vCloud Suite Poster
One of the last things I worked on while I was part of Technical Marketing was a poster and a white paper. The paper is still being processed but the poster has been released this week. Many thanks to...
View ArticleThe Future of Exchange Protection
If you could look into a crystal ball and predict what would come next for Exchange protection, what would it be? Join us live on Feb 7th to learn what Ernes Taljec (a data architect from Presidio)...
View ArticleThe Hacks Get Hacked and Their Passwords Get Dumped
By Liz Robinson, Principal Product Marketing Manager, RSA Identity and Data Protection On January 30, the New York Times acknowledged that it had been a victim of a security breach. The Times claims...
View ArticlePrevent and Predict Attacks
When it comes to defending our networks we have to be right 100% of the time but a cybercriminal has to be right just once. We must shift this balance if we are ever going to be in a position to truly...
View ArticleThe New OASIS PKCS 11 Technical Committee
As I mentioned in an earlier blog, RSA is transitioning the PKCS #11 standards effort into OASIS. The call for participation for the new OASIS PKCS 11 Technical Committee has now officially gone out...
View ArticleDo I still need to set “HaltingIdleMsecPenalty” with vSphere 5.x?
I received a question last week from a customer. They have a fairly big VDI environment and are researching the migration to vSphere 5.1. One of the changes they made in the 4.1 time frame was the...
View ArticleThe Iris System: Tidying Up Under the Rug
Virtualization helps conceal hardware complexity, one of its many benefits for programmers and administrators. But it’s also a rug under which security and reliability concerns can be all too easily...
View Article“What’s your question?”– Next Generation Analysis in the Compromise Landscape
By Alex Cox, Sr. Researcher, RSA FirstWatch team The FirstWatch team recently had its team planning meeting, where we discussed plans for the year, current events and experiences. One of my...
View ArticlevSphere Metro Storage Cluster storage latency requirements
I received some questions today around the storage latency requirements for vSphere Metro Storage Cluster (vMSC) solutions. In the past the support limits were strict: 5ms RTT for vMotion for...
View ArticlevCenter Heartbeat installation and validation
Today the vCenter Heartbeat team shared a video with me that they created. This video shows the vCenter Heartbeat installation and how to validate the installation itself. The KB Video team blogged...
View ArticleSoftware Defined Datacenter Roadshow – Benelux – Free Event!
Would like to hear more about Software Defined Datacenters from experts like Frank Denneman, Mike Laverick, Cormac Hogan, Kamau Wanguhu and many others? VMware and IBM are organizing an awesome event...
View ArticleContent Intelligence – Enriching the Incident Response Process
Jeff Hale, Senior Practice Consultant, RSA Advanced Cyber Defense Practice A common issue seen in many of our Advanced Cyber Defense (ACD) engagements are customers who have reasonably mature...
View ArticleMobile is the new PC, on steroids… And this is just the beginning!
By Berk Veral, Senior Product Marketing Manager, RSA FraudAction and CyberCrime Intelligence I have written about the mobile based threats, specifically mobile app-based threats before and I am...
View ArticleThe Man in the Middle: Advantages of SSL Decryption
By Rui Ataide, RSA Advanced Cyber Defense Advisory Practice Consultant More and more we hear about mobile app/phone companies and other cloud-based services acting as a sort of “man-in-the-middle”...
View ArticlevCloud Suite equals a Software Defined Datacenter
I was on the VMTN podcast this week with Frank Denneman and Rawlinson Rivera, hosted by John Troyer. One of the discussions we had was around the Software Defined Datacenter and the vCloud Suite....
View ArticleEmerging UPnP Vulnerabilities
By Tom Chmielarski, Practice Lead – RSA Advanced Cyber Defense Practice (Americas) Several vulnerabilities with multiple implementations of Universal Plug and Plan (UPnP) were announced January 29 by...
View ArticleThe SBIC 2013 Trends Report
Today the Security for Business Innovation Council (SBIC) released their 2013 Trends Report which is chocked full of lots of great stuff for security professionals to consider as they begin to tackle...
View ArticleNext Generation Security Operations: Part 1
Over the past few weeks, I have been watching some interesting articles trickle across my screen as I peruse industry news. Dark Reading has been posting recaps of significant security attacks and...
View ArticleWant to Save the Universe?
I like Star Trek. I’ve always wanted to be Captain Kirk (had to pick one…Picard is great too) sitting in that chair on the bridge of the Enterprise with seemingly endless resources at my disposal with...
View ArticleThe move to an intelligence-driven security model
Image: Internet cables are seen at a server room REUTERS/Kacper Pempel Albert Einstein defined insanity as doing the same thing over and over again and expecting different results. Reflect on that for...
View Article