A New Cyber Mission Force
The context is something that could radically turn a bad event to something manageable or even interesting. If we consider how much the threat landscape changed, as did the context where security...
View ArticleRaison d'être of a Support Community
In September 2016, we became a member of Dell Technologies. When I attended a huge Day1 event in Japan, I felt it was a good time to reconsider the raison d'être of our Dell EMC Support Community...
View ArticleCheck Your Coaching Program Expiration Date
One night while visiting family in Tulsa, I developed one of the worst headaches I’ve had in years. The Advil container in my travel bag was empty, and I set out across my in-law’s house to find a...
View ArticleUnlock Unstructured Data and Maximize Success in Your Supply Chain
By any standard, a successful business is one that can find new customers, discover new markets, and pursue new revenue streams. But today, succeeding via digital channels, delivering an excellent...
View ArticleMastering the implementation of a Threat Pattern
In previous posts we have discussed two of the most critical phases in the “The Lifecycle of a Threat Pattern”: analysis and design. In the analysis phase the objective is to fully understand the...
View ArticleRSAC Innovation Sandbox – Celebrating disruption
Fear of the unknown is a universal human trait according to anthropologist Donald Brown. In behavioral science, it’s called status quo bias- the emotional bias or preference humans have to the current...
View ArticleIs Data Science Really Science?
My son Max is home from college and that always leads to some interesting conversations. Max is in graduate school at Iowa State University where he is studying kinesiology and strength training. As...
View Article“Up Your Game” to Close the Security Skills Gap
Ask any CISO to name the top challenges of the job, and their first response is likely to be the security “skills gap” – the inability to find enough skilled people to handle an organization’s...
View Article3 Steps to a Secure ICS Network
Industrial Control Systems (ICS) attacks have a direct impact on people’s lives. The consequences of these attacks can be unpredictable, which is why ICS protection is a hot topic in security right...
View ArticleThe fourth industrial revolution is upon us. Are you ready?
Organizations around the world are in various stages of a digital transformation that is redrawing the global business landscape. Some call it a fourth industrial revolution – one where the Internet...
View ArticleIdentity Comes into Focus at RSA Conference
We are less than two weeks away from RSA Conference, the world’s largest security event! This year’s theme – The Power of Opportunity – emphasizes “unity.” Clever, right? We think so. Not only is it a...
View ArticleSuper Bowl “Digital Deflategate” is Not Just Air
When we think of large entertainment venues and events, it’s not just ticket fees and concessions anymore. Sporting is entertainment and this year’s Super Bowl LI (51) is one of the most complex,...
View ArticleBusiness Model Transformation and What it Means to the Data Industry
I recently read an MIT Sloan Management Review article by Clayton Christensen’s recent book titled “The Hard Truth About Business Model Innovations.” While the article is full of great observations...
View ArticleAre Software Supply Chain Attacks the New Norm?
How many of us stop to think about updating software we use every day? Do you think “maybe I should check for threats on this before I install it?” Or do you wait for it to automatically update? For...
View ArticleNow Trending: Top Services Topics for Your Products
In an ongoing effort to enable our customers to get easy access to the most valuable support content available, we’ve recently launched a new initiative that pulls top-rated product support content...
View ArticleAct at the Speed of Fraud: Take the Challenge
How fast can you find fraud? That is the challenge put forth by the RSA Fraud & Risk Intelligence team at RSA Conference 2017. Why the emphasis on speed? Simply put, the faster an organization...
View ArticleSDS and HCI Part 1: Start from the Start.
I’m not going to bury the lead: Software Defined Storage is ready for the majority of x86 workloads (by volume) as hyper-converged infrastructure or pooled storage. SANs are best suited for specific...
View ArticleCan the Internet Ever Be Secure?
By some estimates, over 150 million phishing emails are sent every day. Think about that number for a moment, that’s 1,736 attempted crimes every second of every day. And by and large, it’s those...
View ArticleThe Emergence of Political Risk
Political risk is the risk of financial, market or personnel losses resulting from political decisions or disruptions. In the past, organizations doing business internationally were significantly...
View ArticleLaunching the Security Operations Center (SOC) at RSA Conference
Welcome to RSA Conference 2017! The RSA Conference SOC team set up the Security Operations Center over the weekend. We were here along with scores of construction crews re building huge booth displays...
View Article