Certifications, Audits and Compliance Made Easy
Completing access certification audits was already challenging. Now, with remote work and an emerging set of new regulations, assessing users? rights is harder and higher-stakes than ever. But SecurID Governance and Lifecycle can simplify and expedite the process, reduce identity risk, and ensure compliance ... Read More
4 Ways to Build Cybersecurity Resilience
U.S. Secretary of Homeland Security Alejandro N. Mayorkas outlined his cybersecurity priorities in a special RSA Conference webinar. See some of the key highlights and takeaways that can help us all build cybersecurity resilience ... Read More
The CNP Fraud Imperative
Whether it's online shopping, loyalty and payment apps, or newfangled voice commerce, innovation is the name of the game in 2021. Unfortunately, fraudsters got the memo. Card-Not-Present (CNP) fraud could jump 16% this year and top $130 billion by 2023. Here's how adaptive authentication can stop CNP fraud in its ... Read More
Authentication and Beyond: What Defines Today?s Identity Platform
Identity and access management has come to mean much more than authentication. Today?s identity platform must provide a strong foundation for not just passwords and tokens, but also robust multi-factor authentication (including passwordless), zero trust and more ... Read More
Stop Fraud, Not Customers: 3 Reasons I Joined RSA
RSA Fraud and Risk Intelligence CMO Armen Najarian recently joined the business unit to help spearhead a new phase of investment and growth. In this blog he explains his rationale for making a move to RSA. Among his reasons are the rapid growth in payment fraud, RSA?s leadership position and ... Read More
The Future Impact of Remote Work on IAM
Remote work is evolving. Organizations must future-proof their IAM strategies to maintain remote work and ensure that their employees can securely connect to company applications and networks ... Read More
Securing the IoT Edge Ecosystem
IoT Edge architecture is emerging to tackle the explosion of Internet of Things (IoT) devices and systems. This open ecosystem approach enables contributions from many sources. RSA is doing its part to add security across the range of IoT Edge solutions ... Read More
HAFNIUM Attacks Microsoft Exchange Users
The HAFNIUM / Microsoft Exchange attack has affected at least 30,000 U.S organizations and hundreds of thousands more around the world. Integrating threat detection and response capabilities before an attack occurs can accelerate your response, limit damage, and protect your operations ... Read More
SecurID Governance and Lifecycle: Joiner, Mover, Leaver Basics
Automating your joiner-mover-leaver processes and fine-tuning the identity lifecycle journey for your users doesn?t need to be challenging. With the right solution, you can help ensure consistency and efficiency, reduce costs, and identity business risk ... Read More
SecurID Innovations Help Organizations Protect and Optimize Workforces
By taking a phased approach to digital transformation, organizations can embrace cloud innovations, stay relevant, and maintain the assurances of connecting to on-premises applications ... Read More