Disruptive technologies breaking down our doors in 2013
RSA recently launched its latest SBIC report titled ‘Information Security Shake-up – Disruptive Innovations to test Security’s Mettle in 2013’. It introduces some interesting food for thought on what...
View ArticleSubscribe to the New EMC Web Feeds Today.
Be the first to get the latest EMC information, including news, podcasts, blogs, and more. Update your feed preferences
View ArticleBig Data Fuels Intelligence-Driven Security
This month, RSA released a new Security Brief titled “Big Data Fuels Intelligence-Driven Security.” Indeed, one of the themes of this blog over the last year or so has been looking for the bad guys...
View ArticleThe Lazy Developer’s Way to an Up-To-Date Libraries List
Last time I shared some tips on how to use libraries well. I now want to delve deeper into one of those: Know What Libraries You Use. Last week I set out to create such a list of embedded components...
View ArticleNew name, Same Game: Red October and the Question of Attribution
Earlier this month, Kaspersky Labs announced the discovery of a new style of cyber espionage campaign. Research on this threat campaign began in October of 2012 according Kaspersksy’s whitepaper....
View ArticleHow does vSphere recognize an NFS Datastore?
This question has popped up various times now, how does vSphere recognize an NFS Datastore? This concept has changed over time and hence the reason many people are confused. I am going to try to...
View ArticleSubscribe to the New EMC Web Feeds Today.
Be the first to get the latest EMC information, including news, podcasts, blogs, and more. Update your feed preferences
View ArticleNotes From The Field: Inside A Real World Large-Scale Cloud Deployment
I’ve been granted an incredible opportunity. Over the past three and a half months I have gotten to lead a real world large-scale delivery of a cloud solution. The final solution will be delivered as...
View ArticleFive Good Reasons to Attend Momentum at EMC World 2013
EMC World 2013 is just around the corner (May 6th – 9th). In fact it is a few weeks earlier this year than in past years, which I’m happy about. In past years EMC World has either conflicted with...
View ArticleLinks from 2013-01-15 through 2013-01-21
Links from 2013-01-15 through 2013-01-21: 1 “terrific employee” + 1 thumb drive + 6,000 lost medical records = fired! | Naked Security – Whoops! Why is this still happening? Medical group fined $140K...
View ArticleDeceit as a Defense
An information security professional’s job is becoming more like military defense every day. We are charged with battling on multiple fronts, typically without enough resources to do the job well....
View ArticleLondon VMware Users Group–January 2013
It’s here again folks, the London VMUG. It’s happening this Thursday (24th January 2013) and as always is free to attend. If you’ve never attended a VMUG before, either here in the UK or overseas, I...
View ArticleThe next marketing buzzword in security is…
“Whatever you put out I’m gonna buy it, so what’s your latest? I wanna try it” From “I’m a sucker for your marketing” by Sarah Jaffe Every year we seem to have a new buzz term in security. As...
View ArticleRussian Re-use: An Innovation Mentoring Tale
I am starting the year with two mentees: one in China and one in Russia. We meet every two weeks. In both cases the mentees drive the agenda. They state their career goals and ask me to help in...
View ArticleTape is Alive? Inconceivable!
To begin each year, Joe Tucci brings 400+ people together for the EMC Leadership Meeting. We spend a little time reflecting on the prior year, but most of it focusing on the future. After that, the...
View ArticleVCE and Cisco IAC: Reselling is Just the Beginning
You may have seen a few tweets last week, formally confirming that VCE has the ability to resell the Cisco Intelligent Automation for Cloud (IAC) solution directly. I’ve been asked by a couple people...
View ArticleFun Research on Information Flows
Eye Eye, by mrmanc I am doing some research on inference attacks in advance of one of my RSA Conference sessions and happened across this very interesting piece of research by Roya Ensafi, Mike...
View ArticleReinforcing our doors in 2013
In my last blog I talked about the key technologies breaking down our doors in 2013. The four key areas were Cloud Computing, Social Media, Big Data and Mobile Devices. None of these should have come...
View ArticleNotes From The Field: Inside A Real World Large-Scale Cloud Deployment
I’ve been granted an incredible opportunity. Over the past three and a half months I have gotten to lead a real world large-scale delivery of a cloud solution. The final solution will be delivered as...
View ArticleThoughts from the BCM for Financial Services Webcast
We had a great turnout for our weekly webcast yesterday which was all about BCM for financial services. I especially want to thank Dan Minter from Equifax for co-presenting with me. Here's the link...
View Article