Quantcast
Channel: RSA – Direct2DellEMC
Browsing all 18 articles
Browse latest View live

“My software is secure, I use encryption!”

“My software is secure, I use encryption!” How many times have we, software security practitioners, heard this when engaging with software development teams? I certainly have, and this is typically...

View Article



The RSA Share Project: A Software Security Developer Community

This week, RSA, the Security Division of EMC, launched the RSA Share Project — an important milestone for those of us interested in advancing the adoption of security practices across the software...

View Article

The Security Apartheid: The beginning of the end?

Security has been notably absent from earlier evolutions in the computing industry. For long, the industry has evolved through two parallel universes: 1) The IT infrastructure universe creating...

View Article

The Security-aware Cloud

To build security into the IT infrastructure demands much more than secure software. It is also about having the IT infrastructure products deliver intrinsic security value as a core capability of the...

View Article

Cloud and Virtualization: Surpassing current levels of security

Earlier this month, RSA, The Security Division of EMC released a new RSA Security Brief entitled “Identity and Data Protection in the Cloud: Best Practices for Establishing Environments of Trust.” This...

View Article


In Cloud We Trust…

Throughout 2010, surveys have shown how the lack of trust in cloud computing is slowing the adoption of cloud services. This week at the RSA Conference in San Francisco, California, securing the cloud...

View Article

Image may be NSFW.
Clik here to view.

Split-value Cryptographic Authentication: Building Advanced Threat Resistant...

Advanced Threats are deeply impacting the way we develop secure products by fundamentally changing our working assumptions. We used to design and develop products to be attack resistant assuming that...

View Article

EMC’s Approach to Vulnerability Response

Let’s face it – real software products have security vulnerabilities! While building strong secure software development practices goes a long way towards detecting and helping to eliminate security...

View Article


Image may be NSFW.
Clik here to view.

Why Use Security Analytics?

The difference between success and failure in cybersecurity today hinges upon having deep visibility into an organization’s digital environment and the ability to detect and respond to attacks before...

View Article


Image may be NSFW.
Clik here to view.

Dell and EMC: Why, and What It Means

This is a bittersweet announcement for me. I am incredibly proud of the business we have built here at EMC. It has been a journey that I wouldn’t have traded for anything.  I love our people and the...

View Article

Image may be NSFW.
Clik here to view.

Next Stop on the RSA Express: Abu Dhabi

I’m incredibly excited about attending RSA’s next conference, which will be held November 4-5 in Abu Dhabi. This marks the first time we’re holding a conference in the region and I certainly hope we’ll...

View Article

Image may be NSFW.
Clik here to view.

Security Industry Predictions for 2016

This year marked a strategic shift from a maniacal focus on prevention, toward greater balance on monitoring, detection, and response capabilities. It’s become cliché to say that breaches are...

View Article

Image may be NSFW.
Clik here to view.

Building the Modern Data Center on a Foundation of Trust

If your organization is struggling with how to keep your enterprise data secure in the cloud, you aren’t alone. As I spoke with customers at the recent RSA Conference in San Francisco, how to migrate...

View Article


Five Security Lessons We Can Learn From the Theft of the Death Star Plans

Last year, I wrote about Six Management Lessons That IT Leaders Can Learn From Darth Vader and with the looming release of Star Wars: Rogue One, it is time to revisit the Star Wars universe.  Rogue One...

View Article

Image may be NSFW.
Clik here to view.

Ransomware and What You Can Do to Help Protect Your Data

The largest ransomware attack in history hit many organizations worldwide over the past few days. Known as the “WannaCry” worm, it encrypts the files on a computer and demands a $300 ransom payable in...

View Article


Image may be NSFW.
Clik here to view.

When it Comes to Ransomware, the Best Offense is a Good Defense

The need for cybersecurity awareness and preparedness is once again top of mind as companies across the globe are reeling after the WannaCry ransomware attack last month, and now the NotPetya...

View Article

Image may be NSFW.
Clik here to view.

TLS Security and Data Center Monitoring: Searching for a Path Forward

Protocols are evolving to meet the demands of the future.  We must continue to strengthen the security of these protocols to keep pace with the threat landscape.  As such, Transport Layer Security...

View Article


Image may be NSFW.
Clik here to view.

EdgeX Foundry and Industrial Security for the IoT Edge

This post is co-authored by Riaz Zolfonoon, an RSA Distinguished Engineer who leads the Emerging Technology group at RSA. He is responsible for strategy and technical direction for IoT. Riaz also...

View Article
Browsing all 18 articles
Browse latest View live




Latest Images