Schoolbell: Class is in Session
by Kent Backman and Kevin Stear, RSA Research Backstory If a sophisticated exploitation campaign is broad enough, it will attract the attention of multiple threat researchers. Such is the case of the...
View ArticleAggregated Data Dilemma
Okay, I am weird (tell me something that I don’t know, say most of my friends). For Christmas I wanted a Nike Apple Watch to go with my existing FitBit and Garmin fitness trackers (I look sort of...
View ArticleKingslayer – A Supply Chain Attack
Today, RSA is publishing new research on a sophisticated software supply-chain attack – dubbed “Kingslayer”. RSA Research investigated the source of suspicious, observed beaconing thought to be...
View ArticleCalm the Churn with the RSA Archer Ignition program
If as a child you marveled at watching the simple, fascinating micro-example of physics of a pebble dropped into a puddle, you know what the results are. The pebble drops; the water’s surface is...
View ArticleWhat Peanut Butter Cups Can Teach Us About Fraud Prevention
Reese’s® Peanut Butter Cups are a “so-good-it-has-to-be-bad-for-you” treat adored by candy lovers everywhere. The combination of peanut butter and chocolate is such a classic it’s hard to remember...
View ArticleReimagine Your Identity Strategy
We are at the edge of yet another evolution for the Identity and Access Management (IAM) industry. Applications are being deployed at incredible speeds with user populations demanding access from...
View ArticleDelivering on the Promise of Business Driven Security™ Globally
Today, with the introduction of RSA Business-Driven Security, we also introduced the RSA Risk and Cybersecurity Practice. This Practice includes more than 650 globally deployed, employee-based...
View ArticleDefining Business-Driven Security™ for the Modern Enterprise
As I travel around the world and meet with CISOs and security teams, I continue to be amazed at the organizational disconnects around managing cyber risk. Security Operations and Identity & Access...
View Article2017 is the Year for RSA Business-Driven Security™ Solutions
This week, RSA will be making a global announcement during the 2017 RSA Conference to formally unveil RSA Business-Driven Security solutions, a new approach to help customers manage cyber risk. This...
View ArticleCalm the Churn with the RSA Archer Ignition program
If as a child you marveled at watching the simple, fascinating micro-example of physics of a pebble dropped into a puddle, you know what the results are. The pebble drops; the water’s surface is...
View ArticleCelebrate Good Times!
Sometimes you just need a reason to celebrate. If you work in IT a majority of your day can be spent doing things that don’t feel celebratory. It’s these mundane tasks that wear us down day in and day...
View ArticleThe Forum at RSA Conference
This year’s RSA Conference continues the long string of high powered speakers from both the private and the public sector. While there are great keynotes and more than 500 track sessions, we...
View ArticleLeading in an Era of Chaos
Consider… American Authorities are confident that the Russian Government was behind the cyberattack on the Democratic National Committee. Did that attack change the course of the U.S. presidential...
View ArticleModern Data Center: The Secret’s in the Software
Digital transformation is everywhere, and it’s a critical point in IT evolution—but there’s a whole ecosystem of companies that are forming, not transforming, and starting from scratch with their own...
View ArticleA View From the #RSAC SOC
First full day at RSA Conference 2017 started with an excellent keynote and the expected rush of mobile devices to the wireless network. After a bit more than a day the Wi-Fi network is regularly...
View ArticleThe ROI of Private Cloud: Key Measurements and Metrics
This blog is part of The ROI of Private Cloud series which discusses key concepts in projecting ROI, as well as the detailed analyses of three organizations looking to move to private cloud. Moving to...
View ArticleBusiness-Driven Security™ to Lead through Chaos
My last post discussed the changing nature of security. The impact of today’s cyberattacks aren’t limited to stealing financial information or personal data. Instead, these attacks seed chaos. With...
View ArticleVMware powered Enterprise Hybrid Cloud just got 3x easier, and 3x smaller,...
First – I want to repeat the headline, because a headline this good shouldn’t be buried: Today, a turnkey Enterprise Hybrid Cloud got 3x easier, 3x smaller, and has an entry price point 5x lower. This...
View ArticleEnterprise Hybrid Cloud – Smaller and Simpler with VxRail
First – the headline, because a headline this good shouldn’t be buried: Today, a turnkey Enterprise Hybrid Cloud got 3x simpler, and available 3x smaller. This makes the number of customers for...
View ArticleHappy Birthday VxRail! What a year one!
It’s official, VxRail is the most bad-a$$ 1 year old I’ve ever seen. Yup – 1 year ago, VxRail was born. It’s a long origin story (which you can read here) – but honestly, I always knew that customers...
View Article