Getting the Right Data to (Only) the Right People

This 11th annual observance of National Cyber Security Awareness Month comes at a time when consumer confidence in the digital operations of corporations, government agencies, hospitals and other organizations is already shaken. Within the last year, the information of tens of millions of credit and debit cardholders was … READ MORE

Bill Evans October 21, 2014

Securing the Network Against Inevitable Human Slipups

Did you know that 64 percent of employees admit to visiting non-work related web sites every day? Beyond the obvious productivity hits of such activity, these employees are opening the door to a whole host of cyber threats and putting their organization’s information assets at risk. Despite our … READ MORE

John Gordineer October 14, 2014

“Shellshock” – Bash Bug Vulnerability Alert

UPDATE 2: New Shellshock vulnerabilities have been reported as described on the Shellshock Wikipedia page. Dell is actively investigating, across our entire product base, the extent to which all of these vulnerabilities the CVE-2014-6271, a publicly disclosed vulnerability in the Bash command line interpreter, might be present and will be … READ MORE

John McClurg September 25, 2014

Security Strategy that Aligns to Business Needs

We’re way past cream and sugar According to a popular coffee chain’s website, this is the way I should be ordering my daily cappuccino: Step 1: Hot or Iced Drink? Step 2: Coffee drinks come in four sizes. Which one? 8 oz., 12 oz., 16 oz., 20 oz. … READ MORE

Verna C September 10, 2014

5 Best Practices for Meeting the Mobility Security Challenge

A universal theme among enterprise IT leaders I talk to is mobility, especially the rise of BYOD, and how it has made securing the enterprise increasingly complex and intimidating. This isn’t surprising given that in our recent Dell global security survey, 93 percent of decision makers allow BYOD … READ MORE

Tom Kendra June 26, 2014

Dell Connected Security Solutions Deliver Advanced Threat Defense

In Gartner’s research analysis on “How to Deploy the Most Effective Advanced Persistent Threat Solutions,” the firm says that organizations can benefit from five technical styles of threat prevention to combat increasingly sophisticated malware. The firm advises enterprises to employ at least two of its recommended “Five Styles … READ MORE

Dmitriy Ayrapetov January 6, 2014

How I Learned to Stop Worrying and Love IPv6

In the summer of 1981, IBM released the IBM Personal Computer. That same summer, the standards body known as the IETF published a specification, RFC 791, for the Internet Protocol version 4 (IPv4).  RFC 791 was written at the University of Southern California for the Defense Advanced Research … READ MORE

Wilson Lee December 19, 2013

Dell to host 2013 Cyber Battlefront Think Tank on Tuesday, Sept 17

Cyber security makes headlines every day. Breaches can cost organizations money, intellectual property, sensitive data and even their reputation. Join the cyber security conversation with Dell and industry thought leaders on September 17, 2013. We’ll discuss strategies organizations can implement to help defend against cyber-attacks. Participants include security … READ MORE

Kevin Carrillo September 11, 2013
Click to Load More