April 7th Webcast – Recap
It has been awhile and I am sorry that I have not been able to post the slides from the April 7th Webcast that Sharon Isaacson and I did. It was a great webcast. We had 350+ people register for the...
View ArticleEMC and RSA… Enabling Virtual Administrators
Every day as I work with virtualization and the components that surround it, I am reminded why I love working at EMC and RSA. Yes, I have the privilege to work with the mother ship, EMC as well as the...
View ArticleKeep Your Enemies Closer : Advance Threat Management
I was recently watching a replay of the CBS 60 Minutes report that originally aired in November 2009 called “Sabotaging the System”. The segment talked about viruses, malware, and hackers that have...
View ArticleRSA Conference 2012 … the Before
The RSA Conference 2012 officially starts February 27th, 2012. For me, Monday starts with the CSA Summit and booth duty. This is one of my favorite conferences. It is important to understand that the...
View ArticleRSA Conference 2012… the After
How dare it take me so long to do the follow up on the RSA Conference. It has been weeks and I should have been better at getting an update out. I will be honest that my goal was to write a blog post...
View ArticleNIST Interagency Report 7904 – Trusted Geolocation in the Cloud
I can’t tell you how excited I am that my name is on this NIST document. I was working with my wonderful friend Tarik without knowing that this is what it would turn in to. Now let’s talk about it… The...
View Article
More Pages to Explore .....