Quantcast
Channel: Blog | Dell
Browsing all 17822 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Groove Theory of GRC – Postulate #1: Musicality or Performance?

Welcome to my second in a series of blogs based on what I term “The Groove Theory of GRC.”   As you may or may not know (or infer from this series), I have been a musician for much of my life....

View Article


Image may be NSFW.
Clik here to view.

Educating Business Leaders To Exploit Big Data

Bob Savage, Vice President and Managing Director, EMC Ireland Across every sector and in every boardroom, Big Data is disrupting business models. The challenge facing enterprises is how to monetise...

View Article


Image may be NSFW.
Clik here to view.

Non-malware Penetration Techniques of an Advanced Attacker – Podcast #246

The level and sophistication of advanced threats is a constantly moving target pitting the advantages of smart and patient attackers against security teams that often times can’t possibly know what to...

View Article

Image may be NSFW.
Clik here to view.

The ATM: Convenience for Consumers….and Fraudsters?

By Amy Blackshaw, Principal Product Marketing Manager, RSA Identity Protection & Verification ATMs (otherwise known as a Cash Points, Money Machines, Cashlines or sometimes even Holes in the...

View Article

Image may be NSFW.
Clik here to view.

Why SourceOne?

In this short four minute video, EMC’s own Gene Maxwell gives a straight forward presentation that answers the question, “Why SourceOne?” SourceOne is a next-generation archiving solution that...

View Article


Image may be NSFW.
Clik here to view.

To Cybercriminals, The Size of a Company No Longer Matters

Gone are the days when it was thought that size of the company matters to the cybercriminals.  The latest PwC Information Security Breaches Survey 2013 shows that there has been a significant rise in...

View Article

Image may be NSFW.
Clik here to view.

Accountability Breeds Service Excellence

No company is perfect. Missteps take place. But a company’s true colors are displayed when it responds to inevitable missteps. Of course, one way that criticism is both received and responded to is...

View Article

Image may be NSFW.
Clik here to view.

Forget the Drapes… How’s Your Plumbing?

A little more than 10 years ago, I wrote an article for InfoStor magazine exposing IT's Dirty Little Secret: Backup was grossly inefficient - and IT knew it. Back then, nobody talked about the backup...

View Article


Image may be NSFW.
Clik here to view.

Five Common Corporate Pitfalls in Cyber Security Management

By Mike McGrew, Advisory Practice Consultant, RSA Advanced Cyber Defense Services This blog discusses five of the high level missteps common to organizations that have experienced needlessly prolonged...

View Article


Image may be NSFW.
Clik here to view.

Backup Is Broken – But Why?

Stephen Manley, Chief Technology Officer, EMC Backup Recovery Systems Division “Well, at least you brought lunch.” – Every CIO’s reaction after I tell them we’re going to talk about backup. Backup is...

View Article

Image may be NSFW.
Clik here to view.

Arming the Enterprise

  One of the more interesting talk tracks coming out of EMC World 2013 was the Venn Diagram introduced by EMC Chief Technology Officer John Roese: Prior to joining EMC, John had observed that the...

View Article

Image may be NSFW.
Clik here to view.

The Liberating “What If” Analytics Cycle

Ah, the anguish of not knowing the “right” answers.  Organizations struggle with the process of determining the “right” answers, resulting in lots of wasted debates and divisive arguments regarding...

View Article

Image may be NSFW.
Clik here to view.

Backup Is Broken – But Why?

“Well, at least you brought lunch.” – Every CIO’s reaction after I tell them we’re going to talk about backup. Backup is broken. Backups are slow and restores are even slower. Even worse, application...

View Article


Image may be NSFW.
Clik here to view.

A Look Back on GPS 2013

Now that Global Partner Summit is over, and you’re (hopefully) back into your normal routine, I just wanted to take a minute to look back at the week in Las Vegas and reflect on everything I took away...

View Article

Image may be NSFW.
Clik here to view.

Don’t Fear the Hangover – Network Detection of Hangover Malware Samples

By Alex Cox, Senior Researcher, RSA FirstWatch team Today, Norman and Shadowserver released a paper that revealed a large attack infrastructure in which they detailed an ongoing campaign, running as...

View Article


Image may be NSFW.
Clik here to view.

Groove Theory of GRC – Postulate #2: Duet, Trio, Quartet, Orchestra

The initial inspiration of my “Groove Theory of GRC” was Rocco Prestia, the bass player for the funk band Tower of Power.  His definition, or lack thereof, of the term groove started my thought...

View Article

Image may be NSFW.
Clik here to view.

EMC Announces New Contracts Lifecycle Management Solution from Beach Street

EMC is pleased to announce the availability of the Beach Street Contracts Lifecycle Management Solution that delivers an end-to-end solution for automating processes throughout the contract lifecycle...

View Article


Image may be NSFW.
Clik here to view.

Mandiant Malware? Not Exactly.

By Alex Cox, Senior Researcher, RSA FirstWatch team The RSA FirstWatch team uses a number of techniques to detect emergent threats and trends.  Much of the output of the analysis process becomes...

View Article

Image may be NSFW.
Clik here to view.

VMware Virsto: A Very Smart Volume Manager For VMs

I think many IT professionals realize that many application performance issues eventually boil down to storage and physical I/O. That was true before server virtualization, and it's certainly true...

View Article

Image may be NSFW.
Clik here to view.

Subscribe to the New EMC Web Feeds Today.

Be the first to get the latest EMC information, including news, podcasts, blogs, and more. Update your feed preferences

View Article
Browsing all 17822 articles
Browse latest View live