UBM: TECH DIGITAL RESOURCE LIBRARY

RSA, Security Division of EMC

RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA's award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.

Our Website: http://rsa.com


Latest Content From RSA, Security Division of EMC

Whitepaper: 2016: Current State of Cybercrime

by RSA, Security Division of EMCMay 10, 2016

There is a truism in today's clickable economy: wherever there is commerce, there is also the risk for cybercrime. Whether a financial institution, an Internet storefront that does business with online shoppers, and now even hospitals with the rising tide of ransomware, cybercrime has no boundaries. In fact, anyone with an email address, an inbox, or a social media account is a target. As attackers are well-organized and well-informed, take advantage of the latest fraud-as-a-service innovations and capitalize on shared intelligence in the deep web, organizations must be prepared to do the same. This paper examines the current state of cybercrime and how organizations and individuals are responding to the industrialized cybercrime threat.


Whitepaper: Mobile Eats the World: The Rise of Biometric Authentication

by RSA, Security Division of EMCMar 08, 2016

Mobile is eating the world, and its convenience factor is driving more people to access services from a mobile device. Mobile transactions have increased over 200% in the last two years, with billions of dollars of commercial transactions being enacted on mobile devices. This has not gone unnoticed by cybercriminals, and mobile fraud is rapidly on the rise. Interest in the adoption and use of biometrics, especially for consumer authentication, has emerged as a result.

Download this white paper to learn:

  • Current trends in biometrics authentication for consumer applications
  • The relationship between mobile and risk-based authentication technologies
  • The adoption of biometrics for payments and banking use cases


Whitepaper: 3-D Secure: The Force for CNP Fraud Prevention Awakens

by RSA, Security Division of EMCMar 08, 2016

As recent history dictates, the migration to EMV chip-enabled cards has resulted in a massive surge in card-not-present (CNP) fraud. Converging pressures, including the U.S. EMV migration, rapidly growing e-commerce transaction volumes, and data breaches, is likely to lead to a painfully sharp rise in CNP fraud. Coupled with the proliferation of mobile users, financial institutions and retailers alike have a lot to anticipate.

Download this white paper to learn:

  • The expected financial fraud losses from card-not-present transactions in the next five years
  • How risk-based authentication, mobile and biometrics are changing the payments landscape
  • The latest market dynamics which are expected to impact banks and retailers


Whitepaper: Hiding in Plain Sight: The Growth of Cybercrime in Social Media

by RSA, Security Division of EMCMar 08, 2016

Social networks attract all kinds - and now, not surprisingly, they're used as global havens for cybercrime. This paper highlights the results of a six month investigation focused on the growing use of social media as a communication channel for fraudsters and details the exponential growth in the volume of visible fraud activity on social networking platforms, much of this occurring "in plain sight".

Download this white paper to learn:

  • The most popular social media platforms being leveraged by cybercriminals and the requirements to join
  • The types of information and cybercrime services being sold and exchanged in social media groups
  • The global regions with the most detected fraud activity - and who they are targeting

Webcast: How to Find an Unknown Threat

by RSA, Security Division of EMCNov 30, 2014

Watch how you can find and investigate previously unknown threats with RSA Security Analytics and RSA ECAT. Stop searching and start hunting, using deep network packet, endpoint and log detail to understand the true nature and scope of an attack that you did not know about in advance.


Whitepaper: ESG Reviews the Processes and Technologies Required for Effective Incident Detection and Response Today

by RSA, Security Division of EMCNov 30, 2014

Learn what CISOs can do to better protect their organizations from security breaches, and why a big data security analytics architecture is necessary for threat detection and response.


Whitepaper: Signature-less Malware Detection: Finding an Evil in the Haystack

by RSA, Security Division of EMCNov 30, 2014

Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.


Webcast: The CISO of Los Angeles World Airports on RSA Security Analytics and RSA ECAT

by RSA, Security Division of EMCNov 30, 2014

Bob Cheong, CISO of LA World Airports, discusses why RSA Security Analytics and RSA ECAT are key components of his state-of-the-art security operations center (SOC).


Whitepaper: How to Achieve Intelligence-Driven Threat Detection and Response

by RSA, Security Division of EMCNov 30, 2014

Learn the four key areas that organizations should focus on to achieve intelligence-driven threat detection and response.


Webcast: Card Trends and Payments Fraud in 2014: What You Need to Know

by RSA, Security Division of EMCOct 01, 2014

With the pressure to adopt EMV in the U.S., the increase in mobile transactions, and growth in alternative payments such as digital wallets, the payments industry is at a crossroad of change. In 2014, one out of every four transactions is conducted on a mobile device. Alternative payments for e-commerce are expected to grow to a $90 billion market by 2017, according to Forrester Research.

Attend this webinar to learn:

  • The latest in EMV adoption and effects of card-not-present fraud
  • How cybercriminals are reacting to emerging market trends
  • Best practices for managing fraud risk

Register for this webinar to learn about the current state of affairs - and the future of cybercrime and fraud - in the payments industry.