RSA NOC at Black Hat Asia

The RSA NOC team is back in action, this time at Black Hat Asia at the Marina Bay Sands in Singapore. Our primary goal is to provide Operational Threat Intelligence and deep visibility into the Black Hat network to ensure the Black Hat infrastructure remains protected and available. Top priorities include protecting the Black Hat…

The post RSA NOC at Black Hat Asia appeared first on Speaking of Security – The RSA Blog.

Continue reading RSA NOC at Black Hat Asia

Testing a Threat Pattern: Quality is Never an Accident

John Ruskin, one of the great visionaries of the 19th century, said “Quality is never an accident; it is always the result of intelligent effort”, in our continuing journey through the lifecycle of a threat pattern, we are now at the testing phase. After analyzing  requirements, asset and threats, designing a general and reusable model for the threat pattern and implementing the…

The post Testing a Threat Pattern: Quality is Never an Accident appeared first on Speaking of Security – The RSA Blog.

Continue reading Testing a Threat Pattern: Quality is Never an Accident

The GDPR and your data protection obligations

The focus is growing for the European Union’s forthcoming “General Data Protection Regulation,” or GDPR. As its May 25, 2018 implementation date draws nearer, organizations are starting to understand the magnitude of change this major regulation will drive. It is not only EU-based organizations that are subject to the GDPR’s requirements. If your company stores…

The post The GDPR and your data protection obligations appeared first on Speaking of Security – The RSA Blog.

Continue reading The GDPR and your data protection obligations

Answering the #1 Question in Identity Management

Takeaways from a Recent Identity Survey by IDG It’s the infamous joke we’ve all used at one point or another – “Knock, knock. Who’s there?” When it comes to identity management, knowing the answer to this question is mission critical. Whether your employees, contractors, customers and partners are accessing your data, applications and systems in…

The post Answering the #1 Question in Identity Management appeared first on Speaking of Security – The RSA Blog.

Continue reading Answering the #1 Question in Identity Management

PSD2 – Can your transaction risk analysis and strong customer authentication comply?

February 23, 2017 the European Banking Authority (EBA) released the Final Report of the Draft Regulatory Technical Standards on Strong Customer Authentication and Common Secure Communication for the Payment Services Directive 2 (PSD2). This final report heralded a welcome change in the EBA’s position on the exemption to Strong Customer Authentication (SCA) based on transaction…

The post PSD2 – Can your transaction risk analysis and strong customer authentication comply? appeared first on Speaking of Security – The RSA Blog.

Continue reading PSD2 – Can your transaction risk analysis and strong customer authentication comply?

PSD2 – Can your transaction risk analysis and strong customer authentication comply?

February 23, 2017 the European Banking Authority (EBA) released the Final Report of the Draft Regulatory Technical Standards on Strong Customer Authentication and Common Secure Communication for the Payment Services Directive 2 (PSD2). This final report heralded a welcome change in the EBA’s position on the exemption to Strong Customer Authentication (SCA) based on transaction…

The post PSD2 – Can your transaction risk analysis and strong customer authentication comply? appeared first on Speaking of Security – The RSA Blog.

Continue reading PSD2 – Can your transaction risk analysis and strong customer authentication comply?

Business Impact Analysis Relieves “Tempest in a Teapot” Syndrome

Do you ever use the term, ‘you are creating a tempest in a teapot’? It means, don’t make a big deal out of something that isn’t. Doing a little research, I found other similar phrases I thought were entertaining. They are: ‘A storm in a teacup’ – Cicero; or ‘Billows in a ladle’ – translation…

The post Business Impact Analysis Relieves “Tempest in a Teapot” Syndrome appeared first on Speaking of Security – The RSA Blog.

Continue reading Business Impact Analysis Relieves “Tempest in a Teapot” Syndrome

Fraud Management Metrics that Drive Investment

If your role is responsible for a budget, your work ultimately revolves around one word: metrics.  It is a word we often dread, because we can never seem to get it right.  I live and breathe metrics in marketing, and if you are the gal or guy responsible for the fraud management or cyber security…

The post Fraud Management Metrics that Drive Investment appeared first on Speaking of Security – The RSA Blog.

Continue reading Fraud Management Metrics that Drive Investment

MULTI-FACTOR AUTHENTICATION YOU CAN COUNT ON

More than 25,000 organizations worldwide trust RSA SecurID® Access to provide a convenient, secure multi-factor authentication experience for their users. And now RSA SecurID Access is honored to have won the SC Magazine 2017 Trust Award for best multi-factor authentication solution – two years in a row. RSA SecurID Access multi-factor identity solution had to…

The post MULTI-FACTOR AUTHENTICATION YOU CAN COUNT ON appeared first on Speaking of Security – The RSA Blog.

Continue reading MULTI-FACTOR AUTHENTICATION YOU CAN COUNT ON