 published research on a new malicious spam campaign dubbed “Blank Slate.” Named as such because the malspam message is empty. Only the malicious attachment is present, as seen in Figure 1. Figure 1: Blank Slate malspam e-mail Recently, Blank Slate struck deploying Cerber ransomware once again, affording…

The post Blank Slate: A Tale of Two Malware Servers appeared first on Speaking of Security – The RSA Blog.

Continue reading Blank Slate: A Tale of Two Malware Servers

Yin and Yang: Two Views on IAM – Active Directory Automation, Success or Failure?

By Steve Mowll and Chris Williams Point: Effective identity management strategies are business-based, and should rise above technical limitations. Steve Mowll, Identity Architect, RSA True point, but in order to have effective strategies, they must be directed towards a desired outcome. Let’s take a look at this idea using Active Directory (AD) projects as an…

The post Yin and Yang: Two Views on IAM – Active Directory Automation, Success or Failure? appeared first on Speaking of Security – The RSA Blog.

Continue reading Yin and Yang: Two Views on IAM – Active Directory Automation, Success or Failure?

Completing the Puzzle

In a previous blog I reviewed the real world pay back for being a risk leader.  Let’s say your company gets it, they know that good risk management increases the likelihood objectives will be fulfilled and profits improved, and now you’ve been given the assignment to start the risk management program to make your organization a…

The post Completing the Puzzle appeared first on Speaking of Security – The RSA Blog.

Continue reading Completing the Puzzle

Defining Your Cyber Risk Appetite

When a senior executive tells the board he or she wants to discuss the company’s risk appetite, usually the board’s interest is piqued. After all, understanding an organization’s risk appetite is critical to the decisions the board makes. So why should defining a company’s cyber risk appetite be so difficult? A CISO’s role is to…

The post Defining Your Cyber Risk Appetite appeared first on Speaking of Security – The RSA Blog.

Continue reading Defining Your Cyber Risk Appetite

Capture the Prize

Risk is the effect of uncertainty on objectives.  Managing risk well increases the certainty that objectives will be achieved.  Not surprisingly, organizations leading in risk management “capture the prize”.  According to a PWC Risk Review, organizations more frequently achieve their objectives, are more profitable and less likely to experience a negative profit margin than those…

The post Capture the Prize appeared first on Speaking of Security – The RSA Blog.

Continue reading Capture the Prize

Delivering Convenient and Secure Access to the Modern Workforce

In the relatively quick journey from don’t-even-think-about-bringing-your-own-device to please-absolutely-bring-your-own-device, identity management has experienced some dramatic transformations. And it’s still evolving now, as security policy continues to move away from limiting user options and toward expanding them. Organizations haven’t taken long to come around to thinking that giving users more ways to access the resources they…

The post Delivering Convenient and Secure Access to the Modern Workforce appeared first on Speaking of Security – The RSA Blog.

Continue reading Delivering Convenient and Secure Access to the Modern Workforce