A Different Take on Keystroke Logging

On March 29th a file was uploaded to VirusTotal containing a fake Microsoft Update Authenticode certificate. Soon thereafter, RSA Research investigated the sample based on certain artifacts that matched those present on Shell_Crew malware RSA Research previously reported on. This Windows DLL file was compiled on October 28th, 2014 at 06:35:47 GMT (Table 1). Table…

The post A Different Take on Keystroke Logging appeared first on Speaking of Security – The RSA Blog.

Continue reading A Different Take on Keystroke Logging

Six Keys to Successful Identity Assurance Strategy: Anomaly Detection

In granting access to users, understanding their behavior goes a long way towards providing frictionless security. As part of our blog series, Six Keys to a Successful Identity Assurance Strategy, we continue to explore going beyond simple two-factor (2FA) or multi-factor authentication (MFA) to create a successful identity assurance strategy for your organization. Previously, we…

The post Six Keys to Successful Identity Assurance Strategy: Anomaly Detection appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance Strategy: Anomaly Detection

Why Malware Installers Use TMP files and The Temp folder when infecting Windows

Ever wonder why there are too many TMP files detected on an infected system? Even if they have different names, the file are exact copies of one another, why? The first thing a malware installer (first stage of infection) does when executed on a target system – be it a dropper or downloader – is…

The post Why Malware Installers Use TMP files and The Temp folder when infecting Windows appeared first on Speaking of Security – The RSA Blog.

Continue reading Why Malware Installers Use TMP files and The Temp folder when infecting Windows

Choosing a Modern Authentication Solution: 3 Key Considerations

Today’s organizations need to deliver convenient, secure access for the modern workforce. Users want the ability to access systems and applications from anywhere and any device. But before providing them with this access, organizations must be able to verify that users are, in fact, who they say they are. RSA SecurID® Access is an award-winning…

The post Choosing a Modern Authentication Solution: 3 Key Considerations appeared first on Speaking of Security – The RSA Blog.

Continue reading Choosing a Modern Authentication Solution: 3 Key Considerations

Choosing a Modern Authentication Solution: 3 Key Considerations

Today’s organizations need to deliver convenient, secure access for the modern workforce. Users want the ability to access systems and applications from anywhere and any device. But before providing them with this access, organizations must be able to verify that users are, in fact, who they say they are. RSA SecurID® Access is an award-winning…

The post Choosing a Modern Authentication Solution: 3 Key Considerations appeared first on Speaking of Security – The RSA Blog.

Continue reading Choosing a Modern Authentication Solution: 3 Key Considerations

The evolution of a Threat Pattern

In an era of agile development and digital transformation, any application is subject to ongoing enhancement and improvement. Indeed, software engineering is a complex process with many interdependent tasks where multiple functions share responsibilities to strike a balance between software quality and business objectives, regardless of the specialized nature of the teams within the organizational…

The post The evolution of a Threat Pattern appeared first on Speaking of Security – The RSA Blog.

Continue reading The evolution of a Threat Pattern

The Latest From The RSA NOC At Black Hat Asia

When sitting in the Network Operations Center (NOC) for one of the world’s largest hacker and security conferences, sometimes no news is good news. Here in the Black Hat Asia NOC, we anticipated and prepared for the region’s hackers to come and share a wireless network. Following initial set-up, during the training days, we observed…

The post The Latest From The RSA NOC At Black Hat Asia appeared first on Speaking of Security – The RSA Blog.

Continue reading The Latest From The RSA NOC At Black Hat Asia

Driving Resiliency Through Operational Risk Management

I recently had the pleasure of presenting with a panel of RSA Archer customers on the topic of “Building Resiliency Across the Value Chain” for a Disaster Recovery Journal webinar. Two key questions were posed to the attendees. The first question was: “Where is your organization on the business resilience scale?” The responses were: Recovery…

The post Driving Resiliency Through Operational Risk Management appeared first on Speaking of Security – The RSA Blog.

Continue reading Driving Resiliency Through Operational Risk Management

Protecting Identities in a hacker’s world

Imagine being in a place where everyone around you is smarter than you and are, in fact, admitted hackers.  Welcome to protecting the identities behind Black Hat Asia 2017’s infrastructure. With a large contingency of attendees at this year’s conference there is a constant need to protect the identities of the team maintaining and monitoring…

The post Protecting Identities in a hacker’s world appeared first on Speaking of Security – The RSA Blog.

Continue reading Protecting Identities in a hacker’s world

Six Keys to a Successful Identity Assurance Strategy: Business Context

Traditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. Today’s enterprise needs more to effectively protect critical applications when delivering access in a world without boundaries. By applying a risk-based approach to our authentication strategy with identity assurance, we can go beyond simple authentication approaches. We can deliver…

The post Six Keys to a Successful Identity Assurance Strategy: Business Context appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to a Successful Identity Assurance Strategy: Business Context