Posts

Showing posts with the label rsa security

RSA Research Finds Size Doesn’t Matter In Cybersecurity

Image
Today, RSA, The Security Division of EMC (NYSE: EMC), released its inaugural  Cybersecurity Poverty Index that compiled survey results from more than 400 security professionals across 61 countries. The survey allowed participants to self-assess the maturity of their cybersecurity programs leveraging the  NIST Cybersecurity Framework  (CSF) as the measuring stick. The research provides valuable global insight into how organizations rate their overall  Cybersecurity Maturity and practices across a variety of organizational sizes, industries and geographies.  Catch the highlights via the info-graphics below :

Cybercrime 2015: An Inside Look at the Changing Threat Landscape

RSA Research remains at the forefront of threat detection and cybercrime intelligence, protecting global organizations with the shutdown of over a million  cybercrime attacks. Based on its insight into cybercriminal activity, recovery of over a million actionable findings in 2014 and analysis of around 400,000 unique malware variants each week, RSA Research has identified the top cybercrime trends for 2015 Cybercrime 2015: An Inside Look at the Changing Threat Landscape from Rajesh Nambiar

Technology Predictions for 2014 from EMC, VMware and RSA Security

2014 - holds a great prospect of being the best year for innovation in IT.  Growing acceptance for the 3rd platform era, thanks to Cloud, Big Data, Social and Mobile will be at the forefront of all discussions.  Here is the full coverage of what executives at EMC, VMware and RSA believe about 2014 :  [ View the story "Technology Predictions for 2014" on Storify ]

Latest SBIC Report: Transforming Information Security: Future-Proofing Processes

Image
The latest  Security for Business Innovation Council (SBIC) report , providing guidance for how organizations can enable new competitive advantages in their business by transforming outdated and inflexible processes that govern the use and protection of information assets. The report highlights key challenges, upgraded techniques and actionable recommendations that can be used to plan and build new processes to help organizations gain business advantage and more effectively manage cyber risks. In this latest report titled  Transforming Information Security: Future-Proofing Processes ,  the Council observes that business groups within organizations are taking greater ownership of information risk management; however outdated security processes are hindering business innovation and make it difficult to combat new cybersecurity risks. The Council offers guidance calling for information security teams to collaborate more closely with functional business groups to ...

New RSA Security Brief Provides Roadmap for Next Generation Security Operations

RSA Security Briefs  provide security leaders and risk management executives with essential guidance on today's most pressing information security threats and opportunities. Each Brief is created by a select team of experts who connect experiences across organizations to share specialized knowledge on a critical security topic. Offering both big-picture insight and practical technology guidance, RSA Security Briefs are vital reading for today's forward-thinking security and risk management practitioners.  In the New report, Security Operations Experts Provide Guidance for Improving Readiness and Response. Some of the Key HIGHLIGHTS are :  Expert consultants and security leaders from EMC, Raytheon and RSA assert that organizations large and small are recognizing they have a responsibility to improve their security posture not just for themselves but also for business and supply chain partners. Security consultants report more organizations are commissioning secu...

TechTalk Series : Defense in Depth (Computing)

Image
As per  National Security Agency ( NSA ),  Defense in Depth is a practical strategy for achieving  Information Assurance in today’s highly  networked environments.  The latest  EMC Academic Alliance TechTalk  introduces you to the Principle of "Defense in Depth" in the context of today's highly networked dynamic environments. It is a primer that would cover basics of key security concepts, terminologies, controls and the various defense mechanisms students ought to know before they get on to their professional carriers and making ways into the Information Security Domain.  Watch it via 

RSA Monthly Online Fraud Report - June 2013

The RSA Monthly Online Fraud Report offers the latest information on global phishing and malware trends.  RSA Monthly Online Fraud Report - June 2013 from EMC Academic Alliance

RSA Monthly Online Fraud Report -- May 2013

This report, “Hacktivism and the Case of Something Phishy,” offers insight on the latest global phishing and cybercrime trends.  Some key pointers from May 2013   Phishing Attacks per Month -  In April, RSA identified 26,902 attacks launched worldwide, marking a 10% increase in attack volume from March. Number of Brands Attacked -  In April, 311 brands were targeted in phishing attacks, marking a 20% increase from last month. Of the 311 targeted brands, 52% endured five attacks or less US Bank Types Attacked  U.S. nationwide banks continued to be targeted by the highest volume of phishing attacks (73%) in April, while regional banks saw a slight decline from 20% to 12%. Top Countries by Attack Volume The U.S. remained the top country on the chart, targeted with 46% of the total phishing volume in April. The UK accounted for 11% of the attack volume, a 2% decline from March while South Africa remained the same with 9% of attack volume. Top ...

Fraud Report: RSA Monthly Online - April 2013

The RSA Monthly Online Fraud Report examines the latest phishing global phishing and cybercrime trends.  Fraud Report: RSA Monthly Online - April 2013 from EMC Academic Alliance

Fraud Report: RSA Monthly Online Fraud Report - March 2013

The RSA monthly fraud report discusses the value of an email address to a cybercriminal and how email account takeovers can lead to identity theft.  Fraud Report: RSA Monthly Online Fraud Report - March 2013 from EMC Academic Alliance

RSA Monthly Online Fraud Report -- February 2013

This monthly report highlights the most recent phishing trends witnessed by RSA in January 2013. Read more via  RSA Monthly Online Fraud Report -- February 2013 from EMC Academic Alliance

Enterprise Strategy Group: The Big Data Security Analytics Era is Here

This analyst report explains that organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect against targeted attacks. Henceforth, security management must be based on continuous monitoring and big data analysis for situational awareness and rapid decisions.

The Year in Phishing via RSA Fraud Report Jan 2013

The January 2013 report highlights the latest fraud and phishing trends from RSA's Anti-Fraud Command Center.  ------------------------------------------------------------------------------------------------------------ What is RSA Fraud Report ? " Each month the RSA Anti-Fraud Command Center issues the RSA Online Fraud Report that includes a monthly highlight as well as over a half dozen charts with analyses featuring phishing trends such as top ten countries attacked, most used attacked vectors, and other data from the Center’s global phishing repository. " ------------------------------------------------------------------------------------------------------------ Read More via  RSA Fraud Report: January 2013 from EMC Academic Alliance

Announcing : EMC Academic Forum 2013

Image
As a follow up from my earlier post on  International Conference on Cloud and Big Data Analytics #ICCBDA 2013 , we are pleased to invite you to Day 1 event - EMC Academic Forum 2013 -

Big Data Revolution in Information Security

RSA today released a Security Brief asserting that  The dissolution of traditional defensive perimeters coupled with attackers’ abilities to circumvent traditional security systems requires organizations to adopt an intelligence driven security model that is more risk-aware, contextual, and agile. Intelligence-driven security relies on big data analytics. Big data encompasses both the breadth of sources and the information depth needed for programs to assess risks accurately and to defend against illicit activity and advanced cyber threats. Within the next two years, we predict big data analytics will disrupt the status quo in most information security product segments, including SIEM; network monitoring; user authentication and authorization; identity management; fraud detection; and governance, risk & compliance. In the next three to five years, we predict data analytics tools will further evolve to enable a range of advanced predictive capabilities and automat...