Realizing The Potential of Data Monetization…Do I Have Your Attention Now?
The importance of data has changed. As the volume, variety and velocity of the data grew over the past few years, the data has been transformed to provide organizations a broader, more granular and...
View ArticleGovernment Agencies Are Ready for the Benefits of Software-Defined Data...
The federal government has recognized the need to modernize its IT infrastructure as a critical priority. Legacy technology monopolizes between 70 and 80 percent of federal IT budgets annually, and...
View ArticleRealizing The Potential of Data Monetization…Do I Have Your Attention Now?
The importance of data has changed. As the volume, variety and velocity of the data grew over the past few years, the data has been transformed to provide organizations a broader, more granular and...
View ArticleWhat Does It Mean To Be An Entrepreneur?
My daughter is taking a class on entrepreneurship in her senior year of high school (yep, that’s the Silicon Valley for you). She loves the class, the energy of the teacher, and the creativity...
View ArticleTesting a Threat Pattern: Quality is Never an Accident
John Ruskin, one of the great visionaries of the 19th century, said “Quality is never an accident; it is always the result of intelligent effort”, in our continuing journey through the lifecycle of a...
View ArticleRevealing the secret to speed and flexibility for data analytics
Most companies recognize that they have opportunities through data analytics to raise productivity, improve decision making, and gain competitive advantage. Unfortunately, the majority of initiatives...
View ArticleRealizing The Potential of Data Monetization…Do I Have Your Attention Now?
The importance of data has changed. As the volume, variety and velocity of the data grew over the past few years, the data has been transformed to provide organizations a broader, more granular and...
View ArticleData Science Monetization: Focus on Innovation, Not Effectiveness
“I have over 1,200 Data Analysts, so we have it nailed.” When I heard this being uttered by the head of their “analytics” group, I knew the meeting was over. I knew that I could safely close my...
View ArticleTake a giant leap forward when migrating Windows Server with application...
Migration to a new Windows Server platform is only the first step in the modernization journey. It is difficult to find the time to make plans around migrating to a new Windows Server platform when...
View ArticleRSA NOC at Black Hat Asia
The RSA NOC team is back in action, this time at Black Hat Asia at the Marina Bay Sands in Singapore. Our primary goal is to provide Operational Threat Intelligence and deep visibility into the Black...
View ArticleSix Keys to a Successful Identity Assurance Strategy: Business Context
Traditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. Today’s enterprise needs more to effectively protect...
View ArticleProtecting Identities in a hacker’s world
Imagine being in a place where everyone around you is smarter than you and are, in fact, admitted hackers. Welcome to protecting the identities behind Black Hat Asia 2017’s infrastructure. RSA Booth...
View ArticleGovernment Agencies Are Ready for the Benefits of Software-Defined Data...
The federal government has recognized the need to modernize its IT infrastructure as a critical priority. Legacy technology monopolizes between 70 and 80 percent of federal IT budgets annually, and...
View ArticleGovernment Agencies Are Ready for the Benefits of Software-Defined Data...
The federal government has recognized the need to modernize its IT infrastructure as a critical priority. Legacy technology monopolizes between 70 and 80 percent of federal IT budgets annually, and...
View ArticleDriving Resiliency Through Operational Risk Management
I recently had the pleasure of presenting with a panel of RSA Archer customers on the topic of “Building Resiliency Across the Value Chain” for a Disaster Recovery Journal webinar. Two key questions...
View ArticleThe Latest From The RSA NOC At Black Hat Asia
When sitting in the Network Operations Center (NOC) for one of the world’s largest hacker and security conferences, sometimes no news is good news. Here in the Black Hat Asia NOC, we anticipated and...
View ArticleData Visualization with No Results? Could vs Should
I often hear people and teams complaining about their data. They have people digging in but are not getting the results they expected from a quality or quantity standpoint. What’s wrong?...
View ArticleRSA Archer Navigator 2.0
# Looking for more information on the RSA Archer Use Cases? The new RSA Archer Navigator 2.0 (https://community.rsa.com/community/products/archer-grc/navigator) can help guide you to a ton of useful...
View ArticleIs the Cloud On Your IT horizon? Consider This First
In my role as Dell EMC’s consulting services leader for the East, I routinely get all sorts of questions from customers and clients about the biggest challenges and threats impacting IT. Among the...
View ArticleThe evolution of a Threat Pattern
In an era of agile development and digital transformation, any application is subject to ongoing enhancement and improvement. Indeed, software engineering is a complex process with many interdependent...
View Article