Fixed: Macbook waking up every hour or so
For the last months I have people asking me why on earth I was on google talk / messenger in the middle of the night, but then did not respond when they said hi. It appears that my Macbook had been...
View ArticleCharting The Digital Universe: IDC's 6th Annual Study
Climate change has been hotly debated for well over a decade now. The evidence is largely in, what remains is a discussion around root causes, and what -- if anything -- can be done. Personally, the...
View ArticleDisruptive technologies breaking down our doors in 2013
RSA recently launched its latest SBIC report titled ‘Information Security Shake-up – Disruptive Innovations to test Security’s Mettle in 2013’. It introduces some interesting food for thought on what...
View ArticleBig Data Fuels Intelligence-Driven Security
This month, RSA released a new Security Brief titled “Big Data Fuels Intelligence-Driven Security.” Indeed, one of the themes of this blog over the last year or so has been looking for the bad guys...
View ArticleNew name, Same Game: Red October and the Question of Attribution
Earlier this month, Kaspersky Labs announced the discovery of a new style of cyber espionage campaign. Research on this threat campaign began in October of 2012 according Kaspersksy’s whitepaper....
View ArticleHow does vSphere recognize an NFS Datastore?
This question has popped up various times now, how does vSphere recognize an NFS Datastore? This concept has changed over time and hence the reason many people are confused. I am going to try to...
View ArticleEMC’s Approach to Vulnerability Response
Let’s face it – real software products have security vulnerabilities! While building strong secure software development practices goes a long way towards detecting and helping to eliminate security...
View ArticleDeceit as a Defense
An information security professional’s job is becoming more like military defense every day. We are charged with battling on multiple fronts, typically without enough resources to do the job well....
View ArticleThe next marketing buzzword in security is…
“Whatever you put out I’m gonna buy it, so what’s your latest? I wanna try it” From “I’m a sucker for your marketing” by Sarah Jaffe Every year we seem to have a new buzz term in security. As...
View ArticleReinforcing our doors in 2013
In my last blog I talked about the key technologies breaking down our doors in 2013. The four key areas were Cloud Computing, Social Media, Big Data and Mobile Devices. None of these should have come...
View ArticleHow to disable ESXi firewall
For a project I had to disable the ESXi firewall on a host permanently. To be honest, it isn’t something I would do normally or would recommend even. It wasn’t listed in “chkconfig”, which kinda makes...
View ArticleEurope’s new Cybercrime Centre (EC3) opens for business
The European Cybercrime Centre officially opened its doors this month based at the European Police Office in the Netherlands. According to a BBC report cybercrime in europe is estimated to cost €1.5...
View ArticleDisk.SchedulerWithReservation aka mClock
A long time ago when playing around in my lab with vSphere 5.1 I stumbled across this advanced setting called Disk.SchedulerWithReservation. I start digging to see what I could do with it and what it...
View ArticleThe Changing Nature of the Threat – 2013
By Azeem Aleem, Practice Lead – RSA Advance Cyber Defense (EMEA) Technology advancements are primarily meant to improve upon the quality of life. Unfortunately, it is also used as a tool for illegal...
View ArticleThe Fraud Picture
By Berk Veral, Senior Product Marketing Manager, RSA FraudAction and CyberCrime Intelligence “Now, I can easily see the fraud picture.” That’s the way one of our customers summarized how crucial it...
View ArticleAwesome appliance, vCenter Support Assistant
Today an awesome appliance called the vCenter Support Assistant was made available to the world. I have seen some screenshots and a demo and feel that this appliance is a MUST HAVE for anyone who...
View ArticleStorage vMotion does not rename files?
A while back I posted that 5.0 U2 re-introduced the renaming behavior for VM file names. I was just informed by our excellent Support Team that unfortunately the release notes missed something crucial...
View ArticleAnalysis Techniques: Finding Targeted Attacks Using Antivirus Logs
By Tom Chmielarski, Practice Lead – RSA Advanced Cyber Defense Practice (Americas) The RSA Advanced Cyber Defense team is focused on helping organizations improve their proactive and reactive...
View ArticleThe Phoenix Project, a Novel for Today’s IT Professional
The Phoenix Project Good news for aspiring (and perhaps current) IT leaders as The Phoenix Project by Gene Kim, Kevin Behr, and George Spafford is now finally available and shipping. If you are in any...
View ArticleNext Generation Security Operations: Telescopes for the Lookouts
In my previous blog, I introduced the idea that the concepts around security incident response need to evolve based on the threat landscape facing organizations. The first step in heading towards...
View Article