The Public Cloud, Pigeons and Risk Management — Part 3
Looking at the Evidence for Trusting Cloud Computing Ian Farquhar, Advisory Technology Consultant for RSA, the Security Division of EMC Are we trusting a third party with our data? Yes, we are, and...
View ArticleLaser Precision Phishing — Are You on the Bouncer’s List Today?
By Limor S Kessem, Cybercrime and Online Fraud Communications Specialist, RSA As we close out 2012, it’s safe to say that phishing has had yet another record year in attack volumes. The total number...
View ArticleThe Public Cloud, Pigeons and Risk Management — Part 4
The Public Cloud and Key Management Ian Farquhar, Advisory Technology Consultant for RSA, the Security Division of EMC I have recently been asked if the research paper about key leakage across VMs...
View ArticleSecure Crypto: Cluster Cracker
At a recent conference, Passwords^12, Jeremi M Gosney the Founder & CEO of Stricture Consulting Group, presented his latest password cracking project. Jeremi combined 25 AMD Radeon GPUs, across...
View ArticleKeys in the Cloud
The Cloud Best Practices Network has just published the second installment of the e-magazine TRANSFORM. This issue, which focuses on various aspects of cloud security, includes my article on “Key...
View ArticleThe next marketing buzzword in security is…
“Whatever you put out I’m gonna buy it, so what’s your latest? I wanna try it” From “I’m a sucker for your marketing” by Sarah Jaffe Every year we seem to have a new buzz term in security. As...
View ArticleInformation: The Third Pillar Of Business
You study a situation, you make assertions about what will likely happen -- and then you see real-world examples of those predictions becoming reality. The big notion? Traditional enterprises will be...
View ArticleSoftware-Defined Storage And The Potential For Disruption
Last weekend, two weather systems merged off the coast of New England, creating a blizzard of "historic proportions". Each weather system wasn't particularly important by itself; but somewhat...
View ArticleVMware to acquire Virsto; Brief look at what they offer today
Most of you have seen the announcement around Virsto by now, for those who haven’t read this blog post: VMware to acquire Virsto. Virsto is a storage company which offers a virtual storage solution. I...
View ArticlePrevent and Predict Attacks
When it comes to defending our networks we have to be right 100% of the time but a cybercriminal has to be right just once. We must shift this balance if we are ever going to be in a position to truly...
View ArticleThe New OASIS PKCS 11 Technical Committee
As I mentioned in an earlier blog, RSA is transitioning the PKCS #11 standards effort into OASIS. The call for participation for the new OASIS PKCS 11 Technical Committee has now officially gone out...
View ArticleThe Iris System: Tidying Up Under the Rug
Virtualization helps conceal hardware complexity, one of its many benefits for programmers and administrators. But it’s also a rug under which security and reliability concerns can be all too easily...
View Article“What’s your question?”– Next Generation Analysis in the Compromise Landscape
By Alex Cox, Sr. Researcher, RSA FirstWatch team The FirstWatch team recently had its team planning meeting, where we discussed plans for the year, current events and experiences. One of my...
View ArticleContent Intelligence – Enriching the Incident Response Process
Jeff Hale, Senior Practice Consultant, RSA Advanced Cyber Defense Practice A common issue seen in many of our Advanced Cyber Defense (ACD) engagements are customers who have reasonably mature...
View ArticleMobile is the new PC, on steroids… And this is just the beginning!
By Berk Veral, Senior Product Marketing Manager, RSA FraudAction and CyberCrime Intelligence I have written about the mobile based threats, specifically mobile app-based threats before and I am...
View ArticleThe Man in the Middle: Advantages of SSL Decryption
By Rui Ataide, RSA Advanced Cyber Defense Advisory Practice Consultant More and more we hear about mobile app/phone companies and other cloud-based services acting as a sort of “man-in-the-middle”...
View ArticleEmerging UPnP Vulnerabilities
By Tom Chmielarski, Practice Lead – RSA Advanced Cyber Defense Practice (Americas) Several vulnerabilities with multiple implementations of Universal Plug and Plan (UPnP) were announced January 29 by...
View ArticleBuilding a Lean Forward Approach to Offense as a Defense
Last weekend information security professionals from around the globe gathered in a conference forum for the 2013 Suits and Spooks Conference in Washington, DC. The focus was on offense as a...
View ArticleRSA Brings Risk-Based Authentication to American Express SafeKey
By Rueben Rodriguez, Principal Product Marketing Manager, RSA Identity Protection & Verification Today we have some very exciting news to share – the American Express SafeKey authentication...
View ArticlevSphere HA 5.x restart attempt timing
I wrote about how vSphere HA 5.x restart attempt timing works a long time ago but there appears still to be some confusion about this. I figured I would clarify this a bit more, I don’t think I can...
View Article