Of Risk and Trust... In IT
Ray O'Farrell, Chief Technology Officer at VMware, calls virtualization one of the most non-disruptive disruptive technologies to hit the enterprise. Virtualization, or software-defined hardware, has...
View ArticleDetecting “Petya/NotPetya” with RSA NetWitness® Endpoint and RSA NetWitness®...
By Alex Cox, Christopher Elisan and Erik Heuser, RSA Research A Ransomware variant known as “Petya/NotPetya” began making the rounds on June 27, 2017. This ransomware takes a different approach to...
View ArticleBreach Response: Mitigating an Outbreak
By Azeem Aleem, Gareth Pritchard and David Gray, RSA Advanced Cyber Defense It’s mid-2017 and the news is alight with yet another alarming cybersecurity attack. A new strain of a malware variant,...
View ArticlePerfect Storm Shatters The Glass House
Back in the dinosaur days before PCs, mainframe computers resided in air-conditioned, glass enclosures with attendants in lab coats. Such a facility — often called a “glass house” by the organizations...
View ArticleBillion Dollar Blast-off – Dell EMC Unity Rockets Past $1B in Just Over a Year
In technology, having the right product, that provides the best capabilities, that solves a variety of business challenges, provides TRUE incremental value, and is timed to meet both customer and the...
View ArticleTransformation Tours: Volume I, Cisco Live 2017
Welcome ladies and gentlemen, to my first ever (yes you read correctly), published testimonial from the road after 25+ tradeshows around the world. After spending the last 5 days in Las Vegas at Cisco...
View ArticleMove Over Silicon Valley – Financial Services Emerging as The Next Big...
With all due respect to the traditional Financial Services (FS) industry, if someone told me five or ten years ago that in 2017, financial services would be associated with words like “innovative” and...
View ArticleTransforming the Future of High Performance Computing, Networking and Storage
ISC High Performance 2017 kicks off this week in Frankfurt, Germany. For those who are not familiar, the ISC global community has been coming together for more than 30 years to share knowledge in high...
View ArticleComposable Infrastructure: Today and Tomorrow
For over a year, I’ve been writing blogs about composable infrastructure, which is the idea that data centers ought to be defined by the needs of applications – not by the ideas of a data center admin...
View ArticleWhere Influence Happens: From the Soaring Heights of Digital Transformation...
The best days at work are the days when your mind gets blown – literally. I had one of those days last week at Storage Field Day in Colorado Springs, Colorado. Over the span of four hours, I witnessed...
View ArticlePerfect Storm Shatters The Glass House
Back in the dinosaur days before PCs, mainframe computers resided in air-conditioned, glass enclosures with attendants in lab coats. Such a facility — often called a “glass house” by the organizations...
View ArticleHeart of the Data Science Revolution… Mankato, MN?
My job has the great advantage of bringing me in touch with some outstanding and truly brilliant people. As an example, last year I spoke at the PrecisionAg Vision Conference in Phoenix (and I’ll be...
View ArticleAdvertising: Disrupting Interruption
The story of advertising starts, ends and endures with disruption at its core. Join Walter Isaacson as he discusses digital marketing's past, present and exciting future with industry visionaries Seth...
View ArticleMusic: The Sound of Disruption
The way we consume music is continuously changing. Join Walter as he discusses how the industry’s endured unfathomable disruption with guests Ani DiFranco, Amanda Palmer, Robert Harris, Jonathan...
View ArticleApplying Common Marketing Practices to Save Millions in Fraud
Over the past few years, I have spoken to countless executives about the challenges of managing fraud risk – from corporate banking to online gaming and digital marketplaces. Whether the goal is to...
View ArticleRSA Charge 2017 ‘Community Selects’ Voting Now Open through July 14; Voice...
RSA Charge 2017’s ‘Call for Speakers’ resulted in an unprecedented number of abstract submissions across all RSA product solutions – RSA Archer Suite, RSA NetWitness Suite, RSA SecurID Suite...
View ArticleCat-Phishing Hackers for Fun and Profit
On June 14th, 2017, a new variant of ZXShell appears to have been uploaded from the Marmara region of Turkey. The Trojan itself is well known and contained x32 and x64 rootkits. This blog describes...
View ArticleComposable Infrastructure: Today and Tomorrow
For over a year, I’ve been writing blogs about composable infrastructure, which is the idea that data centers ought to be defined by the needs of applications – not by the ideas of a data center admin...
View ArticleWhere Influence Happens: From the Soaring Heights of Digital Transformation...
The best days at work are the days when your mind gets blown – literally. I had one of those days last week at Storage Field Day in Colorado Springs, Colorado. Over the span of four hours, I witnessed...
View ArticlePerfect Storm Shatters The Glass House
Back in the dinosaur days before PCs, mainframe computers resided in air-conditioned, glass enclosures with attendants in lab coats. Such a facility — often called a “glass house” by the organizations...
View Article