Must Have Competencies for Mobile in 2013
It’s no surprise that Mobile is one of the four competencies which will need to be addressed in 2013. I addressed the mobile competencies in some detail in one of my blogs last year so for the sake of...
View ArticleDamned If You Do, Damned If You Don’t
By Sandra Carielli, Senior Product Manager, Access and Data Protection If the user passwords in your organization are compromised, do you: a.) Notify your users and ask them to change their...
View ArticleTransforming Identity Assurance Through Risk-Based Authentication
Risk-based authentication is one of the simplest security technologies to understand while at the same time being one of the most intelligent and adaptable. The concept of risk-based authentication is...
View ArticleThe Three Transformations of ITaaS
Because I work for a technology company, I frequently get asked to present on "the future of the data center". I think the expectation would that I show up and start talking about shiny new...
View ArticleIt's A Flash World: EMC's "Flash.next" Announcement
By now, most people who work with storage -- vendors, customers, partners -- appear to have read the memo: we're in the midst of a technology transition from spinning disk to flash storage. All the...
View ArticleHardware In An Era Of Software-Defined Everything
The next mountain to climb is clearly in sight: it's the software-defined data center, or SDDC. Many might justifiably see SDDC as a linear extension of familiar server virtualization concepts, now...
View ArticleWrite-Same vs XCopy when using Storage vMotion
I had a question last week about Storage vMotion and when Write-same vs XCopy was used. I was confident I knew the answer, but I figured I would do some testing. So what was the question exactly and...
View ArticleWhy the world needs Software Defined Storage
Yesterday I was at a Software Defined Datacenter event organized by IBM and VMware. The famous Cormac Hogan presented on Software Defined Storage and I very much enjoyed hearing about the VMware...
View ArticleMust have Competencies for Securing Social Media in 2013
Following on from my recent blog ‘Re-enforcing our doors in 2013’ solving all of the issues of disruptive innovations isn’t going to be possible in a year but we must take some strides towards making...
View Article3DS Jumps on the Risk-based Band Wagon and RSA says “Thank You”
By Rueben Rodriguez, Principal Product Marketing Manager, RSA Identity Protection & Verification I’m glad to see the 3DS (3D Secure) industry is finally catching up with RSA’s risk based strategy...
View ArticleAnalysis Techniques: The Importance of Developing Detection Use Cases
By Tom Chmielarski, RSA Practice Lead, Advanced Cyber Defense Services (Americas) A great way to get value out of a SIEM, a log management platform, or even a syslog server you can query is to spend...
View ArticleFrom Compute Clouds To Dataclouds
Evolution and differentiation -- a powerful theme in life sciences. Also in IT. Just as our current understanding of clouds evolved from what came before, clouds themselves will inevitably evolve and...
View ArticleUsing das.vmmemoryminmb with Percentage Based admission control
I had question today about using the advanced settings to set a minimal amount of resources that HA would use to do the admission control math with. Many of us have used these advanced settings...
View ArticleCool tool update: RVTools 3.5
Yes, there is it is again… an updated version of RVTools. Rob just emailed me and provided me with a nice list of enhancements: RVTools Version 3.5 (March, 2013) On vInfo tabpage new field: Resource...
View ArticleResponding When the Attacker has a Foothold – Part 1
By Tom Chmielarski, RSA Practice Lead, Advanced Cyber Defense Services (Americas) Eventually most people in IT Security will face that dreaded day when they discover the organization has been breached...
View ArticleNext Generation Security Operations: Flesh and Blood
Years ago, companies had to worry about the “brick and mortar” threats – physical theft, property destruction, natural disasters. Next, it was the “bits and bytes” threats – intellectual property...
View ArticleThe Shape Of Today's Storage Market
So often, I talk about industry directions and future scenarios. That's to be expected, but my view is built on decent understanding of what the marketplace looks like today. IDC just released their...
View ArticleTop 25 bloggers 2013 results are out…
The top 25 bloggers 2013 voting results are out again. This year the competition was insane. With newcomers like Cormac Hogan and Chris Wahl, but also old-timers like Chad Sakac, Scott Lowe, Eric...
View ArticleBeyond the Zero Day: Detecting JVM Drive-bys – Part 1 of 3
By Erik Heuser, RSA Advanced Cyber Defense Services Advisory Practice Consultant With all the recent Java Virtual Machine (JVM)exploits, a lot of attention is being focused on figuring out how best to...
View ArticleThe Changing Nature of the Threat – 2013, Part 2 – Migration to the Cloud
By Azeem Aleem, Practice Lead, RSA Advanced Cyber Defense Services (EMEA) A through risk assessment should be adopted by customers to ensure that the benefits for moving on to the cloud outweigh the...
View Article