Quantcast
Channel: Blog | Dell
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Fixed: Macbook waking up every hour or so

For the last months I have people asking me why on earth I was on google talk / messenger in the middle of the night, but then did not respond when they said hi. It appears that my Macbook had been...

View Article


Image may be NSFW.
Clik here to view.

Charting The Digital Universe: IDC's 6th Annual Study

Climate change has been hotly debated for well over a decade now. The evidence is largely in, what remains is a discussion around root causes, and what -- if anything -- can be done. Personally, the...

View Article


Image may be NSFW.
Clik here to view.

Disruptive technologies breaking down our doors in 2013

RSA recently launched its latest SBIC report titled ‘Information Security Shake-up – Disruptive Innovations to test Security’s Mettle in 2013’. It introduces some interesting food for thought on what...

View Article

Image may be NSFW.
Clik here to view.

Big Data Fuels Intelligence-Driven Security

This month, RSA released a new Security Brief titled “Big Data Fuels Intelligence-Driven Security.” Indeed, one of the themes of this blog over the last year or so has been looking for the bad guys...

View Article

Image may be NSFW.
Clik here to view.

New name, Same Game: Red October and the Question of Attribution

Earlier this month, Kaspersky Labs announced the discovery of a new style of cyber espionage campaign.  Research on this threat campaign began in October of 2012 according Kaspersksy’s whitepaper....

View Article


Image may be NSFW.
Clik here to view.

How does vSphere recognize an NFS Datastore?

This question has popped up various times now, how does vSphere recognize an NFS Datastore? This concept has changed over time and hence the reason many people are confused. I am going to try to...

View Article

Image may be NSFW.
Clik here to view.

EMC’s Approach to Vulnerability Response

Let’s face it – real software products have security vulnerabilities! While building strong secure software development practices goes a long way towards detecting and helping to eliminate security...

View Article

Image may be NSFW.
Clik here to view.

Deceit as a Defense

An information security professional’s job is becoming more like military defense every day. We are charged with battling on multiple fronts, typically without enough resources to do the job well....

View Article


Image may be NSFW.
Clik here to view.

The next marketing buzzword in security is…

“Whatever you put out I’m gonna buy it, so what’s your latest? I wanna try it” From “I’m a sucker for your marketing” by Sarah Jaffe   Every year we seem to have a new buzz term in security.  As...

View Article


Image may be NSFW.
Clik here to view.

Reinforcing our doors in 2013

In my last blog I talked about the key technologies breaking down our doors in 2013. The four key areas were Cloud Computing, Social Media, Big Data and Mobile Devices. None of these should have come...

View Article

Image may be NSFW.
Clik here to view.

How to disable ESXi firewall

For a project I had to disable the ESXi firewall on a host permanently. To be honest, it isn’t something I would do normally or would recommend even. It wasn’t listed in “chkconfig”, which kinda makes...

View Article

Image may be NSFW.
Clik here to view.

Europe’s new Cybercrime Centre (EC3) opens for business

The European Cybercrime Centre officially opened its doors this month based at the European Police Office in the Netherlands. According to a BBC report cybercrime in europe is estimated to cost €1.5...

View Article

Image may be NSFW.
Clik here to view.

Disk.SchedulerWithReservation aka mClock

A long time ago when playing around in my lab with vSphere 5.1 I stumbled across this advanced setting called Disk.SchedulerWithReservation. I start digging to see what I could do with it and what it...

View Article


Image may be NSFW.
Clik here to view.

The Changing Nature of the Threat – 2013

By Azeem Aleem, Practice Lead – RSA Advance Cyber Defense (EMEA) Technology advancements are primarily meant to improve upon the quality of life. Unfortunately, it is also used as a tool for illegal...

View Article

Image may be NSFW.
Clik here to view.

The Fraud Picture

By Berk Veral, Senior Product Marketing Manager, RSA FraudAction and CyberCrime Intelligence “Now, I can easily see the fraud picture.” That’s the way one of our customers summarized how crucial it...

View Article


Image may be NSFW.
Clik here to view.

Awesome appliance, vCenter Support Assistant

Today an awesome appliance called the vCenter Support Assistant was made available to the world. I have seen some screenshots and a demo and feel that this appliance is a MUST HAVE for anyone who...

View Article

Image may be NSFW.
Clik here to view.

Storage vMotion does not rename files?

A while back I posted that 5.0 U2 re-introduced the renaming behavior for VM file names. I was just informed by our excellent Support Team that unfortunately the release notes missed something crucial...

View Article


Image may be NSFW.
Clik here to view.

Analysis Techniques: Finding Targeted Attacks Using Antivirus Logs

By Tom Chmielarski, Practice Lead – RSA Advanced Cyber Defense Practice (Americas) The RSA Advanced Cyber Defense team is focused on helping organizations improve their proactive and reactive...

View Article

Image may be NSFW.
Clik here to view.

The Phoenix Project, a Novel for Today’s IT Professional

The Phoenix Project Good news for aspiring (and perhaps current) IT leaders as The Phoenix Project by Gene Kim, Kevin Behr, and George Spafford is now finally available and shipping. If you are in any...

View Article

Image may be NSFW.
Clik here to view.

Next Generation Security Operations: Telescopes for the Lookouts

In my previous blog, I introduced the idea that the concepts around security incident response need to evolve based on the threat landscape facing organizations.   The first step in heading towards...

View Article
Browsing all 8970 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>