Quantcast
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Must Have Competencies for Mobile in 2013

It’s no surprise that Mobile is one of the four competencies which will need to be addressed in 2013. I addressed the mobile competencies in some detail in one of my blogs last year so for the sake of...

View Article


Image may be NSFW.
Clik here to view.

Damned If You Do, Damned If You Don’t

By Sandra Carielli, Senior Product Manager, Access and Data Protection If the user passwords in your organization are compromised, do you: a.)    Notify your users and ask them to change their...

View Article


Image may be NSFW.
Clik here to view.

Transforming Identity Assurance Through Risk-Based Authentication

Risk-based authentication is one of the simplest security technologies to understand while at the same time being one of the most intelligent and adaptable. The concept of risk-based authentication is...

View Article

Image may be NSFW.
Clik here to view.

The Three Transformations of ITaaS

Because I work for a technology company, I frequently get asked to present on "the future of the data center". I think the expectation would that I show up and start talking about shiny new...

View Article

Image may be NSFW.
Clik here to view.

It's A Flash World: EMC's "Flash.next" Announcement

By now, most people who work with storage -- vendors, customers, partners -- appear to have read the memo: we're in the midst of a technology transition from spinning disk to flash storage. All the...

View Article


Image may be NSFW.
Clik here to view.

Hardware In An Era Of Software-Defined Everything

The next mountain to climb is clearly in sight: it's the software-defined data center, or SDDC. Many might justifiably see SDDC as a linear extension of familiar server virtualization concepts, now...

View Article

Image may be NSFW.
Clik here to view.

Write-Same vs XCopy when using Storage vMotion

I had a question last week about Storage vMotion and when Write-same vs XCopy was used. I was confident I knew the answer, but I figured I would do some testing. So what was the question exactly and...

View Article

Image may be NSFW.
Clik here to view.

Why the world needs Software Defined Storage

Yesterday I was at a Software Defined Datacenter event organized by IBM and VMware. The famous Cormac Hogan presented on Software Defined Storage and I very much enjoyed hearing about the VMware...

View Article


Image may be NSFW.
Clik here to view.

Must have Competencies for Securing Social Media in 2013

Following on from my recent blog ‘Re-enforcing our doors in 2013’ solving all of the issues of disruptive innovations isn’t going to be possible in a year but we must take some strides towards making...

View Article


Image may be NSFW.
Clik here to view.

3DS Jumps on the Risk-based Band Wagon and RSA says “Thank You”

By Rueben Rodriguez, Principal Product Marketing Manager, RSA Identity Protection & Verification I’m glad to see the 3DS (3D Secure) industry is finally catching up with RSA’s risk based strategy...

View Article

Image may be NSFW.
Clik here to view.

Analysis Techniques: The Importance of Developing Detection Use Cases

By Tom Chmielarski, RSA Practice Lead, Advanced Cyber Defense Services (Americas) A great way to get value out of a SIEM, a log management platform, or even a syslog server you can query is to spend...

View Article

Image may be NSFW.
Clik here to view.

From Compute Clouds To Dataclouds

Evolution and differentiation -- a powerful theme in life sciences. Also in IT. Just as our current understanding of clouds evolved from what came before, clouds themselves will inevitably evolve and...

View Article

Image may be NSFW.
Clik here to view.

Using das.vmmemoryminmb with Percentage Based admission control

I had question today about using the advanced settings to set a minimal amount of resources that HA would use to do the admission control math with. Many of us have used these advanced settings...

View Article


Image may be NSFW.
Clik here to view.

Cool tool update: RVTools 3.5

Yes, there is it is again… an updated version of RVTools. Rob just emailed me and provided me with a nice list of enhancements: RVTools Version 3.5 (March, 2013) On vInfo tabpage new field: Resource...

View Article

Image may be NSFW.
Clik here to view.

Responding When the Attacker has a Foothold – Part 1

By Tom Chmielarski, RSA Practice Lead, Advanced Cyber Defense Services (Americas) Eventually most people in IT Security will face that dreaded day when they discover the organization has been breached...

View Article


Image may be NSFW.
Clik here to view.

Next Generation Security Operations: Flesh and Blood

Years ago, companies had to worry about the “brick and mortar” threats – physical theft, property destruction, natural disasters.   Next, it was the “bits and bytes” threats – intellectual property...

View Article

Image may be NSFW.
Clik here to view.

The Shape Of Today's Storage Market

So often, I talk about industry directions and future scenarios. That's to be expected, but my view is built on decent understanding of what the marketplace looks like today. IDC just released their...

View Article


Image may be NSFW.
Clik here to view.

Top 25 bloggers 2013 results are out…

The top 25 bloggers 2013 voting results are out again. This year the competition was insane. With newcomers like Cormac Hogan and Chris Wahl, but also old-timers like Chad Sakac, Scott Lowe, Eric...

View Article

Image may be NSFW.
Clik here to view.

Beyond the Zero Day: Detecting JVM Drive-bys – Part 1 of 3

By Erik Heuser, RSA Advanced Cyber Defense Services Advisory Practice Consultant With all the recent Java Virtual Machine (JVM)exploits, a lot of attention is being focused on figuring out how best to...

View Article

Image may be NSFW.
Clik here to view.

The Changing Nature of the Threat – 2013, Part 2 – Migration to the Cloud

By Azeem Aleem, Practice Lead, RSA Advanced Cyber Defense Services (EMEA) A through risk assessment should be adopted by customers to ensure that the benefits for moving on to the cloud outweigh the...

View Article
Browsing all 8970 articles
Browse latest View live