Certifications, Audits and Compliance Made Easy

Completing access certification audits was already challenging. Now, with remote work and an emerging set of new regulations, assessing users? rights is harder and higher-stakes than ever. But SecurID Governance and Lifecycle can simplify and expedite the process, reduce identity risk, and ensure compliance ... Read More

4 Ways to Build Cybersecurity Resilience

U.S. Secretary of Homeland Security Alejandro N. Mayorkas outlined his cybersecurity priorities in a special RSA Conference webinar. See some of the key highlights and takeaways that can help us all build cybersecurity resilience ... Read More

The CNP Fraud Imperative

Whether it's online shopping, loyalty and payment apps, or newfangled voice commerce, innovation is the name of the game in 2021. Unfortunately, fraudsters got the memo. Card-Not-Present (CNP) fraud could jump 16% this year and top $130 billion by 2023. Here's how adaptive authentication can stop CNP fraud in its ... Read More

Authentication and Beyond: What Defines Today?s Identity Platform

Identity and access management has come to mean much more than authentication. Today?s identity platform must provide a strong foundation for not just passwords and tokens, but also robust multi-factor authentication (including passwordless), zero trust and more ... Read More

Stop Fraud, Not Customers: 3 Reasons I Joined RSA

RSA Fraud and Risk Intelligence CMO Armen Najarian recently joined the business unit to help spearhead a new phase of investment and growth. In this blog he explains his rationale for making a move to RSA. Among his reasons are the rapid growth in payment fraud, RSA?s leadership position and ... Read More

The Future Impact of Remote Work on IAM

Remote work is evolving. Organizations must future-proof their IAM strategies to maintain remote work and ensure that their employees can securely connect to company applications and networks ... Read More

Securing the IoT Edge Ecosystem

IoT Edge architecture is emerging to tackle the explosion of Internet of Things (IoT) devices and systems. This open ecosystem approach enables contributions from many sources. RSA is doing its part to add security across the range of IoT Edge solutions ... Read More

HAFNIUM Attacks Microsoft Exchange Users

The HAFNIUM / Microsoft Exchange attack has affected at least 30,000 U.S organizations and hundreds of thousands more around the world. Integrating threat detection and response capabilities before an attack occurs can accelerate your response, limit damage, and protect your operations ... Read More

SecurID Governance and Lifecycle: Joiner, Mover, Leaver Basics

Automating your joiner-mover-leaver processes and fine-tuning the identity lifecycle journey for your users doesn?t need to be challenging. With the right solution, you can help ensure consistency and efficiency, reduce costs, and identity business risk ... Read More

SecurID Innovations Help Organizations Protect and Optimize Workforces

By taking a phased approach to digital transformation, organizations can embrace cloud innovations, stay relevant, and maintain the assurances of connecting to on-premises applications ... Read More