The BSIMM Nouveau Has Arrived
Gary McGraw’s team at Cigital just released version 4 of the BSIMM, the Building Security In Maturity Model. BSIMM is a survey of how software development organizations across many industries approach...
View ArticleAre You Painting the Tank Brown?
John Deluca from EMC tells the story of the Great Molasses Flood and the events leading up to this disaster and describes how this can be like many companies disaster recovery plans. Know anyone who...
View Article2 Great AppSync Exchange 2010 Single Item Restore Demos
Our friend Ernes Taljic from Presidio, launched the Presidio Technical Blog “Converging Clouds” with a post about EMC’s new replication management software EMC AppSync. He also made two excellent...
View ArticleRevenge of the (SharePoint) BLOB and Backronyms
BLOBs stored in SQL databases can be horrific. Oh, THOSE kind of BLOBs. I was on a call with a customer this week who said they were reaching SharePoint content database file size limits (100GB)...
View ArticleWhat’s new in Exchange 2013, 2 Webcasts, and More!
Next week I’ll be on a couple of webcasts related to Exchange server protection: In these webcasts, we will balance a solid blend of best practices content with information about some of our latest...
View ArticleSplit-value Cryptographic Authentication: Building Advanced Threat Resistant...
Advanced Threats are deeply impacting the way we develop secure products by fundamentally changing our working assumptions. We used to design and develop products to be attack resistant assuming that...
View ArticleEMC’s Approach to Vulnerability Response
Let’s face it – real software products have security vulnerabilities! While building strong secure software development practices goes a long way towards detecting and helping to eliminate security...
View Article3 Benefits of Running Exchange Server in a Virtualized Environment
3 Benefits of Running Exchange Server in a Virtualized Environment Guest post by: Brien M. Posey One of the big decisions that administrators must make when preparing to deploy Exchange Server is...
View ArticleWhy Storage Networks Can Be Better Than Direct Attached Storage for Exchange
Why Storage Networks Can Be Better Than Direct Attached Storage for Exchange Guest Post By: Brien M. Posey Of all the decisions that must be made when planning an Exchange Server deployment, perhaps...
View ArticleAn Up Close Look at the Volume Shadow Copy Services
An Up Close Look at the Volume Shadow Copy Services Guest Post by: Brien M. Posey One of the big problems with backing up database applications is that oftentimes the data is modified before the...
View ArticleThe Pros and Cons of Using Database Availability Groups
The Pros and Cons of Using Database Availability Groups Guest Post By: Brien M. Posey Database Availability Groups (DAGs) are Microsoft’s go to solution for providing high availability for Exchange...
View ArticleWhat’s New for Exchange 2013 Storage?
What’s New for Exchange 2013 Storage? By: Brien M. Posey Many of Exchange Server 2013’s most noteworthy improvements are behind the scenes architectural improvements rather than new product features....
View ArticleWhat’s new for Exchange Server 2013 Database Availability Groups?
What’s new for Exchange Server 2013 Database Availability Groups? By: Brien M. Posey When Microsoft created Exchange Server 2010, they introduced the Concept of Database Availability Groups. Database...
View ArticleThe Future of Exchange Protection
If you could look into a crystal ball and predict what would come next for Exchange protection, what would it be? Join us live on Feb 7th to learn what Ernes Taljec (a data architect from Presidio)...
View ArticleSAFECode Welcomes Howard Schmidt
Today, SAFECode announced the appointment of Howard Schmidt as its new Executive Director. At a time when Cybersecurity has become a top priority for governments in the US and around the world,...
View ArticleOpen Group’s New Open Trusted Technology Provider Standard: How Trustworthy...
The English saying “You are what you eat”, just like many other aspects of culinary history, has its origin in France and more precisely from Jean Anthelme Brillat-Savarin’s “The Physiology of Taste:...
View ArticleSecure Product Deployment: A Team Sport
Year after year, studies such as the Verizon Data Breach Investigation Report show software vulnerabilities and misconfiguration among the main data breach causes. At EMC, we operate under the...
View ArticleSoftware Security Training for All
Fifteen years ago, a common representation of the hacker was a computer science college student hacking systems from his or her dorm room. Nowadays hackers operate on a different scale; they are more...
View Article2013: A Mobile Datacenter Odyssey
At EMC World last week, Avnet Technology Solutions introduced the Avnet Mobile Data Center Solution for EMC VSPEX. Click here or on the picture below to access my latest video which provides a bit...
View ArticleEMC’s VNX = Award Winning storage for Microsoft environments
Microsoft’s TechEd 2013 is next week, and I’m looking forward to spending time with my longtime industry friends and making some new connections on the show floor in New Orleans. This year, I’ll...
View Article