Guaranteeing availability through admission control, chip in!
I have been having these discussions with our engineering teams for the last year around guaranteed restarts of virtual machines in a cluster. In the current shape / form we use Admission Control to...
View ArticleThe New "How Can We Help?"
Historically, I've done a *lot* of direct customer and partner interaction. I've always found that you can't fully appreciate what's really going on in the IT marketplace unless you spend a lot of...
View ArticleThe “Switch Target” Part II – The Three “R’s” of Cyber Defense?
By Peter M. Tran, Senior Director, RSA Advanced Cyber Defense Practice In Part I of my post on Switch Targeting, I discussed the fundamentals of how adversaries use seemingly trusted hop points as...
View ArticleOpen Group’s New Open Trusted Technology Provider Standard: How Trustworthy...
The English saying “You are what you eat”, just like many other aspects of culinary history, has its origin in France and more precisely from Jean Anthelme Brillat-Savarin’s “The Physiology of Taste:...
View ArticlePhishing in Season: Tax Time Malware, Phishing and Fraud
By Limor S. Kessem, Cybercrime and Online Fraud Communications Specialist, RSA As phishers will have it, phishing attacks are quite the seasonal trend. It seems that every April, right after a slow...
View ArticleDigital Identities: I Have One For Sale
The term digital identity is so suiting to who we really are online. Think about the accounts you log in to on a regular basis, the activities you perform each day, the way you communicate with...
View ArticleBusiness Continuity: How to Apply Enterprise Risk Management to Your BCM...
by Patrick Potter, RSA Archer GRC Solutions Business Continuity Management (BCM) programs typically do a good job of evaluating business criticality through performing Business Impact Analyses (BIAs)...
View ArticlevOpenData – feed up!
A couple of weeks ago I asked this question on twitter about what the average disk size of a virtual machine is these days. Within a couple of minutes Ben Thomas replied and said we might be able to...
View ArticleTales from the Darkside: Another Mule Recruitment Site
By Steven Sipes, Consultant Research Analyst, RSA FirstWatch The underground economy is a complex world built by criminal organizations. These criminal organizations specialize in one or more of the...
View ArticleCommon Indicators Used to Find Evil
By Grant Warkins Advisory Practice Consultant RSA/NetWitness Incident Response Based on the last few Incident Response engagements I’ve participated in, the most common question I’ve heard is “what...
View ArticleIt’s Official! RSA and NIST Partnership
by Chris Hoover, RSA Archer GRC Solutions This has been a cool and exciting week in the RSA Archer Federal world. I made a couple trips to the National Institute of Standards andTechnology (NIST)...
View ArticleCybersecurity@EMCworld 2013: Transforming Trust
As I mentioned in an earlier blog, we have a stronger focus on cybersecurity at this year’s EMCworld than ever before. That blog talked about how much you’ll see and hear about security analytics,...
View ArticleCybercriminals & Big Data Analytics
By Kate McGavin, Senior Product Marketing Manager Big Data is the buzzword making headlines today. From improving medical diagnosis and treatment to energy conservation, businesses around the world...
View ArticleInstall and configure Virsto
Last week I was in Palo Alto and I had a discussion about Virsto. Based on that discussion I figured it was time to setup Virsto in my Lab. I am not going to go in to much details around what Virsto...
View ArticleZeus FaaS Comes to a Social Network Near You
By Limor S. Kessem, Cybercrime and Online Fraud Communications Specialist, RSA FaaS: Never a Dull Moment The cybercriminal practice of operating Trojans and botnets has a long history on the Internet,...
View ArticleRE: Is VSA the future of Software Defined Storage? (OpenIO)
I was reading this article on the HP blog about the future of Software Defined Storage and how the VSA fits perfectly. Although I agree that a VSA (virtual storage appliance) could potentially be a...
View ArticleGE Invests $105 Million In Pivotal
Occasionally, we get very clear signs that significant change is in the air. When large sums of money unexpectedly change hands, people take notice that something interesting and perhaps unexpected is...
View ArticleOn Preserving Formats
With RSA’s Data Protection Manager 3.5 (now available), we are releasing into our core product a mechanism in cryptography that has been gaining steam in the recent years: format-preserving encryption...
View ArticleFriday Ramblings
It's Friday, the weather has turned stunningly gorgeous here in New England, and I don't have any well-organized thoughts to share with you this time. Instead, I thought I'd share some of the loose...
View ArticleWhere has the £650 million gone?
The UK government has identified cyber security as a key area of focus and new investment and in 2011 announced a budget of £650 million to shore up defenses in the UK. So after two years, let’s...
View Article