Welcome!


From the Blogosphere

A panel of experts examines how The Open Group Trusted Technology Forum standards and accreditation activities enhance the security of global supply chains and improve the integrity of openly available IT products and components.
As more and more businesses choose to depend on the cloud, it is not unreasonable to be cynical and doubt the evolution. Are businesses risking it all by moving their data to the cloud? Or is this a totally thought-out move? The days of hosting websites and applications on your own in...
My daughter has been asking for a puppy for over a year. A Chow puppy. I’ve had Chow Chows my entire life and our current Chow, Max, is a big 72lb cinnamon boy. He’s also the medical alert dog for our daughter. Max, a rescue, is about 5 years old and we wanted to get a puppy so Max-Boy...
The growing cloud computing industry brings many new opportunities, but with success comes litigation, both from competitors seeking to gain an edge in a crowded market and opportunists seeking to make a quick buck. Valid patents and good innovations deserve due respect and considerati...
Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. Although every one of these sta...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. A June 2014 Gartner Report on Secu...
Maintaining network security has never been more challenging than it is right now. Traditional network perimeters are beginning to blur in the face of consumerization, the rise of mobility, migration to the cloud, and the Internet of Things. The pursuit of business agility has driven t...
The Open Group panel discusses what constitutes a good standard, or set of standards, and how organizations can work to better detect misdeeds. How can global enterprise cybersecurity be improved for better enterprise integrity and risk mitigation? What constitutes a good standard, or...
On March 18, 2015, system administrators and developers received ominous news: two high severity vulnerabilities in OpenSSL would be announced the next day. Since Heartbleed, OpenSSL had been on a bad streak, and it looked like things were only going to get worse. Operations, developme...
No, this isn't a tirade on the security of IoT. It's about story about change. Specifically, change and its implications on security. Change is constant. There's a million different axioms and proverbs about change, so it's really hard to choose just one to sum up how it impacts sec...
Dorothy the CIO was walking the yellow brick road of planning. She was on her way to the Emerald City to ask the great wizard of the agile data center for advice. Along the way she met two other CIOs who joined her on the journey, nicknamed Tin Man and Scarecrow. Their travels brought ...
Avito, a Russian eCommerce site and portal, uses big data technology to improve fraud detection, as well as better understand how their users adapt to new advertising approaches. This BriefingsDirect big data innovation discussion examines how Avito, a Russian eCommerce site and porta...
A network-centric systems approach to IoT has begun to dramatically affect physical security. The opportunity reaches well beyond simply connecting new sensors and information sources. Integration of sensors and controllers is a necessary step and serves as a foundation for generating ...
Gareau: In the past few months we have seen the proliferation of “commercialized cyber attack services,” notably Lizard Squad and the tool that they used to take down Xbox Live and Playstation during the Holidays. As these services become more popular, large-scale DDoS attacks will be ...
We found all manner of interesting practices and trends as it relates to cloud and security in our State of Application Delivery 2015 report. One of the more fascinating data points was a relationship between security posture and cloud adoption. That is, it appears that the more applic...
Our new assessment offering stems from our direct client experience and from critical data points garnered from our upcoming 2015 Global Threat Intelligence Report, which will be available next month (May 2015). The report, which was commissioned by our parent company NTT, found that t...
Privileged Identity Management (PIM) is the lowest common denominator in today’s most treacherous corporate and governmental security breaches. Or more accurately: Privilege Mismanagement. Sony, Target, Anthem, JP Morgan Chase, the city of San Francisco and many others succumbed to the...
The clamor surrounding enterprise cybersecurity is to be expected, of course, with all the breaches – ahem, “incidents” – over the last year or so. Home Depot. Target. Anthem. The list goes on and on. And with breaches come enterprise dollars, frantically swirling over the proverbial b...
Twitchell: We actually dynamically shuffle the location of data blocks across different geographic locations to radically improve data security and integrity while improving network performance. Dispersive™ SDS underpins DispersiveStorage™; this new solution works seamlessly with Dispe...
The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days, according to Gregory Touhill, deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. ...
Web application security. Everyone knows how important it is (and if they don't, they should) and yet the complexity of managing services that provide it often result in, shall we say, less than holistic coverage of applications. At least that seems to be the case given some rather dis...
SYS-CON Events announced today that WHOA.com, an ISO 27001 Certified secure cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. WHOA.com is a le...
In recent years, the US government has become a leading advocate for continuous monitoring of security threats and vulnerabilities. But how effectively are departments and agencies in implementing these programs? And how do we measure success? Moving Towards Continuous Monitoring Tho...
For most C-level executives (and most of the rest of the planet too), the concept of ‘risk’ is generally first perceived as a negative. The notion of risk as a business positive (or a ‘business enabler’ even) is fanciful, flaky and fraught with fallibility – isn’t it? This proposition...
What keeps an IT manager up at night? Ghosts, goblins and ghouls? Guess again. It takes more than a few measly monsters to cause a lack of sleep in today’s IT department. IT used to exist primarily to monitor and maintain systems, protect against data breaches and malware attacks, an...
Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purp...
This book does a great job of covering all the security topics you need to know about to work successfully in a decent size enterprise. This book is a beast!!! It is 100% textbook, with a lot of exercises at the end of the chapters. If your class uses this book, get ready for a fire h...
One of the most difficult things to do today is to identify a legitimate user. Part of the problem is that the definition of a legitimate users depends greatly on the application. Your public facing website, for example, may loosely define legitimate as "can open a TCP connection and s...
Keeping data from getting out into the wild or being damaged by cyber attackers is what keeps CISOs, the executive team and boards of directors up at night. To protect organizations, cybersecurity needs to be automated and real-time, it needs to learn contextually like we do and it nee...
If you have a Network Operations Center (or NOC, as the kids call it), you have a skilled set of eyes monitoring your system and alerting your engineers when things go wrong. (If you have something like a NOC, such as a first tier team that processes tickets, we’re looking at you, too)...
With recent high profile data breaches companies should ensure they have the five following file governance policies in place in their company to secure their file assets. Ensure that an Identity Management policy is in-place, is clear, and if one exists that it is validated and check...
I’ve been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on a multi-week European vacation. After...
At the recent Mobile World Congress 2015 (MWC) in Barcelona, we heard operators and vendors discuss the future of mobile network connectivity around the globe. While we look forward to new updates on this subject (and updates from these major players), the conference was also ripe with...
Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat and risk analysis. Security team efforts haven’t been integrated, or if they are integrated, it is only through rudimentary tech...
After an application crash, we know how important it is to figure out what went wrong and plan so it doesn’t happen again. In this post, we’ll look at some common causes of major website crashes, along with preventive measures you can take to avoid them in the future. With this extra k...
At some point in the near future, our alarm clock will ring when the biometric scanner monitoring our sleep indicates we have achieved optimum rest. Our clock will connect with the coffee maker, and a steaming cup of brew will be waiting, while the lighting system in our home gradually...
A virtual Chief Information Security Officer (CISO) can be an invaluable asset to your company. The virtual CISO provides your business with a person that will be in charge of the electronic security aspects of your company. You will have an executive in place that will not only overse...
Health Shared Services BC in Vancouver implemented one of the healthcare industry’s first Service Asset and Configuration Management Systems to help them optimize performance of their IT systems and applications. We'll explore how HSSBC has successfully implemented one of the healthca...
A new report sponsored by CA Technologies examines how IT and business leaders aim to sync the security and mobile user experience. CA Technologies’ latest research determines that though top concerns of IT Security practices include the elimination of breaches, data protection and ide...
This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing may be the biggest and most overhyped term in Government information technology today. It is also the most discussed topic in agency s...