Identity Comes into Focus at RSA Conference

We are less than two weeks away from RSA Conference, the world’s largest security event! This year’s theme – The Power of Opportunity – emphasizes “unity.” Clever, right? We think so. Not only is it a great time to call for unity in cybersecurity among vendors and practitioners, but also end users. Every day we’re…

The post Identity Comes into Focus at RSA Conference appeared first on Speaking of Security – The RSA Blog.

Continue reading Identity Comes into Focus at RSA Conference

3 Steps to a Secure ICS Network

Industrial Control Systems (ICS) attacks have a direct impact on people’s lives. The consequences of these attacks can be unpredictable, which is why ICS protection is a hot topic in security right now. Defining the right protection layer and best approach to secure communications in this environment is crucial. Historically, ICS departments operated independently from…

The post 3 Steps to a Secure ICS Network appeared first on Speaking of Security – The RSA Blog.

Continue reading 3 Steps to a Secure ICS Network

“Up Your Game” to Close the Security Skills Gap

Ask any CISO to name the top challenges of the job, and their first response is likely to be the security “skills gap” – the inability to find enough skilled people to handle an organization’s security needs. With over 200,000 security jobs unfilled in the U.S. alone, organizations, especially security operations centers (SOCs), are continuously…

The post “Up Your Game” to Close the Security Skills Gap appeared first on Speaking of Security – The RSA Blog.

Continue reading “Up Your Game” to Close the Security Skills Gap

Mastering the implementation of a Threat Pattern

In previous posts we have discussed two of the most critical phases in the “The Lifecycle of a Threat Pattern”: analysis and design. In the analysis phase the objective is to fully understand the asset in scope by getting deeper into the context to formulate a set of residual risks to which the asset might be…

The post Mastering the implementation of a Threat Pattern appeared first on Speaking of Security – The RSA Blog.

Continue reading Mastering the implementation of a Threat Pattern

The Elephant in the Room for Endpoint Security

Stop me if you’ve heard this story before… Three blind men are traveling down the road to visit a friend.  On the way, they encounter an elephant.  Not being able to see it, they each stopped and felt the elephant to figure out what sort of creature it was.  The first one grabbed the trunk…

The post The Elephant in the Room for Endpoint Security appeared first on Speaking of Security – The RSA Blog.

Continue reading The Elephant in the Room for Endpoint Security

R-Evolution: The Evolution of Risk

Ten years ago, when a user needed to access a corporate application, his or her usage was on a company-owned device and typically confined to company-owned networks. These applications were nicely tucked behind corporate firewalls, and managed by dedicated IT organizations. To identify themselves, users would often enter complex, lengthy passwords when accessing such resources,…

The post R-Evolution: The Evolution of Risk appeared first on Speaking of Security – The RSA Blog.

Continue reading R-Evolution: The Evolution of Risk

The $5 Billion Fraud Problem

When explaining my profession to people I meet, they often tell me about the time their card was “frauded.” I always enjoy this conversation, as it provides insight into the human victim element of a fraud event. The breadth of emotions typically ranges from, “How did this happen and how do we track down the…

The post The $5 Billion Fraud Problem appeared first on Speaking of Security – The RSA Blog.

Continue reading The $5 Billion Fraud Problem

Cloud Ready Threat Detection & Response

Organizations are leveraging third party cloud environments for increasingly critical data, applications, and infrastructure. The agility and potential cost savings that both public and private (virtual) clouds offer mean that the business can be more efficient and gain operational and financial advantages. While some organizations – dependent on vertical and “risk” appetite – may be…

The post Cloud Ready Threat Detection & Response appeared first on Speaking of Security – The RSA Blog.

Continue reading Cloud Ready Threat Detection & Response

Slow Down! You’re in a Public Environment

These days, if you’re planning to spend time at an airport terminal or a coffee shop – it’s likely that you’ll look for a public Wi-Fi hotspot to connect to, and perhaps a charging station, to make sure you don’t run out of power. While our distraction level is  high when we’re out and about…

The post Slow Down! You’re in a Public Environment appeared first on Speaking of Security – The RSA Blog.

Continue reading Slow Down! You’re in a Public Environment