Quantcast
Channel: Blog | Dell
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Step Into a Learning Zone to Realize Your Full Potential

A 2016 survey involving 1,400 North America based IT Professionals and Managers found that 72% of the respondents were taking more training than required by the company.[*] Although I did not...

View Article


Image may be NSFW.
Clik here to view.

Completing the Puzzle

In a previous blog I reviewed the real world pay back for being a risk leader.  Let’s say your company gets it, they know that good risk management increases the likelihood that objectives will be...

View Article


Image may be NSFW.
Clik here to view.

A Different Take on Keystroke Logging

On March 29th a file was uploaded to VirusTotal containing a fake Microsoft Update Authenticode certificate. Soon thereafter, RSA Research investigated the sample based on certain artifacts that...

View Article

Image may be NSFW.
Clik here to view.

Fundamental Appetite for IT Services Exposed in Hidden Figures

In case you haven’t seen it, Hidden Figures is a dramatic film portraying three women who courageously overcame a deep bias to prove themselves invaluable to the early success of the United States’...

View Article

Image may be NSFW.
Clik here to view.

Decisions Exercise: Identifying Where and How To Start the Big Data Journey

The recent deluge of rains in Northern California have flooded streets, brought down trees and plugged storm sewers.  As I was trying to make my way around the neighborhood, I thought of a classroom...

View Article


Image may be NSFW.
Clik here to view.

Six Keys to Successful Identity Assurance – Machine Learning

In our last discussion on the six keys to an identity assurance strategy, we talked about anomaly detection. In that blog, we discussed recognizing normal and abnormal behavior. Recognizing this...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Asia NOC: Malware visibility

By Chris Thomas and Mike Sconzo In the Black Hat Asia NOC we worked to ensure the wireless network was available for presenters and attendees. As part of our monitoring, we kept an eye open for any...

View Article

Image may be NSFW.
Clik here to view.

Announcing RSA Charge 2017 'Call for Speakers' Webinars, April 24 and April 27

                                                       Believe it or not, the RSA Charge 2017 event is only six months away, Oct. 17-19 in Dallas at the Hilton Anatole. Visit the RSA Charge microsite,...

View Article


Image may be NSFW.
Clik here to view.

Disrupt, or Else: Top 5 Digital Transformation Considerations

Hey! You! Yes, You! Did you know there is an Industrial Revolution going on? Maybe if I tweet, Snapchat, Instagram or Whatsapp it (#industrialrevolution @industrialrevolution) I might get your...

View Article


Image may be NSFW.
Clik here to view.

The Evolution of Knowledge Management: From Document Capture to Digital...

I LOVE Knowledge Management! (I bet you don’t hear that often.) Like most who came to Knowledge Management through IT Service Management, I’ve spent much of my career trying to improve how...

View Article

Image may be NSFW.
Clik here to view.

Considering Outsourcing to an IT Staffing Firm? There’s a Better Option

Let’s go back in time 20 years to the year is 1997. Music played on CD’s. We ran our businesses on packaged applications. Star Wars Special Edition was released and we experienced an even better...

View Article

Image may be NSFW.
Clik here to view.

What’s Really at Risk With Reputation Risk

When boards express anxiety about cybersecurity risk, one of the foremost fears they face is reputation risk. Why is that? Because cybersecurity failures do cause reputation damage, and reputation...

View Article

Image may be NSFW.
Clik here to view.

Yin and Yang: Two Views on IAM – HR vs Identity Management

By Steve Mowll and Chris Williams POINT: NEWS FLASH identity management people, HR is not here to feed you with identity data! Steve Mowll, Systems Engineer, RSA Identity management teams may believe...

View Article


Image may be NSFW.
Clik here to view.

GET TO THE CHOPPAH

A new variant of this tool, previously reported in 2013 by TrendLabs, was submitted to VirusTotal from the Philippines on March 27th, 2017. Its original filename, 2017.exe, was prescient since it has...

View Article

Image may be NSFW.
Clik here to view.

Uncovering the Hidden Connections: Why Data Center Blueprinting

“What happened to the mobile phone charging cord?” Every few weeks, I find myself scurrying around the house, trying to find the charging cable for my mobile phone. Actually, it’s the cable to my...

View Article


Image may be NSFW.
Clik here to view.

Peter Principle: The Destroyer of Great Ideas…and Companies

Wikibon just released their “2017 Big Data Market Forecast.” How rosy that forecast looks depends upon whether you look at Big Data as yet another technology exercise, or if you look at Big Data as a...

View Article

Image may be NSFW.
Clik here to view.

Is the cyberworld doomed to be unsafe forever?

Before seeking an answer, let’s question the question. I recently returned to the cybersecurity industry and (re)joined the good fight to secure the cyberworld. As the digital era unfolds, it feels...

View Article


Image may be NSFW.
Clik here to view.

RSA Charge - Call For Speakers!

So time flies… It seems like yesterday when the RSA customer community gathered in New Orleans to share experiences and learn new tactics and strategies. 2017 marked the 13th year of the RSA Archer...

View Article

Image may be NSFW.
Clik here to view.

A Fascinatingly frustrating ScaleIO update :-)

Five things I experienced last week triggered this post for me – which I have to confess, I’m writing a bit short tempered. ONE: Tweet #1 (here) – a customer with a ScaleIO SDS cluster has a 2TB SSD...

View Article

Image may be NSFW.
Clik here to view.

Navigate Through the RSA Archer Documentation Set

                       Looking for information on Archer and how to get the most out of it?  The Archer Information Design and Development team (formerly known as Technical Publications) has your...

View Article
Browsing all 8970 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>