Transaction Protection in a Human-Not-Present Age

Imagine it is 10AM and you’re sitting in a meeting at work. You gaze out the window only to see your car drive out of the parking lot, turn left at the end of the road, and disappear around the corner. Your car, having sensed it needs a change of oil and seeing today’s calendar…

The post Transaction Protection in a Human-Not-Present Age appeared first on Speaking of Security – The RSA Blog.

Continue reading Transaction Protection in a Human-Not-Present Age

Shadowfall

Over the last several months, RSA Research embarked on a cross-organizational effort against RIG Exploit Kit (RIG EK or just plain RIG), which led to insight into the operational infrastructure (and possibly the entire ecosystem), as well as significant discoveries related to domain shadowing. Domain shadowing is “a technique in which attackers steal domain account…

The post Shadowfall appeared first on Speaking of Security – The RSA Blog.

Continue reading Shadowfall

8 Authentication Pitfalls That Can Put You on the Road to Nowhere

Two-factor, multi-factor, mobile, push, tokenless, biometric: you have choices today when it comes to authentication solutions. Choose the right authentication solution, and you’ve got a straight shot to access that’s secure and convenient for users. Choose the wrong one, and you risk getting on a path that’s at best bumpy and at worst downright dangerous.…

The post 8 Authentication Pitfalls That Can Put You on the Road to Nowhere appeared first on Speaking of Security – The RSA Blog.

Continue reading 8 Authentication Pitfalls That Can Put You on the Road to Nowhere

NIST Cybersecurity Framework (CSF) Spring 2017 Workshop Findings

To shape their Cybersecurity Framework (CSF), NIST convenes a series of workshops open to any industry practitioners, vendors, or academics who wish to attend. I recently returned from the 2017 NIST CSF Workshop at their headquarters in Gaithersburg, MD. For those interested in the NIST CSF but were unable to attend, I will quickly run…

The post NIST Cybersecurity Framework (CSF) Spring 2017 Workshop Findings appeared first on Speaking of Security – The RSA Blog.

Continue reading NIST Cybersecurity Framework (CSF) Spring 2017 Workshop Findings

Chances are your account has been breached

When it comes to protecting personal data, there are three types of people in the world: Those who go to great lengths to protect their personal information, using unique passwords and trying to remain un-breached. Those who are ignorant or ambivalent to the impact of breaches and the personal security risk they entail. Those who…

The post Chances are your account has been breached appeared first on Speaking of Security – The RSA Blog.

Continue reading Chances are your account has been breached

What Really Led to WannaCry?

Much of the focus on WannaCry has been on how it works and what organizations need to do in the near term to recover. It’s important, however, to take a step back and ask ourselves why WannaCry became such a tour-de-force in the first place. After all, the security community has been talking about concepts…

The post What Really Led to WannaCry? appeared first on Speaking of Security – The RSA Blog.

Continue reading What Really Led to WannaCry?

Metrics (Not Just Fun Facts!) Are key to driving a Business-Driven Security™ Strategy

Dave Gray & Azeem Aleem “What’s Measured Improves” Peter Drucker It’s mid-2017 and we have already witnessed the conundrum across organizations as the pressure of building a more efficient business creates loopholes for cyber criminals to gain an advantage. In a previous blog we talked about the traditional perimeter melting away and how the “not…

The post Metrics (Not Just Fun Facts!) Are key to driving a Business-Driven Security™ Strategy appeared first on Speaking of Security – The RSA Blog.

Continue reading Metrics (Not Just Fun Facts!) Are key to driving a Business-Driven Security™ Strategy

The Business Value of RSA Archer

Implementing an effective governance, risk, and compliance program can be a costly and time-consuming effort: Hardware, software, and the active engagement of a lot of people in the first, second and third lines of defense.  Before implementing a program, and periodically throughout the life of the program, the question always arises from senior management: Is…

The post The Business Value of RSA Archer appeared first on Speaking of Security – The RSA Blog.

Continue reading The Business Value of RSA Archer

What Your Business Can Learn from WannaCry

The biggest cyber attack began last week, spreading to more than 150 countries and infecting 200,000 machines. The outbreak is a ransomware threat, WanaCrypt0r 2.0 also known as WannaCry, with worm-like capabilities leveraging an exploit against vulnerable Microsoft Windows® operating systems. Ransomware mimics the age-old crime of kidnapping: someone takes something you value, and in…

The post What Your Business Can Learn from WannaCry appeared first on Speaking of Security – The RSA Blog.

Continue reading What Your Business Can Learn from WannaCry