Momentum Barcelona Registration is OPEN!
It’s been 4 years in the making. The moment you’ve waited for is finally here. Momentum Barcelona registration is OPEN! This Autumn Momentum Europe returns to the city where we had one of our most...
View ArticleRSA Named A Leader in Gartner Magic Quadrant for IT Risk Management
RSA Archer is very excited to be recognized by Gartner once again as a Leader in the 2016 Magic Quadrant for IT Risk Management! Of the nearly dozen vendors evaluated, RSA was cited as the vendor with...
View ArticleDriving Quick Transformation Wins with Application Retirement
Enabling the business to more effectively respond to industry disruption has undoubtedly been the biggest driver of application transformation over the past several years. But as we recently noted,...
View ArticleLessons In Open Source
Three years ago, the thought of EMC offering up code to open source projects for the world to freely access would have been heresy. The old idea was that we’d produce proprietary source code and over...
View ArticleEmbrace the Digital Economy with Open Arms
Have we all become so impatient? In a world where increasing information and services are available at your fingertips or, in some cases, at the command of your voice, it’s no wonder that we have come...
View ArticleBlog Series: Business Resiliency Maturity Model
We believe organizations today face more risks and changes than they are positioned to keep up with. Business Continuity Management (BCM) or Business Resiliency (BR) programs are no different. These...
View ArticleBehind the Glass Walls of the Black Hat NOC 2016: RSA Takes the Challenge
Every year, the increased sophistication of threat actors and the expanding attack surface makes it more challenging for the Black Hat NOC security teams to maintain a highly functional environment...
View ArticleHow Mobile Phones are Eliminating the Need for Scanners
Has this happened to you? My son forgets a workbook at school and we have to find a classmate to get the exercises for homework. The other parent (or child) quickly snaps a full-page photo of the...
View ArticleWhy Isolated Recovery Solutions Can Help Thwart Your Next Cyber Attack
The cyber security threats facing organizations are more numerous and dangerous than ever. Ever day, hackers find new ways to exploit your infrastructure and wreak unprecedented havoc. The hacker’s...
View ArticleGlobal Services Tech Talk: Intelligent Data Mobility (Faster, Cheaper,...
Traditional data migration is disruptive, expensive, and time-consuming. And worse, it has always been a speed bump to you realizing the value of new storage infrastructure. With the pace of change...
View ArticleWell done to EMC Ireland Junior Achievement Volunteers #EMCGivesBack
EMC Ireland COE held a Junior Achievement Recognition Ceremony for its volunteers on 28th June 2016. EMC was delighted to welcome Liz McEvoy, Cork Area Manager, JAI, and Siobhain O'Hea, Programme...
View ArticleIdentifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6
Online fraud remains as much a part of digital life as URLs. Fraudsters are constantly devising new ways to separate consumers from their money, login credentials, Personally Identifiable Information...
View ArticleGreat Things Come in 3s – EMC (RSA) Positioned in Leader’s Quadrant in Three...
We have all heard the adage that great things come in threes. Stooges. Pigs. Blind Mice. The list goes on and on. I have am very pleased to announce another thrilling combination of three – Gartner...
View ArticleGreat Things Come in 3s – EMC (RSA) Positioned in Leader’s Quadrant in Three...
We have all heard the adage that great things come in threes. Stooges. Pigs. Blind Mice. The list goes on and on. I have am very pleased to announce another thrilling combination of three – Gartner...
View ArticleThird Party Governance and RSA Archer 6.1
In my last blog I discussed the benefits of the of new RSA Archer 6.1 release, aligning an organization’s Operational Risk Management program maturity with the RSA Archer technology to support it....
View ArticleThe challenges facing healthcare’s digital future
I recently attended the UK HIMSS Executive Leadership Conference, where this year’s focus was on building apps and solutions on top of Electronic Patient Records (EPRs). However, from my discussions...
View ArticleGDPR Post Brexit – Are You Getting Ready?
The European General Data Protection Regulation presents the most significant change to data protection in the UK and EU since 1995. It’s been discussed in the EU for the last four years so...
View ArticleHow Universities Can Help Build Job-Ready Graduates That Possess IT...
In recent years we have seen a heightened appreciation of investment in STEM (science, technology, engineering, and mathematics) disciplines as a vehicle that can boost innovation. There has been a...
View ArticleBig Data Success: Prioritize “Important” Over “Urgent”
Ugh. I see so many organizations get so close to the goal line with Big Data, and then get sidelined by something that is not nearly as important to the business. It is easy to see how these...
View ArticleEnter at Your Own Risk: The Perils of Livestreaming Content
There’s no such thing as a free lunch, not even on the Internet. But if you do decide to splurge, new research finds your lack of willpower may come with a side order of malware. In this case, that...
View Article