Meet the Future of Work With Confidence

Meet the Future of Work With Confidence

In this article, Dell Technologies – along with the partners at Intel and Microsoft – provide a blueprint for hybrid working success. You’ll look at the future-ready technologies and methodologies required to transform employee experiences and enhance productivity wherever work takes place. And it will show you how to equip your organization with simplified, manageable IT and future-fit security. Together, we can ensure that hybrid working supports you in delivering your next big business breakthrough….

Read More

Achieving Pervasive Security Above, Within and Below the OS

Meet the Future of Work With Confidence

Keeping business data secure is a challenging task, complicated by the proliferation of endpoints operating outside of the organizational network and the constant evolution of threat vectors. Dell and Intel’s decades long co-enablement relationship is founded on their commitment to keeping commercial customer networks secure. Our holistic approach to security employs software-based, “above the OS” protections against traditional attacks, silicon-based protections from Intel, and hardware-based, “below the OS” capabilities that help defend against attacks targeting…

Read More

Cyber Resiliency and End-user Performance

Meet the Future of Work With Confidence

Improved cyber-resilency capabilties help to reduce risk. But does an organization’s level of cyber-resiliency maturity also help foster innovation and deliver greater business success? To answer this question, ESG surveyed 750 IT decision makers and then segmented the respondents into cyber-resiliency stages. In comparing technology and business performance both quantitatively and qualitatively across these cohorts, the research validated that greater cyber resiliency correlates to improved IT service uptime, faster incident discovery and response, improved IT…

Read More

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography Cloud In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking. By: Alfredo Oliveira, David Fiser July 21, 2022 Read time:  ( words) Previously, we reported on how threat actors are targeting multiple cloud environments such as Huawei Cloud to host cryptocurrency-mining malware by abusing misconfiguration issues and weak or stolen…

Read More

Investing in virtual employee communities pays off

Investing in virtual employee communities pays off

It’s inspiring to witness how quickly people come together to solve a universal problem. The pandemic proved just how resilient, adaptable, and inventive we can be in the face of the unknown. From distilleries warehouses repurposed into hand sanitizer assembly lines to tech giants, like Cisco, transitioning global operations to fully remote, seemingly overnight. We virtually banded together in uncharted ways to tackle the future. That’s the key word, ‘virtually.’ The pandemic pushed us to…

Read More

Select your favorite sessions from the VMware Explore Content Catalog

Select your favorite sessions from the VMware Explore Content Catalog

Ready to start your journey within the multi-cloud universe at VMware Explore? With 12 tracks across 5 focus areas, VMware Explore offers something for everyone. Session scheduling is now available in the content catalog, so be sure to register today and begin building your agenda! Previously, we have shared some of our can’t-miss sessions at VMware Explore US this year. By popular demand, here’s a few more of our favorite sessions from the VMware Explore…

Read More

How CIOs can unite sustainability and technology

How CIOs can unite sustainability and technology

As technology continues to take a larger role in corporate sustainability practices, CIOs can play a key role in driving both business value and environmental, social, and governance (ESG) performance. In fact, creating and implementing a comprehensive sustainable technology strategy must now be the core mission of a purpose-driven CIO. Every executive in Accenture’s recent sustainable technology survey agreed that technology is critical for achieving sustainability goals. So why have only 7% of businesses fully…

Read More

Penn1: A Smart Building Retrofit Success Story

Penn1: A Smart Building Retrofit Success Story

The first time I put on VR goggles was at Cisco Live in Vegas. Instead of going to Everest or the Great Barrier Reef, I did a virtual tour of the complete Smart Building retrofit of Penn1 Plaza in New York City. I remember visiting the building so many times before the remodel, so to ‘see it’ and all the amazing technology and innovations that made the building smart and sustainable.  See it for yourself…

Read More

The CDO: Chief Disappearing Officer

The CDO: Chief Disappearing Officer

“If your actions inspire others to dream more, learn more, do more and become more, you are a leader.” —John Quincy Adams I have been privileged to meet executives from every sector, many with the newer title of “CDO.” The “D” usually stands for Digital or Data. Here’s my observation from seeing great CDOs in action: they actively work to put themselves out of a job or, rather, to make the job they have unnecessary….

Read More

Overcoming the silver bullet syndrome: How to turn data dreams into reality

Overcoming the silver bullet syndrome: How to turn data dreams into reality

Any sufficiently advanced technology is indistinguishable from magic. -Arthur C. Clarke I empathize with the frustrations many CIOs experience as the latest fad hits their desks. From nowhere a demand pops up that a particular technology is urgently needed to modernize their company. The problem to solve is fuzzy, and desired outcomes unclear. I recall a skit from a peer at a team event years ago. In it he emulated one of those executives we’ve all…

Read More
1 2,827 2,828 2,829 2,830 2,831 4,078