Imagine no VPN, it isn’t hard if you try! (Part 2)
The previous segment of this blog described some of the reasons for transforming from a perimeter driven model that uses VPNs/Firewalls to a device-centric, reverse-proxy based approach. As mentioned,...
View ArticleA closer look at the PSD2 and Risk-Based Authentication
The 8th of October 2015 is the day that Europe took a major step towards adopting more secure online banking – the European Parliament formally adopted the revised Directive on Payment Services,...
View ArticleServices Trends Impacting Customers
Community Manager Alan Walsh and Frank Coleman‘s email conversation on what they learned and saw at a large annual services industry conference. Blog manager’s note: Two of our favorite InFocus...
View ArticleThe Innovator’s Dilemma in Cybersecurity
Our final keynote at RSA Conference Abu Dhabi 2015 was given by Richard Clarke, always an interesting and challenging speaker. As I listened to his discussion of responding to cyber threats, however,...
View ArticleA Future-Proof Clinical Research Information Platform for the Era of Health...
To meet patient expectations and be economically sustainable, the healthcare industry needs to break information silos and leverage all the opportunities offered by technology. In this post, Silvia...
View ArticleA New Way to Recover Deleted Google Calendar Events: What It Is, and What It...
Google recently announced a new way to recover deleted Calendar events. In this blog post, you’ll learn more about what this functionality can do, what it can’t do, and what you should do to protect...
View ArticleDavid vs. Goliath
Yes. Yes. You are very good at what you do (even the best!). You have skills, techniques, speed and strength. But is that enough? Just being the best at what you do doesn’t mean you will win against...
View ArticlePower Platform: Hybrid Cloud Drives Digital IT
I’ve heard that the definition of insanity is doing the same thing over and over again, yet expecting a different outcome. If that’s the case, I think Feds have finally come to their senses – the...
View ArticleHelp Wanted: Growing the Pipeline of Cyber Talent
In my last blog post , I started a discussion on my experience at the National Institute for Cyber Education (NICE) Conference 2015. Here, I’ll give you actions and key ideas on how we can make a...
View Article2016 Predictions: Content Gets “Smarter”– Part 2
In my last blog, I talked about four of the McKinsey Global Institute’s twelve disruptive technologies and, in particular, I focused on the astounding, $1 trillion-plus potential benefit of automating...
View ArticleInFocus Readership Survey: Chance to Win a Prize!
Community Manager Your opinion and feedback is very important to us. We are looking forward to getting to know our readers better and to producing the best content for YOU. The survey will take...
View ArticleOur Commitment to Customers
Michael Dell, MSD Partners, and Silver Lake are leading a transaction to combine the EMC Federation of companies and Dell. This business combination will create the world’s largest...
View ArticleHonoring Our Veterans – Today and Every Day
As one of the 11 founding member companies of the Veteran Jobs Mission – a coalition of 200+ companies committed to hire 100,000 veterans by 2020 – EMC actively supports our nation’s veterans. Earlier...
View ArticlePeering into GlassRAT
Today RSA is reporting GlassRAT, a previously undetectable Remote Access Tool (RAT) which was discovered by the RSA Incident Response Team and investigated by RSA Research during an engagement with a...
View ArticleIt Takes a Village
The holiday season is approaching, and this week, in the U.S., we are celebrating Thanksgiving. As I think about all the things that I am grateful for, my mind turns to family, friends, and loved...
View ArticleRSA Archer GRC 6 - A Rising Tide Lifts all Ships
I think back to a handful of audits over my career as an internal auditor where the people performing the function we audited just seemed to get it right. They knew how to run their business, but...
View ArticleE3 – Hordes at the Gate – The Call of the Siren
“Don’t you think you are being a bit paranoid?” Greg asked Marty as the two exited the cafeteria. “I mean, the DDOS attack was pretty severe. I think whoever was behind it accomplished their goal....
View ArticleOur Commitment to Partners: A Message from David Goulden
This message from David Goulden, Chief Executive Officer, EMC Information Infrastructure was first sent as a letter to partners on November 23, 2015. Michael Dell, MSD Partners, and Silver Lake are...
View ArticleBrowser Locked? Call This Number.
A new form of browser locker has recently surfaced. Browser-lockers are websites or pop-ups that redirect the browser to a website that locks-up the browser. The user is prevented from continuing...
View ArticleDocumentum Customers are Talking
In my last blog, I discussed the importance of knowing your customer and truly understanding their business needs in order to deliver the best customer experience. I shared an example of how our team...
View Article