Articles By: RSA

Look Before You Leap: Integrated Business Risk Management

By understanding information security risk, compliance risk, and business risk within a single framework, business leaders can make better decisions and ensure that the organization’s objectives are met. View the infographic to discover the facts of integrated business risk management and to learn why taking a holistic approach to risk should be a top priority in your organization.

Read more ›

How GRC Can Help You Stay a Step Ahead of Ransomware

With ransomware growing at 350% annually,* many federal, state and local governments, and private-sector businesses, are focused on the question of how to better prepare for the next attack. View the white paper to discover the important role that governance, risk and compliance (GRC) solutions can play in helping organizations prepare for and respond to the next ransomware assault on […]

Read more ›

The 10+1 Guiding Principles of Business Risk Management

Your business risk management program should add strategic value to the organization—enabling the business to focus on strategic objectives and optimize performance, not just simply meet compliance requirements. Ultimately, business risk management is about making decisions— decisions to manage, accept, transfer or avoid risk. Download the white paper for an overview of the 10+1 guiding principles that should be the […]

Read more ›

Forrester Wave Security Analytics

The Forrester Wave™: Security Analytics Platforms, Q1 2017. In their 36-criteria evaluation of security analytics (SA) providers, Forrester identified the 11 most significant ones and researched, analyzed, and scored them. Download this report to see why RSA was named a Leader and how SA solutions enable security and risk professionals to detect, investigate and respond to cybersecurity threats.

Read more ›

Business-Driven Security and the GDPR. GDPR Data Protection and RSA NetWitness® Suite – White Paper

The EU’s General Data Protection Regulation (GDPR) will affect any company that does business within the EU and goes into effect on May 25, 2018. The GDPR represents a major evolution in global data security and privacy practices, so companies will need to thoroughly review, and in many cases drastically change, the way personal data is handled going forward. Download […]

Read more ›

Kingslayer – A Supply Chain Attack

RSA Research investigated the source of suspsicious, observed beaconing thought to be associated with targeted malware. In the course of this tactical hunt for unidentified code, RSA discovered a sophisticated attack on a software supply-chain involving a Trojan inserted in otherwise legitimate software; software that is used typically used by enterprise system administrators. Get details of this attack as well […]

Read more ›

The 7 Building Blocks of Better Threat Visibility – eBook

If you want to protect your organization against sophisticated cyber threats, keep one simple principle in mind: IF YOU CAN’T SEE IT, YOU CAN’T STOP IT. So how do you detect something, like a zero-day threat or a new strain of malware, that no one has ever seen before? Download our new guide, “The 7 Building Blocks of Better Threat […]

Read more ›

The 3 Keys to Faster Threat Response – eBook

90 percent of security professionals polled say they’re unsatisfied with how quickly they are able to react to threats. They need deeper insights into user behavior and other variables, an instant understanding of the full scope of threats, and more context to set priorities. What can you do to speed things up? Download the guide, “The 3 Keys to Faster […]

Read more ›