Step Into a Learning Zone to Realize Your Full Potential
A 2016 survey involving 1,400 North America based IT Professionals and Managers found that 72% of the respondents were taking more training than required by the company.[*] Although I did not...
View ArticleCompleting the Puzzle
In a previous blog I reviewed the real world pay back for being a risk leader. Let’s say your company gets it, they know that good risk management increases the likelihood that objectives will be...
View ArticleA Different Take on Keystroke Logging
On March 29th a file was uploaded to VirusTotal containing a fake Microsoft Update Authenticode certificate. Soon thereafter, RSA Research investigated the sample based on certain artifacts that...
View ArticleFundamental Appetite for IT Services Exposed in Hidden Figures
In case you haven’t seen it, Hidden Figures is a dramatic film portraying three women who courageously overcame a deep bias to prove themselves invaluable to the early success of the United States’...
View ArticleDecisions Exercise: Identifying Where and How To Start the Big Data Journey
The recent deluge of rains in Northern California have flooded streets, brought down trees and plugged storm sewers. As I was trying to make my way around the neighborhood, I thought of a classroom...
View ArticleSix Keys to Successful Identity Assurance – Machine Learning
In our last discussion on the six keys to an identity assurance strategy, we talked about anomaly detection. In that blog, we discussed recognizing normal and abnormal behavior. Recognizing this...
View ArticleBlack Hat Asia NOC: Malware visibility
By Chris Thomas and Mike Sconzo In the Black Hat Asia NOC we worked to ensure the wireless network was available for presenters and attendees. As part of our monitoring, we kept an eye open for any...
View ArticleAnnouncing RSA Charge 2017 'Call for Speakers' Webinars, April 24 and April 27
Believe it or not, the RSA Charge 2017 event is only six months away, Oct. 17-19 in Dallas at the Hilton Anatole. Visit the RSA Charge microsite,...
View ArticleDisrupt, or Else: Top 5 Digital Transformation Considerations
Hey! You! Yes, You! Did you know there is an Industrial Revolution going on? Maybe if I tweet, Snapchat, Instagram or Whatsapp it (#industrialrevolution @industrialrevolution) I might get your...
View ArticleThe Evolution of Knowledge Management: From Document Capture to Digital...
I LOVE Knowledge Management! (I bet you don’t hear that often.) Like most who came to Knowledge Management through IT Service Management, I’ve spent much of my career trying to improve how...
View ArticleConsidering Outsourcing to an IT Staffing Firm? There’s a Better Option
Let’s go back in time 20 years to the year is 1997. Music played on CD’s. We ran our businesses on packaged applications. Star Wars Special Edition was released and we experienced an even better...
View ArticleWhat’s Really at Risk With Reputation Risk
When boards express anxiety about cybersecurity risk, one of the foremost fears they face is reputation risk. Why is that? Because cybersecurity failures do cause reputation damage, and reputation...
View ArticleYin and Yang: Two Views on IAM – HR vs Identity Management
By Steve Mowll and Chris Williams POINT: NEWS FLASH identity management people, HR is not here to feed you with identity data! Steve Mowll, Systems Engineer, RSA Identity management teams may believe...
View ArticleGET TO THE CHOPPAH
A new variant of this tool, previously reported in 2013 by TrendLabs, was submitted to VirusTotal from the Philippines on March 27th, 2017. Its original filename, 2017.exe, was prescient since it has...
View ArticleUncovering the Hidden Connections: Why Data Center Blueprinting
“What happened to the mobile phone charging cord?” Every few weeks, I find myself scurrying around the house, trying to find the charging cable for my mobile phone. Actually, it’s the cable to my...
View ArticlePeter Principle: The Destroyer of Great Ideas…and Companies
Wikibon just released their “2017 Big Data Market Forecast.” How rosy that forecast looks depends upon whether you look at Big Data as yet another technology exercise, or if you look at Big Data as a...
View ArticleIs the cyberworld doomed to be unsafe forever?
Before seeking an answer, let’s question the question. I recently returned to the cybersecurity industry and (re)joined the good fight to secure the cyberworld. As the digital era unfolds, it feels...
View ArticleRSA Charge - Call For Speakers!
So time flies… It seems like yesterday when the RSA customer community gathered in New Orleans to share experiences and learn new tactics and strategies. 2017 marked the 13th year of the RSA Archer...
View ArticleA Fascinatingly frustrating ScaleIO update :-)
Five things I experienced last week triggered this post for me – which I have to confess, I’m writing a bit short tempered. ONE: Tweet #1 (here) – a customer with a ScaleIO SDS cluster has a 2TB SSD...
View ArticleNavigate Through the RSA Archer Documentation Set
Looking for information on Archer and how to get the most out of it? The Archer Information Design and Development team (formerly known as Technical Publications) has your...
View Article