Turbocharge your Threat Detection and Response with Endpoint Data

In 1860, Belgian inventor Jean Joseph Etienne Lenoir created a gas-fired internal combustion engine; it was the first internal combustion engine to be mass-produced in large numbers. The design wasn’t perfect by any means, but it was a large step forward, and countless engineers have continued to iterate on the concept even to this present day.   One such engineer was Alfred Büchi, who focused his efforts on improving the power…

August 2, 2017
Read More >>

7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—1: IDENTIFY INFORMATION

Managing information risk can be a paralyzing challenge, given the amount of data and information that comes pouring in daily. It’s hard to know what information needs to be protected, let alone the most effective way to do it. RSA has developed a practical seven-step methodology for building a risk management framework for information. Derived from RSA’s Business-Driven Security™ approach, the methodology enables you to uncover the business context for…

August 1, 2017
Read More >>

Operational Rhythm at the Black Hat 2017 NOC

Operational rhythm is the term for the nebulous flow of information between parts of a team that makes it so effective. Who needs what, and when to be successful? In the Black Hat NOC, we have very little time to establish such a rhythm. However, a process for distributing critical information isn’t more important than here. We need to provide access to hacker tools, but then insure they aren’t used…

July 28, 2017
Read More >>

Black Hat NOC 2017: CAN YOUR SIEM DO THIS?

Setup of the Black Hat NOC is an exciting time. The entire network infrastructure is dropped in place at Mandalay Bay. Multiple Black Hat NOC teams work long hours to get the network in place, configured and tested. The attention then turns to the NOC setup where the infrastructure is tied together. RSA, one of the technology providers to the Black Hat NOC, provides Threat Intelligence and Identity and Access…

July 26, 2017
Read More >>

DON’T MISS RSA AT BLACK HAT USA 2017

Wondering where you’ll find RSA at Black Hat? Where won’t you find RSA is more like it. In addition to hosting our Business Hall booth, where we’ll be showcasing the latest version of RSA NetWitness® Suite, you’ll find us in the Black Hat Network Operations Center (NOC), as well as in speaking sessions on some of the hottest topics in cybersecurity. It’s all happening this week at the 20th edition…

July 25, 2017
Read More >>

Swinging for the Fences

Did you know only approximately one in 200, or about 0.5%, of high school senior boys playing interscholastic baseball will eventually be drafted by an MLB team?  That includes all levels of professional baseball.  Only a small percentage of players drafted actually make it to the Major Leagues.   The competition to make it to the Majors is extremely fierce.  Players have to stay on top of their game for years…

July 24, 2017
Read More >>

DEMAND MORE FROM YOUR SIEM

By Mike Adler, VP Product, NetWitness Suite If you’re like a lot of IT security professionals, you’ve always been able to rely on your SIEM to provide log data for threat detection. But that’s just not enough to keep up with all the new threats from new sources that are bombarding organizations today. Can your SIEM do everything required to detect and respond to these growing threats? What do you…

July 18, 2017
Read More >>

Threat Hunting and the Cloud – A Dynamic Tension

In the 1920s, fitness innovator Charles Atlas developed and introduced the Dynamic Tension exercise method. The essence of Dynamic Tension is that it pits muscle against muscle, with a workout intensifying proportionally for both muscles as force increases. As generations of comic book fans have learned since, nobody kicked sand in Charles Atlas’s face after that! The dynamic between cloud and IT security displays similar characteristics. The more cloud-focused an…

July 18, 2017
Read More >>

Hypothesis in Threat Hunting

Today’s threat landscape requires organizations to operate more proactively to keep up with advanced and persistent threats. There is no doubt that the practice of threat hunting has emerged as a key capability to detect stealthy threat actors trying to gain access to the organizational IT infrastructure by evading traditional security measures. Hunting aims to detect threat actors early in the cyber kill chain by investigating the IT environment for…

July 17, 2017
Read More >>

Nip Those Incidents in the Bud!

I’m dating myself here, but I used to love to watch the Andy Griffith Show. I liked Andy’s calm demeanor as he tried to raise little Opie. Barney Fife was his neurotic sidekick. I enjoyed this exchange between the two of them as they discussed raising kids: Barney Fife: Well, today’s eight-year-olds are tomorrow’s teenagers. I say this calls for action and now. Nip it in the bud. First sign…

July 17, 2017
Read More >>