Tales from the Black Hat NOC: Attendee Attacks, Loud and Proud

We are approaching the end of Black Hat‘s training days. It’s an interesting time when the expo floor still sits quiet, but the Black Hat network is as noisy as ever – as seen by the RSA volunteers working inside the Black Hat NOC. The majority of this noise is being generated by teachers and students, demonstrating…

The post Tales from the Black Hat NOC: Attendee Attacks, Loud and Proud appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales from the Black Hat NOC: Attendee Attacks, Loud and Proud

Tales From The Black Hat NOC: Data in the Clear

        I started my day by reading an article about how to stay safe during Black Hat and DEF CON.  There were suggestions such as not bringing a laptop to the conference, not bringing your smartphone, not bringing your wallet and only carry cash.  Why would such suggestions be made?  Black Hat and DEF CON attract…

The post Tales From The Black Hat NOC: Data in the Clear appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales From The Black Hat NOC: Data in the Clear

Tales From The Black Hat NOC: Organizing the Chaos

A glimpse into training day. Yesterday marked the official start of Black Hat 2016, kicked off with various training courses spread throughout the convention center. For the RSA NOC team this meant a chance to validate yesterday’s installation and get an initial glimpse into the activity within and around the classroom and conference networks before the…

The post Tales From The Black Hat NOC: Organizing the Chaos appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales From The Black Hat NOC: Organizing the Chaos

Tales from the Black Hat NOC: I’ll Show You Mine, We Can Already See Yours

With the start of Black Hat 2016 merely a day away, white, black, and grey hats from around the world are whetting their appetites – eagerly waiting to show off and consume the fruit of an entire year’s research. Whether for education, research, bragging rights, or mal-intent, the Black Hat network will host anything from basic brute force attacks to…

The post Tales from the Black Hat NOC: I’ll Show You Mine, We Can Already See Yours appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales from the Black Hat NOC: I’ll Show You Mine, We Can Already See Yours

RSA NetWitness Suite: Changing the Security Paradigm

In technology – especially information security – the pace of change can be overwhelming. Adversaries continually invent new (and more often, reinvent old) ways to infiltrate and compromise organizations, while the good guys try to take advantage of the innovation in technologies, techniques, and processes to protect their organizations against these adversaries. But there are…

The post RSA NetWitness Suite: Changing the Security Paradigm appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading RSA NetWitness Suite: Changing the Security Paradigm

DIY Smart Home Device Means No More Fumbling in the Dark

Smart home tech is on the rise, but cost or lack of specific functionality may give pause to prospective buyers. [Whiskey Tango Hotel] opted to design their own system using a Raspberry Pi and Bluetooth device connectivity. Combining two ubiquitous technologies provides a reliable proximity activation of handy functions upon one’s arrival home.

The primary function is to turn on a strip of LEDs when [Whiskey Tango Hotel] gets home to avoid fumbling for the lights in the dark, and to turn them off after a set time. The Raspberry Pi and Bluetooth dongle detect when a specified discoverable Bluetooth …read more

Continue reading DIY Smart Home Device Means No More Fumbling in the Dark

Web Threat Detection Services Deliver SWIFT Remediation

With the dust settling on a series of high profile cyber heists against international banks SWIFT’s network used to facilitate international payments between banks, the service provider is weighing changes that would effectively exclude from its network banks that have, according to reports, “demonstrated weak information security.” The Brussels-based SWIFT (Society for the Worldwide Interbank…

The post Web Threat Detection Services Deliver SWIFT Remediation appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Web Threat Detection Services Deliver SWIFT Remediation

RSA SecurID Access Takes Top Honours at Computerworld Hong Kong Awards 2016

Earlier this month, Computerworld Hong Kong recognised RSA’s identity assurance solution line, as a winner in its Computerworld Hong Kong Awards 2016. We’re humbled to have received such a prestigious award for the second year in a row, and encouraged as we continue to see the industry’s firm belief and support in our vision and…

The post RSA SecurID Access Takes Top Honours at Computerworld Hong Kong Awards 2016 appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading RSA SecurID Access Takes Top Honours at Computerworld Hong Kong Awards 2016

RSA at Black Hat 2016 — Can’t Wait!

Black Hat 2016 is fast approaching and I can’t wait!  The main event will take place on August 3rd and 4th at Mandalay Bay / Las Vegas.  I will be there will you? If you are there, please stop by the RSA Booth (#1108).  We have a lot of “Goodness” planned for the security analysts to…

The post RSA at Black Hat 2016 — Can’t Wait! appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading RSA at Black Hat 2016 — Can’t Wait!

Wearables leaking your passwords? We can solve that.

Recently, I wrote about  a newly published white-paper showing the power of wearable devices to help determine if users are who they claim to be, on a continuous basis. The paper describes a method, which in part relies on correlating a user’s gestures and movement on 2 devices in proximity of each other: The user’s…

The post Wearables leaking your passwords? We can solve that. appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Wearables leaking your passwords? We can solve that.