The Need for Advanced FRAUD Intelligence

Daniel Cohen

Daniel Cohen

Head of Anti-Fraud Services at RSA

“Victorious warriors win first and then go to war; defeated warriors go to war first and then seek to win.”

― Sun Tzu, The Art of War

Over the past several years, the cybercrime marketplace has gone through a significant maturation process, achieving parity of sophistication with many of the world’s legitimate markets. Traditional business differentiators such as customer service have migrated to the underground—if the stolen credit card you just bought has been cancelled, you’ll get a refund. Business concepts such as innovate-to-stay-ahead are commonplace amongst cybercrime-as-a-service vendors. This activity, in turn, has generated a lot of noise when it comes to threat intelligence; noise that is making it more difficult for us to distinguish the real threat signal. What is the risk of a single phishing or malware attack? What threat does a conversation between a couple fraudsters about cash out methods pose to your organization? There is just too much noise.

Continue reading

Introducing RSA Via and the Dawn of Smart Identity Solutions

Jim Ducharme

Jim Ducharme

Vice President, Engineering and Product Management at RSA

Today, RSA is excited to announce a new product suite we call RSA Via. It has three main components and comes with a provocative claim: it’s one of the first smart identity solutions to protect from the endpoint to the cloud.Via Pie_For Pulse

RSA Via brings together three components of identity and access management (IAM) that have traditionally been run as separate silos, and is engineered to do so in a differentiated, connected, “smart” way:

Continue reading

See Everything. Fear Nothing.

Grant Geyer

Grant Geyer

Vice President, Security Analytics at RSA

Organizations continue to invest in traditional log-centric SIEM tools without seeing the benefits that they have been promised. Sure, most SIEMs do a fine job of log collection,  management and compliance reporting, but the outcome every enterprise wants – and wanted all along – is to detect and respond to the most lethal threats that can evade their security controls.

RSA Security Analytics is what SIEM was meant to be – superior threat detection and investigation.

Time and time again, traditional log-centric SIEMs have failed to properly protect organizations against attacks, especially advanced or targeted attacks.  According to the 2014 Verizon Data Breach Investigation Report 99% of successful cyber-espionage attacks went undiscovered by logs. At RSA, we’re not surprised by this statistic.  While log analysis can add value, by themselves logs alone are simply not enough to provide visibility to a determined threat. As your IT environment now spans from the endpoint to the cloud, so should your visibility.  After all: you cannot stop what you cannot see.

Continue reading

IT and the Security Watch Dog: Keeping People and Property Safe with a Security System that Never Sleeps

Cameron Shove

Cameron Shove

Director of IT Operations at Protection 1

Protection 1 is one of the nation’s largest full service security companies. We protect residences and businesses around the clock, around the country.

I like to think that we’re no protection 1different from any other IT organization in this: we have two primary imperatives to meet. The first is the business mandate: Be Available Always. Since we’re in the life-saving business, that’s especially important to us. The second is the technology mandate: Do More with Less.

Continue reading