Blog

Pivotal Web Services (“PWS”) SSL Certificate expiration for default *.cfapps.io domain

On March 31, 2017 at 12:28 GMT, we detected that the SSL certificate for the default cfapps.io domain expired and this resulted in many services and applications requiring encrypted connections on that domain to fail. Applications continued to operate and services utilizing unencrypted connections were not affected. Once the certificate expiration was detected, our operations…

Read more

New – AWS Resource Tagging API

AWS customers frequently use tags to organize their Amazon EC2 instances, Amazon EBS volumes, Amazon S3 buckets, and other resources. Over the past couple of years we have been working to make tagging more useful and more powerful. For example, we have added support for tagging during Auto Scaling, the ability to use up to…

Read more

Amazon CloudWatch launches Alarms on Dashboards

Amazon CloudWatch is a service that gives customers the ability to monitor their applications, systems, and solutions running on Amazon Web Services by providing and collecting metrics, logs, and events about AWS resources in real time. CloudWatch automatically provides key resource measurements such as; latency, error rates, and CPU usage, while also enabling monitoring of…

Read more

Six Keys to a Successful Identity Assurance Strategy: Business Context

Traditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. Today’s enterprise needs more to effectively protect critical applications when delivering access in a world without boundaries. By applying a risk-based approach to our authentication strategy with identity assurance, we can go beyond simple authentication approaches. We can deliver…

Read more

RSA NOC at Black Hat Asia

The RSA NOC team is back in action, this time at Black Hat Asia at the Marina Bay Sands in Singapore. Our primary goal is to provide Operational Threat Intelligence and deep visibility into the Black Hat network to ensure the Black Hat infrastructure remains protected and available. Top priorities include protecting the Black Hat…

Read more