E-book: Educate Yourself with Dell Insight Partner Views on Cybersecurity
Data security breaches and hacker attacks on private businesses, health
organizations and government agencies in the U.S. have grabbed headlines with
increasing frequency, it seems. There is zero doubt about the damage these
events cause. Cybercriminals and hackers walk away with customers’ payment
card information and employee data while companies and federal authorities
investigate the source of the leaks and spend millions of dollars to repair
Some see these breaches as a threat to national security and in response, the
U.S. government has launched the “30-day Cybersecurity Sprint” as a
tactic designed to beef up cybersecurity protocols. According to media
reports, specific program steps include:
Immediately fixing any cybersecurity vulnerabilities Tightening policies and
Cloud Computing Price-Performance Could Vary by 1000%!
Yes, you read that right. The price/performance of your cloud computing
infrastructure could vary as much as 1000 percent depending on time and
location. High levels of variability have actually been seen within the same
cloud service provider (CSP) processing the exact same job. This also means
that the cost to you of processing the exact same job in the cloud could vary
by this much as well.
This surprising result was discovered by a Rice University group, headed by
Dr. T. S. Eugene Ng, that has been focusing on cloud comp... (more)
Everyone from pre-teens to granddads does social media today. With Twitter,
Instagram, Facebook and many newer ways to stay in the know popping up every
day, picking the right platform can be a difficult task. While the personal
value of this modern convenience seems obvious to most, the task of proving
the channel’s worth to a business can be very challenging.
With this said up front, many larger companies have taken the plunge anyway.
According to a recent eMarketer survey, 88 percent of U.S. companies with 100
or more employees that were surveyed are using social media for mark... (more)
By Sandra K. Johnson
Technology leadership is driven by the innovation and creativity of science,
technology, engineering and mathematics (STEM) professionals. STEM careers
offer some of the highest-paying jobs and the potential for a high quality of
life. However, the realization of such promises has not benefited all
segments of the U.S. population, including African-Americans. As we celebrate
Black History Month, I share a few facts on this issue, suggest sources for
solutions and profile African-American technology trailblazers.
Silicon Valley's most innovative technology co... (more)
The CISO Role in Cybersecurity: Solo or Team Sport?
The average length of time in the commercial sector between a network
security breach and when the detection of that breach is more than 240 days,
according to Gregory Touhill, deputy assistant secretary of Cybersecurity
Operations and Programs for the Department of Homeland Security. What could
happen to your company during that eight-month period? Could your company
This alarming statistic is just one of the reasons why the National
Cybersecurity Institute at Excelsior College (NCI) undertook the task of
surveying ... (more)