After transitioning to a private company, Dell has broadened and deepened its efforts in a number of integrated technology, solution and service areas. Positive Dell transitioned to a private company in 2013. One intention of that move was to release the company from quarterly results pressure that are typical of publicly held companies to make required changes to maintain and increase its competitive capabilities, as well as increase …
Gartner clients can access this research by clicking here.
http://www.computerweekly.com/news/2240241763/Financial-sector-cloud-adoption-on-the-rise-despite-security-concerns By Caroline Donnelly ComputerWeekly.com 05 March 2015 The financial sector is slowly coming round to the idea of entrusting its apps and data to the cloud, but security remains a major stumbling block for many. That’s one of the key findings from the Cloud Security Alliance’s (CSA’s) latest research into how cloud is being used in the financial sector, which revealed more firms are using off-premise services but on a largely ad-hoc basis. The CipherCloud-sponsored report was compiled by CSA’s recently formed Financial Services Working Group (FSWG) and garnered responses from 102 participants – including banks, credit unions and insurance companies – across 20 countries. Out of those questioned, 61% of organisations said they’re in the throes of hammering out their cloud strategy, with between 39% and 47% looking to use a mix of in-house IT, private, public or hybrid off-premise environments. None of the participating organisations said they plan on adopting a public cloud-only strategy. […]
http://www.eweek.com/security/anthem-breach-evidence-points-to-china-security-researchers-say.html By Robert Lemos eWEEK.com 2015-02-28 A new open-source intelligence analysis of the breach of health insurer Anthem has reinforced theories that the data theft leads back to a Chinese espionage program, security firm ThreatConnect stated on Feb. 27. In the report, which is based on public sources or “open-source” intelligence, security researchers at ThreatConnect and other companies found technical evidence that linked the malware reportedly used in the Anthem attack to a Chinese espionage group and a professor at Southeast University, which works with a government contractor, Beijing Topsec Technology Co. A variety of evidence—including email addresses, domains registered for the command-and-control servers and the certificate used to sign the malware—led back to the trio of actors, Rich Barger, chief intelligence officer for ThreatConnect, told eWEEK. “All of this evidence, from the technical aspect, pointed back to China in numerous ways despite the actors’ best efforts to shroud their origins,” Barger said. “They made an effort to hide, but they messed up.” […]
http://thehill.com/policy/cybersecurity/233740-nsa-staffers-rake-in-silicon-valley-cash By Cory Bennett The Hill 02/24/15 Former employees of the National Security Agency are becoming a hot commodity in Silicon Valley amid the tech industry’s battle against government surveillance. Investors looking to ride the boom in cybersecurity are dangling big paydays in front of former NSA staffers, seeking to secure access to the insider knowledge they gained while working for the world’s most elite surveillance agency. With companies desperate to protect their networks against hackers, many tech executives say the best way to develop security products is to enlist the talents of people who have years of experience cracking through them. “The stories he could tell,” venture capitalist Ray Rothrock recalled about his meetings with a former NSA employee who founded the start-up Area 1 Security. “They come with a perspective that nobody in Silicon Valley has.” […]
http://uk.reuters.com/article/2015/02/25/uk-cybersecurity-europe-idUKKBN0LT0U020150225 BY ANTHONY DEUTSCH AND JIM FINKLE AMSTERDAM/BOSTON Reuters.com Feb 25, 2015 (Reuters) – A cybercrime operation that stole banking information by hacking more than 3 million computers in Indonesia, India and other countries has been disrupted by European police with assistance from three technology companies, officials said on Wednesday. The European Cybercrime Centre at Europol, the European police agency, coordinated the operation out of its headquarters in The Hague, targeting the so-called Ramnit botnet, a network of computers infected with malware. Working with investigators from Germany, Italy, the Netherlands and Britain, it was assisted by AnubisNetworks, a unit of BitSight Technologies; Microsoft Corp and Symantec Corp in dismantling the server infrastructure used by the criminals, Europol said. “The criminals have lost control of the infrastructure they were using,” Paul Gillen, head of operations at Europol’s cybercrime centre, told Reuters. […]