Quantcast
Channel: Blog | Dell
Browsing all 8961 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Guaranteeing availability through admission control, chip in!

I have been having these discussions with our engineering teams for the last year around guaranteed restarts of virtual machines in a cluster. In the current shape / form we use Admission Control to...

View Article


Image may be NSFW.
Clik here to view.

The New "How Can We Help?"

Historically, I've done a *lot* of direct customer and partner interaction. I've always found that you can't fully appreciate what's really going on in the IT marketplace unless you spend a lot of...

View Article


Image may be NSFW.
Clik here to view.

The “Switch Target” Part II – The Three “R’s” of Cyber Defense?

By Peter M. Tran, Senior Director, RSA Advanced Cyber Defense Practice In Part I of my post on Switch Targeting, I discussed the fundamentals of how adversaries use seemingly trusted hop points as...

View Article

Image may be NSFW.
Clik here to view.

Open Group’s New Open Trusted Technology Provider Standard: How Trustworthy...

The English saying “You are what you eat”, just like many other aspects of culinary history, has its origin in France and more precisely from Jean Anthelme Brillat-Savarin’s “The Physiology of Taste:...

View Article

Image may be NSFW.
Clik here to view.

Phishing in Season: Tax Time Malware, Phishing and Fraud

By Limor S. Kessem, Cybercrime and Online Fraud Communications Specialist, RSA As phishers will have it, phishing attacks are quite the seasonal trend. It seems that every April, right after a slow...

View Article


Image may be NSFW.
Clik here to view.

Digital Identities: I Have One For Sale

The term digital identity is so suiting to who we really are online.  Think about the accounts you log in to on a regular basis, the activities you perform each day, the way you communicate with...

View Article

Image may be NSFW.
Clik here to view.

Business Continuity: How to Apply Enterprise Risk Management to Your BCM...

by Patrick Potter, RSA Archer GRC Solutions Business Continuity Management (BCM) programs typically do a good job of evaluating business criticality through performing Business Impact Analyses (BIAs)...

View Article

Image may be NSFW.
Clik here to view.

vOpenData – feed up!

A couple of weeks ago I asked this question on twitter about what the average disk size of a virtual machine is these days. Within a couple of minutes Ben Thomas replied and said we might be able to...

View Article


Image may be NSFW.
Clik here to view.

Tales from the Darkside: Another Mule Recruitment Site

By Steven Sipes, Consultant Research Analyst, RSA FirstWatch The underground economy is a complex world built by criminal organizations.  These criminal organizations specialize in one or more of the...

View Article


Image may be NSFW.
Clik here to view.

Common Indicators Used to Find Evil

By Grant Warkins Advisory Practice Consultant RSA/NetWitness Incident Response Based on the last few Incident Response engagements I’ve participated in, the most common question I’ve heard is “what...

View Article

Image may be NSFW.
Clik here to view.

It’s Official! RSA and NIST Partnership

by Chris Hoover, RSA Archer GRC Solutions This has been a cool and exciting week in the RSA Archer Federal world. I made a couple trips to the National Institute of Standards andTechnology  (NIST)...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity@EMCworld 2013: Transforming Trust

As I mentioned in an earlier blog, we have a stronger focus on cybersecurity at this year’s EMCworld than ever before. That blog talked about how much you’ll see and hear about security analytics,...

View Article

Image may be NSFW.
Clik here to view.

Cybercriminals & Big Data Analytics

By Kate McGavin, Senior Product Marketing Manager Big Data is the buzzword making headlines today. From improving medical diagnosis and treatment to energy conservation, businesses around the world...

View Article


Image may be NSFW.
Clik here to view.

Install and configure Virsto

Last week I was in Palo Alto and I had a discussion about Virsto. Based on that discussion I figured it was time to setup Virsto in my Lab. I am not going to go in to much details around what Virsto...

View Article

Image may be NSFW.
Clik here to view.

Zeus FaaS Comes to a Social Network Near You

By Limor S. Kessem, Cybercrime and Online Fraud Communications Specialist, RSA FaaS: Never a Dull Moment The cybercriminal practice of operating Trojans and botnets has a long history on the Internet,...

View Article


Image may be NSFW.
Clik here to view.

RE: Is VSA the future of Software Defined Storage? (OpenIO)

I was reading this article on the HP blog about the future of Software Defined Storage and how the VSA fits perfectly. Although I agree that a VSA (virtual storage appliance) could potentially be a...

View Article

Image may be NSFW.
Clik here to view.

GE Invests $105 Million In Pivotal

Occasionally, we get very clear signs that significant change is in the air. When large sums of money unexpectedly change hands, people take notice that something interesting and perhaps unexpected is...

View Article


Image may be NSFW.
Clik here to view.

On Preserving Formats

With RSA’s Data Protection Manager 3.5 (now available), we are releasing into our core product a mechanism in cryptography that has been gaining steam in the recent years: format-preserving encryption...

View Article

Image may be NSFW.
Clik here to view.

Friday Ramblings

It's Friday, the weather has turned stunningly gorgeous here in New England, and I don't have any well-organized thoughts to share with you this time. Instead, I thought I'd share some of the loose...

View Article

Image may be NSFW.
Clik here to view.

Where has the £650 million gone?

The UK government has identified cyber security as a key area of focus and new investment and in 2011 announced a budget of £650 million to shore up defenses in the UK.  So after two years, let’s...

View Article
Browsing all 8961 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>