Quantcast
Channel: Blog | Dell
Browsing all 17822 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Disruptive technologies breaking down our doors in 2013

RSA recently launched its latest SBIC report titled ‘Information Security Shake-up – Disruptive Innovations to test Security’s Mettle in 2013’. It introduces some interesting food for thought on what...

View Article


Image may be NSFW.
Clik here to view.

Subscribe to the New EMC Web Feeds Today.

Be the first to get the latest EMC information, including news, podcasts, blogs, and more. Update your feed preferences

View Article


Image may be NSFW.
Clik here to view.

Big Data Fuels Intelligence-Driven Security

This month, RSA released a new Security Brief titled “Big Data Fuels Intelligence-Driven Security.” Indeed, one of the themes of this blog over the last year or so has been looking for the bad guys...

View Article

Image may be NSFW.
Clik here to view.

The Lazy Developer’s Way to an Up-To-Date Libraries List

Last time I shared some tips on how to use libraries well. I now want to delve deeper into one of those: Know What Libraries You Use. Last week I set out to create such a list of embedded components...

View Article

Image may be NSFW.
Clik here to view.

New name, Same Game: Red October and the Question of Attribution

Earlier this month, Kaspersky Labs announced the discovery of a new style of cyber espionage campaign.  Research on this threat campaign began in October of 2012 according Kaspersksy’s whitepaper....

View Article


Image may be NSFW.
Clik here to view.

How does vSphere recognize an NFS Datastore?

This question has popped up various times now, how does vSphere recognize an NFS Datastore? This concept has changed over time and hence the reason many people are confused. I am going to try to...

View Article

Image may be NSFW.
Clik here to view.

Subscribe to the New EMC Web Feeds Today.

Be the first to get the latest EMC information, including news, podcasts, blogs, and more. Update your feed preferences

View Article

Image may be NSFW.
Clik here to view.

Notes From The Field: Inside A Real World Large-Scale Cloud Deployment

I’ve been granted an incredible opportunity. Over the past three and a half months I have gotten to lead a real world large-scale delivery of a cloud solution. The final solution will be delivered as...

View Article


Image may be NSFW.
Clik here to view.

Five Good Reasons to Attend Momentum at EMC World 2013

EMC World 2013 is just around the corner (May 6th – 9th). In fact it is a few weeks earlier this year than in past years, which I’m happy about. In past years EMC World has either conflicted with...

View Article


Image may be NSFW.
Clik here to view.

Links from 2013-01-15 through 2013-01-21

Links from 2013-01-15 through 2013-01-21: 1 “terrific employee” + 1 thumb drive + 6,000 lost medical records = fired! | Naked Security – Whoops! Why is this still happening? Medical group fined $140K...

View Article

Image may be NSFW.
Clik here to view.

Deceit as a Defense

An information security professional’s job is becoming more like military defense every day. We are charged with battling on multiple fronts, typically without enough resources to do the job well....

View Article

Image may be NSFW.
Clik here to view.

London VMware Users Group–January 2013

It’s here again folks, the London VMUG.  It’s happening this Thursday (24th January 2013) and as always is free to attend.  If you’ve never attended a VMUG before, either here in the UK or overseas, I...

View Article

Image may be NSFW.
Clik here to view.

The next marketing buzzword in security is…

“Whatever you put out I’m gonna buy it, so what’s your latest? I wanna try it” From “I’m a sucker for your marketing” by Sarah Jaffe   Every year we seem to have a new buzz term in security.  As...

View Article


Image may be NSFW.
Clik here to view.

Russian Re-use: An Innovation Mentoring Tale

I am starting the year with two mentees: one in China and one in Russia. We meet every two weeks. In both cases the mentees drive the agenda. They state their career goals and ask me to help in...

View Article

Image may be NSFW.
Clik here to view.

Tape is Alive? Inconceivable!

To begin each year, Joe Tucci brings 400+ people together for the EMC Leadership Meeting. We spend a little time reflecting on the prior year, but most of it focusing on the future. After that, the...

View Article


Image may be NSFW.
Clik here to view.

VCE and Cisco IAC: Reselling is Just the Beginning

You may have seen a few tweets last week, formally confirming that VCE has the ability to resell the Cisco Intelligent Automation for Cloud (IAC) solution directly. I’ve been asked by a couple people...

View Article

Image may be NSFW.
Clik here to view.

Fun Research on Information Flows

Eye Eye, by mrmanc I am doing some research on inference attacks in advance of one of my RSA Conference sessions and happened across this very interesting piece of research by Roya Ensafi, Mike...

View Article


Image may be NSFW.
Clik here to view.

Reinforcing our doors in 2013

In my last blog I talked about the key technologies breaking down our doors in 2013. The four key areas were Cloud Computing, Social Media, Big Data and Mobile Devices. None of these should have come...

View Article

Image may be NSFW.
Clik here to view.

Notes From The Field: Inside A Real World Large-Scale Cloud Deployment

I’ve been granted an incredible opportunity. Over the past three and a half months I have gotten to lead a real world large-scale delivery of a cloud solution. The final solution will be delivered as...

View Article

Image may be NSFW.
Clik here to view.

Thoughts from the BCM for Financial Services Webcast

We had a great turnout for our weekly webcast yesterday which was all about BCM for financial services.  I especially want to thank Dan Minter from Equifax for co-presenting with me.  Here's the link...

View Article
Browsing all 17822 articles
Browse latest View live