RSA Identity Governance and Lifecycle: An Executive View from KuppingerCole

When one of the leading independent analyst organizations in the identity space weighs in favorably on your approach to identity governance, that’s news worth sharing. In the KuppingerCole Report “Executive View: RSA® Identity Governance and Lifecycle,” analyst John Tolbert gets at the heart of RSA’s belief in the effectiveness of an integrated, comprehensive, end-to-end approach:…

The post RSA Identity Governance and Lifecycle: An Executive View from KuppingerCole appeared first on Speaking of Security – The RSA Blog.

Continue reading RSA Identity Governance and Lifecycle: An Executive View from KuppingerCole

Chasing the Rabbit: Cybersecurity Through the Camera Lens

Azeem Aleem and Dave Gray Nothing will work if you are not serious about it – Sam Abell The blog post is intended to take a different perspective (pun intended) of how we view our security platforms and how to go about rationalizing our Business-Driven Security™ decisions about cyber threats and mitigation strategies. It all…

The post Chasing the Rabbit: Cybersecurity Through the Camera Lens appeared first on Speaking of Security – The RSA Blog.

Continue reading Chasing the Rabbit: Cybersecurity Through the Camera Lens

Six Keys to Successful Identity Assurance – Broader Ecosystem

Earlier in this blog series, we discussed anomaly detection and machine learning focusing primarily on examples that included information you could expect to be available from the system that provides your identity assurance. It’s likely, however, that there is much more data that can be leveraged for making system access decisions in your current IT…

The post Six Keys to Successful Identity Assurance – Broader Ecosystem appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Broader Ecosystem

Is the cyberworld doomed to be unsafe forever?

Before seeking an answer, let’s question the question. I recently returned to the cybersecurity industry and (re)joined the good fight to secure the cyberworld. As the digital era unfolds, it feels good to be part of this mission-driven industry to help create a safe digital future. While a lot has changed, and there have been great…

The post Is the cyberworld doomed to be unsafe forever? appeared first on Speaking of Security – The RSA Blog.

Continue reading Is the cyberworld doomed to be unsafe forever?

How Many Watts Are You Using?

One of the best smart home hacks is implementing an energy monitor of some kind. It’s easy enough to say that you’re trying to save energy, but without the cold hard data, it’s just talk. Plus, it’s easy and a great way to build up something DIY that the whole family can use.

[Bogdan] built up a simple whole-apartment power monitor from scratch over the weekend, and he’s been nice enough to walk us through the whole procedure, starting with picking up a split-core CT sensor and ending up with a finished project.

The brains of his project are an …read more

Continue reading How Many Watts Are You Using?

GET TO THE CHOPPAH

A new variant of this tool, previously reported in 2013 by TrendLabs, was submitted to VirusTotal from the Philippines on March 27th, 2017. Its original filename, 2017.exe, was prescient since it has the ability to exploit CVE-2017-5638 and other previous Apache STRUTS vulnerabilities. File Details File Name: 2017.exe File Size: 107008 bytes MD5:        …

The post GET TO THE CHOPPAH appeared first on Speaking of Security – The RSA Blog.

Continue reading GET TO THE CHOPPAH

What’s Really at Risk With Reputation Risk

When boards express anxiety about cybersecurity risk, one of the foremost fears they face is reputation risk. Why is that? Because cybersecurity failures do cause reputation damage, and reputation risk is scary. A security failure can immediately bring unwelcome headlines, hits to the share price and probing questions from business partners Security failures can also…

The post What’s Really at Risk With Reputation Risk appeared first on Speaking of Security – The RSA Blog.

Continue reading What’s Really at Risk With Reputation Risk

What’s Really at Risk With Reputation Risk

When boards express anxiety about cybersecurity risk, one of the foremost fears they face is reputation risk. Why is that? Because cybersecurity failures do cause reputation damage, and reputation risk is scary. A security failure can immediately bring unwelcome headlines, hits to the share price and probing questions from business partners Security failures can also…

The post What’s Really at Risk With Reputation Risk appeared first on Speaking of Security – The RSA Blog.

Continue reading What’s Really at Risk With Reputation Risk

Black Hat Asia NOC: Malware visibility

By Chris Thomas and Mike Sconzo In the Black Hat Asia NOC we worked to ensure the wireless network was available for presenters and attendees. As part of our monitoring, we kept an eye open for any malware present on the network. RSA NetWitness® Suite’s Malware Detection capabilities look for network sessions containing file-types typically…

The post Black Hat Asia NOC: Malware visibility appeared first on Speaking of Security – The RSA Blog.

Continue reading Black Hat Asia NOC: Malware visibility

Six Keys to Successful Identity Assurance – Machine Learning

In our last discussion on the six keys to an identity assurance strategy, we talked about anomaly detection. In that blog, we discussed recognizing normal and abnormal behavior. Recognizing this behavior, and adapting to changes in that behavior, is where the topic of this blog starts as our next key component of an identity assurance…

The post Six Keys to Successful Identity Assurance – Machine Learning appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Machine Learning