Search results for:
-
NetWitness – A Brief History of an Iconic Threat Detection & Response Platform
The history of NetWitness reflects the continuous evolution of threats and bad actors. Begun as a government intelligence research project, NetWitness has earned a reputation as the most powerful dete
-
Orchestration and Automation without Intelligence is just Dumb
When it comes to SOAR solutions, threat intelligence needs to expand beyond threat detection. It should play a role in every aspect of incident identification, investigation and resolution. Without pr
-
Securing the IoT Edge Ecosystem
IoT Edge architecture is emerging to tackle the explosion of Internet of Things (IoT) devices and systems. This open ecosystem approach enables contributions from many sources. RSA is doing its part
-
HAFNIUM Attacks Microsoft Exchange Users
The HAFNIUM / Microsoft Exchange attack has affected at least 30,000 U.S organizations and hundreds of thousands more around the world. Integrating threat detection and response capabilities before an
-
How RSA NetWitness Platform® Protects against Ransomware Attacks
Ransomware attacks are becoming more targeted, sophisticated, and expensive. See how RSA NetWitness Platform can help your organization protect its IP and defend against attacks.
-
Future-Proofing Security Operations Centers
Recommendations for building SOCs for the future.
-
Introducing RSA NetWitness® Detect AI
RSA NetWitness Detect AI is the all-new pure SaaS analytics module for RSA NetWitness Platform. It makes threat detection better, faster, and easier for advanced security operation centers.
-
The XDR Perspective: RSA’s View on Extended Detection and Response
Although XDR is a new framework for the cybersecurity industry, RSA has been delivering on the vision of XDR for years. See how RSA NetWitness Platform meets and exceeds the critical components of XDR
-
Strategies for Insider Threat Mitigation
In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for address
-
Considerations Towards Enabling A Virtual SOC Environment
In the world of remote work, the role of the security operations center (SOC) needs to evolve, and perhaps even move to a virtual environment. David Strom shares some key considerations for the CISO t