July 23 2014

At the same time that my RSA Research colleagues were uncovering the Boleto fraud in Brazil reported this week, Symantec released a Security Response describing a 2013 cyber-attack on US energy infrastructure, dubbed “Dragonfly“.  (Also researched by Kaspersky under the name “Energetic Bear”. F-Secure have been tracking one of the malware variants used, called Havex.) The attack used spear-phishing, water-holing and  Remote Access Trojans to compromise a number of important organizations in the United States, Spain, France, Italy, Germany , Turkey and Poland. These targets included energy grid operators and electricity generation firms, as well as oil and gas infrastructure and industrial control system equipment manufacturers.

Continue Reading

Your thoughts matter

TheDoctor landed in the Old Billingsgate Market, in London on Tuesday to help EMC reveal a number of product announcements. Possibly for most, the main news of the day was the announcement that the existing high end storage array VMAX would be replaced with VMAX3. This updated array also included an updated and rebranded version of the operating system called HYPERMAX OS.  

Continue Reading

Your thoughts matter

This year, for the first time, the content of EMCworld is being made available online – not just to EMCworld attendees, but to everyone. From keynotes to sessions to panoramic tours, Virtual EMC World 2014 makes a wealth of insights and information available, including about the themes of trust, security and privacy, just by clicking “Watch New Content” and typing in your email address.

 

Continue Reading

Your thoughts matter

So hands up who protects their personal data? It’s that age-old problem, very few of us consider data protection until it’s too late and we find we have lost data. So let’s consider your options:

 

Don’t do it
Do it manually
Outsource the problem

 
Continue Reading

Your thoughts matter

EMC has just announced the results of research into the attitudes of consumers around the world towards privacy, particularly in terms of the often conflicting requirements of online convenience and online privacy. The research results were formulated into the Privacy Index: a numerical ranking of countries in terms of the predominant attitudes of consumers in each country with regards to this issue. The results are interesting in terms of the profile it indicates for the various countries. But even more striking is the generally consistent attitude towards online privacy and online convenience, captured in three paradoxes that summarize the results of the study:

-          The “We want it all” paradox. Consumers say they want all the conveniences and benefits of digital technology, while at the same time wanting to retain all of their personal privacy.

 

-          The “Take no action” paradox. Although privacy risks directly impact many consumers, most take virtually no action to protect their privacy, instead placing the onus on government and businesses.

-          The “Social sharing” paradox. Users of social media sites claim they value privacy, yet freely share large quantities of personal information, despite lacking confidence in institutions that protect that information.

Continue Reading

Your thoughts matter

I’m at EMCworld 2014 this week, coordinating the security-related sessions, meeting with customers and doing briefings. There hasn’t been time for me to go to any sessions other than the RSA ones, unfortunately, but I did get to the keynotes by Joe Tucci and David Goulden on Monday, and the keynotes by Pat Gelsinger and Paul Maritz on Tuesday. Though the themes of security and trust weren’t a focus of the keynotes this year, as they were last year especially in David Goulden’s keynote, those themes are getting lots of air time at EMCworld 2014 as well. Continue Reading

Your thoughts matter

You don’t have to speak to many CEOs to get a real and immediate sense of how challenging the market is for companies today with analysis paralysis. Many of them are seeing their markets disrupted by regulation, consolidation or technology, and are undergoing substantial change or transformation programmes, in order to keep or grow their market position. For the past five years, these efforts have been played out against a backdrop of zero growth and austerity. Continue Reading

Your thoughts matter

As I’ve mentioned in several earlier blogs, EMC is participating in a major EU-funded project on security for the SPARKS Smart Grid. The project has now officially started and we’ve put up a public website where you can learn more about the project and have access to the publications and other deliverables of the project as we move forward. From the website, you can also contact the project coordinator about joining the SPARKS stakeholder group to participate in our workshops, provide feedback and get early results of our research. Continue Reading

Your thoughts matter

Water is everything. Help us bring clean water to the thousands of people in Tigray, Ethiopia who need it most.

In the past, many efforts to give back have been organized in different places throughout EMC. Employees who participated often faced challenges with cross-functional coordination and proper support.

That all changes now. Welcome to EMC Gives Back.

Continue Reading

Your thoughts matter

Security assessments are finally becoming accepted as something that organisations must do to understand and improve their security deficiencies. Time and time again companies fail at the very basic hurdles. Good security rests on the three pillars of people, process and technology and these 10 deficiencies highlight the areas of improvement in each of these. A good security posture relies on getting all three of these pillars aligned and in balance.

Take a look at the video below for a more in-depth explanation from Rashmi Knowles: Continue Reading

Your thoughts matter