State of IT Transformation – CIOs Want More Automation
Part 3 in our global study of gaps in IT transformation If you read my last two blogs, you know that EMC and VMware have been doing workshops on IT transformation with CIOs for several years now and...
View ArticleE6 – Ghost in the Machine – Curtain Call
The Hunter’s horse panted heavily and churned up dust as it raced down the dirt road towards the Frontier. The moonlight glanced off the swirling clouds of powder in the horse’s wake. The Hunter...
View ArticleTransformative Technologies – Building the Modern Data Center
FITARA and the updated Federal data center policy (the Federal Data Center Optimization Initiative) announced this month a push for agencies to modernize. CIOs are searching for the right path forward...
View ArticleFact or Fiction? New Infographic Reveals Latest Trends in SaaS Industry after...
In late 2015, Spanning by EMC commissioned a survey of more than 1,000 IT decision makers across the U.S. and U.K. to better understand the trends in the use, perceptions, regulations, and impact of...
View ArticleIncident Response Roundup: 5 Facets of Top Performers
An Aberdeen Group analysis of current enterprise practices for managing privileged access provides a powerful illustration of how better visibility and operational forensics can not only help with...
View ArticleData Warehousing Lessons for A Data Lake World
Over the past 2 decades, we have spent considerable time and effort trying to perfect the world of data warehousing. We took the technology that we were given and the data that would fit into that...
View ArticleScaleIO 2.0 the march towards a software-defined future continues.
I don’t ascribe to the world view that “all things will bit-flip to software loosely coupled to commodity industry standard packaging”. People who speak in absolutes, people who are polemic – they get...
View ArticleNew RSA Archer Releases Provide User Enhancements for Vulnerability Risk...
Our mission is to make your risk and compliance job easier, and your feedback plays a key role in guiding how we continue to enhance RSA Archer features and functionality. Based on customer feedback,...
View ArticleTransaction Signing, Meet Selfie
Money-stealing Trojans be gone. When is the last time you logged into your online banking portal, made a payment transaction, and received a notification on your phone to validate the details of the...
View ArticleThe Essential Role of Forensics in Computer Security
Every organization, no matter its size or line of business, should assume it has either been or will be breached. When it comes to responding to an incident, organizations need to realize that time is...
View ArticleResults speak. Talk is well cheap.
Phew! Today is March 31st, the last day of the first quarter of my experience as the leader of a business – a full P&L. It’s really interesting for me, as I’m still (and always) at my core a...
View ArticleInternet Voting…What Could Possibly Go Wrong?
Cybersecurity experts are known for their tough and varied opinions: Put six different experts in a room and you’ll wind up with 10 different opinions, the old saw goes. With the US 2016 election...
View ArticleMomentum 2016 Cancelled
April Fools! Did we get your attention? We’re kicking off our April Blogs with a little April Fools’ humor but really wanted to share some breaking news with you… We are #BeyondExcited to announce the...
View ArticleAn Update on Terracotta VPN
Yesterday at Black Hat Asia in Singapore, RSA Researcher Kent Backman presented an update on Terracotta, our name for a VPN service marketed in China that we originally reported on in August of...
View ArticlePerfectly Placed for a Federation Transformation – Analyze & Deliver
My previous posts in this series have introduced the concept and driving forces behind a large scale IT Transformation. I discussed introducing a centralized ‘fact based’ repository that captures...
View ArticleCredential Sharking: A New Fraud Comes to Town
Over the past couple of years, I’ve worked on many projects which have been focused on helping companies ‘turn the lights on’ as to what is happening on their website – the good, the bad and...
View ArticleDefend the Kingdom – My Final Thoughts
Episode #6 of Defend the Kingdom, “Ghost in the Machine”, brings to close the dramatic battle between good and evil in both Marty’s imagination and his daily work as a security “hunter”. The episode...
View ArticleBig news in the Hyper-Converged Infrastructure Appliance battleground!
2016 is the year EMC and VMware are going “all in” when it comes to the HCIA marketplace. We took all the hard learnt lessons from the EVO:RAIL experience, and went back to the drawing board in late...
View ArticleMoving Toward a Seamless Cloud: An OpEx, IaaS Model for the Future
Running everything under one cloud where we can seamlessly move workloads on and off premises as we need to and pay for IT infrastructure as we use it—that is the vision EMC IT is pursuing when it...
View ArticleWhere’s the Beef? It’s at Momentum!
If you were living the United States in the mid-80s, you will almost certainly remember when this phrase became popular: Where’s the Beef? Those famous Wendy’s ads still make me laugh! What Wendy’s...
View Article