What else is happening in infosec and fraud these days?
By Berk Veral, Senior Product Marketing Manager, RSA FraudAction and CyberCrime Intelligence I have mostly written about mobile apps; specifically on apps becoming an integral part of our daily lives....
View ArticleVMworld 2013 call for papers open!
VMworld 2013 Call For Papers opened today. I know many of you are excited about this and hoping to have a session accepted at this top-of-the-bill event. Personally I always submit various sessions...
View ArticleTo MSSP or not to MSSP?
By Justin Grosfelt, Principle Security Consultant, RSA Advanced Cyber Defense Services It’s an increasingly common question these days, and not an easy one at that. That is, do you build your security...
View ArticleNew Service in the Underground Offers to Secure Fraudsters’ Infrastructure –...
Whether it is to Phish, to infect, or to sell credentials, cybercriminals have always required an infrastructure to commit their crimes – servers, PHP scripts, vulnerabilities and more. Many of the...
View ArticleITaaS -- Creating That Retail Experience For Your Users
ITaaS: a familiar topic to many of my readers. But there's a new (and interesting) perspective: when you go through all this transformation stuff, how does IT function appear to the average knowledge...
View ArticleWhat is: Current Memory Failover Capacity?
I have had this question many times by now, what is “Current Memory Failover Capacity” that is shown in the cluster summary when you have selected the “Percentage Based Admission Control Policy”? What...
View ArticlePKCS #11: Alive and Well!
We had our first meeting of the OASIS PKCS 11 Technical Committee last week, a very interesting and exciting start to this new stage in the life of the PKCS #11 standard. It was a very impressive...
View ArticleDoes Horizontal Win?
Joe Tucci -- Chairman and CEO of EMC -- thinks so. Conventional IT industry wisdom presumes the ultimate vendor goal is to "own the stack": not only the key components your customer needs, but the key...
View ArticleHow EMC Views The Evolving Storage Market
A while back, I shared how the industry analyst firm of IDC viewed the storage market. A surprising number of people were interested in what could ostensibly be categorized as a rather boring tech...
View ArticleAnalysis Techniques: Responding When the Attacker has a Foothold – Part II
By Tom Chmielarski, RSA Practice Lead, Advanced Cyber Defense Services (Americas) This is the second part in a series: refer to part one for the introduction. This blog series examines response...
View ArticleWhen Public Cloud Isn't Cheaper
The economics of various cloud models has been hotly debated back-and-forth for over four years. Are public clouds cheaper? Are private clouds cheaper? Under what circumstances is one form of cloud...
View ArticleSecure Crypto: “Lucky Thirteen” Attack
By Sean Parkinson, Consultant Software Engineer Once again an attack against TLS has been published and again the attack targets cipher suites that use Cipher Block Chaining (CBC) mode encryption....
View ArticleStartup Intro: SoftNAS
Last week I had a chat with Rick Braddy from SoftNAS. Some of you might know Rick from when he was the CTO of a hosted virtul desktop company called Virtual-Q and others from when he was the CTO of...
View ArticleBusiness Context and Incident Management for the Security Operations Center...
By Bali Kuchipudi, RSA Consultant Product Marketing Manager, Security Management and Compliance Today’s IT environments are more fluid and complex than ever. Security teams are faced with a flood of...
View ArticleVMware vCenter Multi-Hypervisor-Manager 1.1 is out, sign up for it!
VMware vCenter Multi-Hypervisor Manager 1.1 is a minor release with the following new capabilities: Migration of virtual machines from Hyper-V to ESX or ESXi hosts. Support for the latest Microsoft...
View ArticleStartup Intro: AetherStore
Every once in a while you see a solution by a startup and you get all excited. AetherStore is one of those type of solutions. The funny thing is that AetherStore is not directly related to my...
View ArticleWorkplace Security: Are You the Weakest Link?
As an employee at some company somewhere, you are probably putting your organization at risk every day – and you don’t even know it. Do you re-use the same password to log in to multiple accounts?...
View ArticleAwesome Fling: vCenter 5.1 Pre-Install Check
One of the things that many people have asked me is how they could check if their environment was meeting the requirements for an upgrade to 5.1. Until today I never really had a good answer for it...
View ArticleNimbus Data releases Halo 2013
Last week Nimbus Data reached out to me to update me on what they are working on, and more explicitly what they are releasing today. Today Nimbus announces Halo 2013 (their storage operating system)....
View ArticleFrom Storage Products To Storage Workloads
We, as technology vendors, are collectively obsessed with products and technologies -- not only our own, but those of our competition. Our fixations on debating the merits of Product A vs. Product B,...
View Article