Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise
In April, I wrote two blogs (How Hungry… and Appetite and Exercise) on the concept of risk appetite. I highlighted the fact that organizations must take on risk to drive growth within the business....
View ArticleJune = Pride Month, and is more important than ever.
<PSA WARNING> The text below was something that I was NOT originally going to post on Virtual Geek, and was in an email I sent out at the beginning of June. The events in Orlando have made me...
View ArticleCurrent State of Cybercrime in 2016
The bon mot that “crime doesn’t pay” certainly predates the advent of cybercrime. Today, these digital hold-ups against businesses are highly profitable. Let’s face it: if cybercrime was a publicly...
View ArticleVxRail 3.5 aka the Ghent June update is now GA!
All – VxRail continues to cook! The 3.5 release came out on June 9th, and is getting fast pickup. Customer, field, and partner feedback on VxRail has been awesome. One of the main things that we...
View ArticleDetermining the Economic Value of Data
[Note: I have been trying to write this blog for several years. But instead of trying to perfect the concept, perhaps the best approach is to simply put the idea out there and let it percolate amongst...
View ArticleAnnouncing RSA Archer GRC 6.1
RSA Archer GRC 6 (6.0) was launched in November 2015 under the theme “Inspire Everyone to Own Risk.” GRC 6 focused on providing organizations with an industry leading GRC platform to transform risk...
View ArticleBeginning the Journey to Cybersecurity Maturity
RSA just released results of our second annual RSA Cybersecurity Poverty Index. We’re really excited about the results, but it may not be for the reasons you think. We’re excited because of the number...
View ArticleAnnouncing RSA Archer GRC 6.1
RSA Archer GRC 6 (6.0) was launched in November 2015 under the theme “Inspire Everyone to Own Risk.” GRC 6 focused on providing organizations with an industry leading GRC platform to transform risk...
View ArticleSolving the Storage Persistence Problem in Containers
In an interview on theCube, Josh Bernstein talks about solving the challenge of storage persistence in containers and how in the world of open source the line between customers and vendors is...
View ArticleWomen of World Embrace Risk and Dream Bigger
I’ve had the privilege of hosting Women of World at EMC World for the past three years. The event is always a highlight of the year for me because it serves as a unique opportunity for attendees to...
View ArticleThe Real Reason Why Cybercriminals Steal
Legend has it that when Willie Sutton, a prolific bandit in the US during the Depression era, was asked by a reporter why he robbed banks, his response was, “Because that’s where the money is.” Mr....
View ArticleBuilding a Speedway to the Modern Data Center with Rack-Scale Flash
Reflecting on our launch of DSSD D5 earlier this year, it is worth noting how Flash, especially Rack Scale Flash, is becoming a speedway for organizations to implement and operate a modern data...
View ArticleWaving the Checkered Flag for Your Compliance Race – EMC Positioned as a...
Drivers on NASCAR super speedways race at breakneck speeds, especially once tracks are repaved and tires are precisely selected. The record speed is supposedly a whopping 212 miles per hour (341...
View ArticleRSA Via Lifecycle and Governance Named a ‘Leader’ in 2016 Forrester Wave:...
RSA is happy to announce that RSA Via Lifecycle and Governance has been recognized as a ‘Leader’ in The Forrester Wave™: Identity Management and Governance Q2, 2016 report! (View and download the...
View ArticleWomen of World Embrace Risk and Dream Bigger
I’ve had the privilege of hosting Women of World at EMC World for the past three years. The event is always a highlight of the year for me because it serves as a unique opportunity for attendees to...
View ArticleThe Operational Risk Management Journey (part I)
An important benefit from our release of RSA Archer 6.1 this week is an alignment of organization maturity with the technology to support it. Building a good Operational Risk Management program takes...
View ArticleThe Operational Risk Management Journey (part II)
In part I of this blog, I described the typical maturity progression of an Operational Risk Management Program. Recognizing the fact that risk management programs go through multiple stages of...
View ArticleWomen of World Embrace Risk and Dream Bigger
I’ve had the privilege of hosting Women of World at EMC World for the past three years. The event is always a highlight of the year for me because it serves as a unique opportunity for attendees to...
View ArticleDigital transformation in the insurance industry
In my last blog I spoke about what digital transformation actually means. In my next few posts, I’ll talk about what it means to different industries. Let’s start our quest for the real meaning of...
View ArticleBig Data is About Getting Small
Okay, okay, that seems like an odd thing to say. But at a recent keynote, that came out of my mouth. But that’s a confusing statement, so let me share the entirety of what I said: Big Data is about...
View Article