The Kitchen Sink of Security Management
by David Mitchell – Product Marketing Manager for RSA On a recent visit to a number of companies with an increasing focus on IT security, I noticed a sense of common frustration developing among them....
View ArticleWhat you don’t see can hurt you: Cybercriminals covering their tracks
Over the past few weeks, there have been several reports about the ways in which cybercriminals are making it harder to detect fraud by concealing what they’re doing. One is a new kind of...
View ArticleOrchestrating a New Solution for User Authentication
I’ve never spent much time in an office. I wouldn’t say that I’m Up in the Air as much as George Clooney’s Ryan Bingham. But the value of personal interaction with our customers from Sao Paolo to...
View ArticleSecurity Intelligence and Identity: Reflections from the Munich EIC Conference
Last week my colleague Matthew Gardiner and I, along with Kim Cameron of Microsoft and Edwin van der Wal of Everett Consulting, presented a panel on “Security Intelligence and IAM” at the European...
View ArticleLooking for the Unknown Risk
A couple of weeks ago, I spoke at the annual Computerlinks Forum in Münich, sharing the agenda with a number of other major security vendors. We decided that a good topic would be “The Next...
View ArticleThe Digital Universe and the Smart Grid
Among the materials associated with their just-released report on the Digital Universe, IDC has just posted a new Youtube video of John Gantz and David Reinsel, called “The Digital Universe and the...
View ArticleThe move to an intelligence-driven security model
Image: Internet cables are seen at a server room REUTERS/Kacper Pempel Albert Einstein defined insanity as doing the same thing over and over again and expecting different results. Reflect on that for...
View ArticleThe next marketing buzzword in security is…
“Whatever you put out I’m gonna buy it, so what’s your latest? I wanna try it” From “I’m a sucker for your marketing” by Sarah Jaffe Every year we seem to have a new buzz term in security. As...
View ArticleCybersecurity@EMCworld 2013: Transforming the Trusted Cloud
In my earlier blogs on Transforming Security Analytics and Transforming Trust, I wrote about the strong focus we have on cybersecurity at this year’s EMCworld, previewing several of the sessions that...
View ArticleCybersecurity Takes Center Stage: Notes from EMCworld Day One
Cybersecurity has been visible in EMC keynotes before. Last year Pat Gelsinger spoke about the importance of security in VMware architecture, for example. But this year is the first time that security...
View Article
More Pages to Explore .....