2017 is the Year for RSA Business-Driven Security™ Solutions

This week, RSA will be making a global announcement during the 2017 RSA Conference to formally unveil RSA Business-Driven Security solutions, a new approach to help customers manage cyber risk. This architecture, along with several concurrent solution and service announcements, enables customers to take command of their risk posture and secure what matters most. BUSINESS-DRIVEN SECURITY ANNOUNCEMENT This announcement is significant for RSA because it showcases RSA’s next-generation approach for…

February 13, 2017
Read More >>

Threatpost News Wrap, February 13, 2017

Mike Mimoso and Chris Brook preview RSA 2017 and discuss the previous week’s news including the report on how a handful of iOS apps are vulnerable to interception attacks, macro malware coming to MacOS, a new Uber open source module. Show notes: Download: Threatpost_News_Wrap_February_13_2017.mp3 Music by Chris Gonsalves Source: www.threatpost.com

February 13, 2017
Read More >>

Defining Business-Driven Security™ for the Modern Enterprise

As I travel around the world and meet with CISOs and security teams, I continue to be amazed at the organizational disconnects around managing cyber risk. Security Operations and Identity & Access Management teams operate their own business processes with very few connection points. Security and Risk & Compliance teams have different world views of how to best address cyber challenges – they’re not even speaking the same language. Many…

February 13, 2017
Read More >>

Delivering on the Promise of Business-Driven Security™ Globally

Today, with the introduction of RSA Business-Driven Security, we also introduced the RSA Risk and Cybersecurity Practice. This Practice includes more than 650 globally deployed, employee-based cybersecurity and risk experts to help our clients operationalize their unique business-driven security strategy. Our primary tenant is enabling and accelerating the business while reducing risk, thus creating the foundation for a client’s risk and/or cybersecurity program. RSA helps clients operationalize their program through…

February 13, 2017
Read More >>

Reimagine Your Identity Strategy

We are at the edge of yet another evolution for the Identity and Access Management (IAM) industry. Applications are being deployed at incredible speeds with user populations demanding access from wherever they are, whenever they want, from any device. The network is no longer clearly defined, in fact, identity is the new perimeter. Regulations and compliance demands are still present, and always growing as are the external threats. The hackers…

February 13, 2017
Read More >>

Identity Comes into Focus at RSA Conference

We are less than two weeks away from RSA Conference, the world’s largest security event! This year’s theme – The Power of Opportunity – emphasizes “unity.” Clever, right? We think so. Not only is it a great time to call for unity in cybersecurity among vendors and practitioners, but also end users. Every day we’re on the hook to be more vigilant in the fight to protect our identities, privacy,…

February 2, 2017
Read More >>

3 Steps to a Secure ICS Network

Industrial Control Systems (ICS) attacks have a direct impact on people’s lives. The consequences of these attacks can be unpredictable, which is why ICS protection is a hot topic in security right now. Defining the right protection layer and best approach to secure communications in this environment is crucial. Historically, ICS departments operated independently from the rest of the organization with their own ecosystem often air-gapped. Now we see rapid…

February 1, 2017
Read More >>

“Up Your Game” to Close the Security Skills Gap

Ask any CISO to name the top challenges of the job, and their first response is likely to be the security “skills gap” – the inability to find enough skilled people to handle an organization’s security needs. With over 200,000 security jobs unfilled in the U.S. alone, organizations, especially security operations centers (SOCs), are continuously “playing from behind.” What’s more, this scarcity increases the costs of hiring and retaining security…

January 30, 2017
Read More >>

RSAC Innovation Sandbox – Celebrating disruption

Fear of the unknown is a universal human trait according to anthropologist Donald Brown. In behavioral science, it’s called status quo bias- the emotional bias or preference humans have to the current state of affairs and their built in resistance to change. “Humans are allergic to change”, declared Admiral Grace Hopper, computing pioneer and 2016 Presidential Medal of Freedom recipient, who had a clock that ran counterclockwise in her office…

January 26, 2017
Read More >>

Mastering the implementation of a Threat Pattern

In previous posts we have discussed two of the most critical phases in the “The Lifecycle of a Threat Pattern”: analysis and design. In the analysis phase the objective is to fully understand the asset in scope by getting deeper into the context to formulate a set of residual risks to which the asset might be exposed. In Engineering the Design of a Threat Pattern, Davide Veneziano illustrated the importance of a…

January 25, 2017
Read More >>