Author: admin

The evolution of a Threat Pattern

In an era of agile development and digital transformation, any application is subject to ongoing enhancement and improvement. Indeed, software engineering is a complex process with many interdependent tasks where multiple functions share responsibilities to strike a balance between software quality and business objectives, regardless of the specialized nature of the teams within the organizational…

Read more

RSA Archer Navigator 2.0

#   Looking for more information on the RSA Archer Use Cases?  The new RSA Archer Navigator 2.0 (https://community.rsa.com/community/products/archer-grc/navigator) can help guide you to a ton of useful information that can help organizations that are in the midst of integrating their business processes into Archer.   From the Navigator, select  “Solutions and Use Cases” from the…

Read more

The Latest From The RSA NOC At Black Hat Asia

When sitting in the Network Operations Center (NOC) for one of the world’s largest hacker and security conferences, sometimes no news is good news. Here in the Black Hat Asia NOC, we anticipated and prepared for the region’s hackers to come and share a wireless network. Following initial set-up, during the training days, we observed…

Read more

VMworld 2017 Session Voting

Just a quick post asking for your votes for some sessions I’ve submitted and/or been included in. Successful vSAN Stretched Clusters [1118]GS Khalsa, Sr. Technical Marketing Manager, VMwareJase McCarty, Staff Technical Marketing Architect, VMwareThis session will provide a deep dive into using Stretched Clusters with VMware vSAN. Topics covered will include the foundation of vSAN Stretched…

Read more