A Security Decision – Build or Buy

We are sometimes asked to compare our threat detection and response solutions to those custom assembled by security experts using various open source products. With a wide array of quality point solutions available, it’s natural to consider whether a combination of best-of-breed open source solutions can be a better option for a particular organization, rather than an integrated commercial solution. To start with, RSA is a big fan of open…

August 23, 2017
Read More >>

Skills Shortage: The Intelligent Application of Force Multipliers

Many organizations struggle to staff and maintain security operation teams due to a serious shortage of skilled security analysts. The struggle isn’t just about filling open roles; it is equally hard to drive the needed productivity of the resources already in house to make sure the alert that matters doesn’t go unnoticed. Both new and existing security personnel can’t keep up with the exploding number of alerts and struggle with…

August 9, 2017
Read More >>

Turbocharge your Threat Detection and Response with Endpoint Data

In 1860, Belgian inventor Jean Joseph Etienne Lenoir created a gas-fired internal combustion engine; it was the first internal combustion engine to be mass-produced in large numbers. The design wasn’t perfect by any means, but it was a large step forward, and countless engineers have continued to iterate on the concept even to this present day.   One such engineer was Alfred Büchi, who focused his efforts on improving the power…

August 2, 2017
Read More >>

DON’T MISS RSA AT BLACK HAT USA 2017

Wondering where you’ll find RSA at Black Hat? Where won’t you find RSA is more like it. In addition to hosting our Business Hall booth, where we’ll be showcasing the latest version of RSA NetWitness® Suite, you’ll find us in the Black Hat Network Operations Center (NOC), as well as in speaking sessions on some of the hottest topics in cybersecurity. It’s all happening this week at the 20th edition…

July 25, 2017
Read More >>

DEMAND MORE FROM YOUR SIEM

By Mike Adler, VP Product, NetWitness Suite If you’re like a lot of IT security professionals, you’ve always been able to rely on your SIEM to provide log data for threat detection. But that’s just not enough to keep up with all the new threats from new sources that are bombarding organizations today. Can your SIEM do everything required to detect and respond to these growing threats? What do you…

July 18, 2017
Read More >>

Threat Hunting and the Cloud – A Dynamic Tension

In the 1920s, fitness innovator Charles Atlas developed and introduced the Dynamic Tension exercise method. The essence of Dynamic Tension is that it pits muscle against muscle, with a workout intensifying proportionally for both muscles as force increases. As generations of comic book fans have learned since, nobody kicked sand in Charles Atlas’s face after that! The dynamic between cloud and IT security displays similar characteristics. The more cloud-focused an…

July 18, 2017
Read More >>

Hypothesis in Threat Hunting

Today’s threat landscape requires organizations to operate more proactively to keep up with advanced and persistent threats. There is no doubt that the practice of threat hunting has emerged as a key capability to detect stealthy threat actors trying to gain access to the organizational IT infrastructure by evading traditional security measures. Hunting aims to detect threat actors early in the cyber kill chain by investigating the IT environment for…

July 17, 2017
Read More >>

Nip Those Incidents in the Bud!

I’m dating myself here, but I used to love to watch the Andy Griffith Show. I liked Andy’s calm demeanor as he tried to raise little Opie. Barney Fife was his neurotic sidekick. I enjoyed this exchange between the two of them as they discussed raising kids: Barney Fife: Well, today’s eight-year-olds are tomorrow’s teenagers. I say this calls for action and now. Nip it in the bud. First sign…

July 17, 2017
Read More >>

Failure to Communicate: Why SOCs Fail!

I’ve had the privilege of working in a few different SOCs at various maturity levels ranging from the stony shores of regulatory compliance – “Yes, we have a security solution”, to the deep shark-infested waters of a global enterprise under frequent attack by nation state-sponsored attack groups. Throughout all of these different engagements, I’ve worked at many skill levels, from junior / Level 1 analyst through to Incident Response team…

May 16, 2017
Read More >>

Chasing the Rabbit: Cybersecurity Through the Camera Lens

Azeem Aleem and Dave Gray Nothing will work if you are not serious about it – Sam Abell The blog post is intended to take a different perspective (pun intended) of how we view our security platforms and how to go about rationalizing our Business-Driven Security™ decisions about cyber threats and mitigation strategies. It all comes down to perspective, which is a cognitive capacity and is essential in understanding the…

May 1, 2017
Read More >>