Beginning the Journey to Cybersecurity Maturity

RSA just released results of our second annual RSA Cybersecurity Poverty Index. We’re really excited about the results, but it may not be for the reasons you think. We’re excited because of the number of respondents (more than double the 2015 Index), the breadth of industries and governments represented, and the amount of time organizations…

The post Beginning the Journey to Cybersecurity Maturity appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Beginning the Journey to Cybersecurity Maturity

Current State of Cybercrime in 2016

The bon mot that “crime doesn’t pay” certainly predates the advent of cybercrime. Today, these digital hold-ups against businesses are highly profitable.  Let’s face it: if cybercrime was a publicly traded stock, realizing the return on investment, we’d all be on the phone with our respective broker begging for them to include it in our…

The post Current State of Cybercrime in 2016 appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Current State of Cybercrime in 2016

Building rockstars in SOC

What makes detection most effective? I know you are thinking technology. However, if you have been in the security operations domain for long, you know the answer. It’s the “people” who use the technology. As a infosec leader/member for your organisation, you should continuously look for methods and tools that make your teams better and…

The post Building rockstars in SOC appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Building rockstars in SOC

Continuous Identity Assurance Allows You To Step Away

Have you ever wondered how do applications know if “its still you” 10 minutes after you log in to the app? Suppose you have to join a conference call, leave for a meeting, or take a bio break. As far as the app is concerned, since you haven’t performed any activity for a given period…

The post Continuous Identity Assurance Allows You To Step Away appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Continuous Identity Assurance Allows You To Step Away

Add Bluetooth to a Cheap Electronic Lock

[James] works from home. His office is filled with objects that can be described with adjectives such as, “expensive,” and, “breakable.” His home, however, is filled with professional object-breakers known as children. To keep these two worlds from colliding, he installed a keypad lock on his office door. The potential side-effect of accidentally training his children to be master safe-crackers aside, the system seems to work so far.

However, being a hacker, the tedium of entering a passcode soon grew too heavy for him. Refusing to be a techno-peasant, he set out to improve his lock. The first step was …read more

Continue reading Add Bluetooth to a Cheap Electronic Lock

How Breach Readiness Is Enhanced by Threat Intelligence

Breach readiness is essential to limiting the impact of data breaches, regardless of industry or company size. Recent RSA research determined the current state of breach readiness and response at large organizations. The four critical areas considered in the survey were threat intelligence, content intelligence, analytic intelligence, and incident response. Organizations Are Moving Toward Proactive…

The post How Breach Readiness Is Enhanced by Threat Intelligence appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading How Breach Readiness Is Enhanced by Threat Intelligence

Continuous Monitoring: Not Quite Constant, But a Bit Automated

Visibility is a key security element in every network environment. Without it, IT teams would be flying blind, only able to react as their vulnerabilities are exploited. Fortunately, monitoring solutions give organizations the ability to remain proactive in their security efforts. Through a combination of constant, automated, and continuous monitoring, they can maintain an ever-watchful…

The post Continuous Monitoring: Not Quite Constant, But a Bit Automated appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Continuous Monitoring: Not Quite Constant, But a Bit Automated