Welcome!


From the Blogosphere

Increased Security: Perhaps the most controversial benefit of SDS is that it offers increased security. Hardware enthusiasts will argue that there is nothing stronger than the sticks and bricks of the physical data center and the metal of the hardware devices. But this is not necessari...
I'll explain the difference between two major categories in in-memory computing: In-Memory Database and In-Memory Data Grid. A few months ago, I spoke at the conference where I explained the difference between caching and an in-memory data grid. Today, having realized that many people...
When asked how companies can protect themselves, Schmidt says “They need to properly scope encryption [and] use encryption where it is available.” According to another expert, BBC.com writer Paul Rubens, “Even if cloud service providers are infiltrated or compelled to disclose data,...
Much of what human beings experience as commonplace today - social networking, on-line gaming, mobile and wearable computing -- was impossible a decade ago. One thing is certain: we're going to see even more impressive advances in the next few years. However, this will be the result of...
Fraud is definitely top of mind for all banks. Steve Rosenbush at the Wall Street Journal recently wrote about Visa’s new Big Data analytic engine which has changed the way the company combats fraud. Visa estimates that its new Big Data fraud platform has identified $2 billion in poten...
There are boggling challenges on the planet, each of them affecting all of us, one way or another. Food. Clean water. Vaccinations. Health care in general. Then those second-level concerns which are also catalysts for the big problems: transportation, communications, finance. There ...

By Bob Gourley

The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have...

Cloud computing is increasingly becoming part of the enterprise IT landscape. In fact, a recent cloud security survey conducted by HP reveals that 70 percent of all respondents say their company is using some form of the cloud. The study also found that cloud penetration jumps to 80 pe...
Several current trends in cloud computing leading into 2015 actually exhibit a tension between themselves. One trend, a well-known fact that will continue in the New Year to a greater extent, is that enterprises are rapidly moving to the cloud because of its operational efficiencies. T...
Sitting through a number of presentations at various cyber conferences recently I’m struck that many enterprises cyber security planning comes down to having ‘the best people’ doing really pretty boring jobs. Jobs like keeping software updated, tracking down holes in the firewalls, wai...

By Anup Ghosh

Editor’s note: As an advisor to Invincea I closely track not only their capabilities but the context they provide the community. Anup Ghosh, CEO of Invincea published well reasoned conte...

As this year comes to a close, let's take one last look at the most pervasive cloud computing trends -- including increased usage across the different cloud service models, the key business drivers and the impact of agile innovation strategies.

Cloud computing adoption has m...
For more than a decade we have heard constant warnings about the coming of “cyber war” and “cyber terrorism.” The prophets of cyber doom have promised that cyber attacks are just around the corner that will be on par with natural disasters or the use of weapons of mass destruction. Wit...
For business leaders today, it’s not enough to drive company growth, seek competitive advantages and provide vision. In this era of advanced cyberattacks, executives also need to keep their companies’ data security strategies top of mind. The Ponemon Institute’s 2014 Cost of Data Breac...
The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking our networks. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a de...
Successful hacks can paralyze websites, enable corporate or personal data to fall into the wrong hands and potentially damage the image, reputation and sales pipeline of the organization under attack. For many, this begs the question ‘Why us?’ To find out, let’s delve into the psyche o...
For many of us in the enterprise software industry, modernizing IT while maintaining legacy systems is a tightrope walk where it pays to look ahead, stay balanced, and be nimble. As 2014 races to a close, those of us focused on terminal emulation software solutions have a responsibil...
The time of year that crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen.
Data security has long been thought the exclusive domain of large enterprises. Why would cyber-criminals bother with small and midsized companies when the big prizes are to be found hacking into large organizations? Unfortunately an increasing number of smaller companies find themselv...
Eighty-nine percent of knowledge workers retain access to the sensitive corporate applications and files of former employers. Earlier this year, a member of the team at Site-Eye, one of the top time-lapse film companies in the UK, noticed a disturbing problem with one of its client'...
Got a plan for your move to the cloud? If you do, you’re in the minority. According to a recent study, a mere 31 percent of those planning a move to the cloud actually have a strategy for migrating data and applications. The rest don’t. To avoid the complexity and cost, we recommend h...
The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee ...
Don’t emphasize network security at the cost of endpoint security; the two can be integrated and work hand in hand. The result is a safer, more secure business ready for the challenges of the future.
Operationalization (which is really hard to say, go ahead - try it a few times) is a concept that crosses the lines between trends and technologies. Both SDN and DevOps share the notion of "operationalization" as a means to achieve the goal of aligning IT with business priorities, like...
You don't necessarily get 2x the value from your logs when your volumes double. Value is more aligned with the analysis and trends you can extract from your data. It's no secret that log data is quickly becoming one of the most valuable sources of information within organizations. The...
Cloud security is a top concern for any organization migrating to the cloud. The threats are many. For example, the fact your data resides in a shared, multi-tenant environment is a threat that has become a reality with the latest Xen virtualization bug, which allowed a malicious fu...
The path to successful application delivery has been a long and winding road for many companies. Back in the days of Y2K and the dot-coms, applications were often delivered out of a physical data center. This usually consisted of a dedicated raised-floor room at the corporate headquart...
Earlier in the year, Gartner forecast that by year-end 2016, more than 50 percent of global companies will have stored customer-sensitive data in a public cloud platform. These services can scale very quickly, which has made them very popular for applications that have a requirement fo...
Bitium, based in Santa Monica, CA, works in the cloud to provide secure management of an enterprise's applications, users, and passwords in one place. We asked company Co-founder and CEO Scott Kriz a few questions about the company's vision and strategy. Cloud Computing Journal: Wh...
"The next generation of technology solutions will transform lives, businesses and economies."
This is the theme at this year's...

Every organization should follow a proactive rather than a reactive approach to protect against threats, risks, and vulnerabilities to which if their IT infrastructure is exposed can lead to data loss, regulatory penalties, lawsuits, and damaged reputation. Moving on the same lines,...

The cloud is proving to be a useful tool for businesses both large and small. What started out as an innovative idea has quickly transformed into a vital component of many business practices. As time goes on, demand for cloud storage has only increased with each passing year as more an...

In a recent webinar, Porticor’s AWS cloud security experts took on the security challenges companies face when migrating to AWS (and other IaaS clouds) and offered alternatives that enable IT Directors to take advantage of the cloud, while maintaining control of their data and its s...

Shellshock, appropriately and of course punnily named, is ravaging the Internet right now. Active exploits continue to grow in number and in complexity. While there are multiple avenues through which this vulnerability can be exploited, the most active one at the moment appears to be ...
Editor’s note: This post by Invincea CEO Anup Ghosh first appeared at LinkedIn. We knew this would be of interest to you and posted it here with the author’s permission.-bg I’ll say it up front, your security program does not work because it is based on three common m...

UPDATE (9/28/2014): Our security team indicates that we're now seeing the majority of attempted exploits of Shellshock coming in through input paramters. They've provided ASM signatures to mitigate and recommend customers use these signatures to protect their applications. Y...

Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by...
The trend of virtual currencies is likely not a fad; we’re merely seeing the beginning of what will likely turn into a common practice. Network security revolving around virtual currency exchanges still needs to improve, but once that happens, those improvements may even solve network ...
JP Morgan Chase has announced that in June and July of this year over 76 million retail clients and over 7 million business clients had there personal information stolen from various company websites. The sites identified were: Chase.com, JPMorganOnline, Chase Mobile and JPMorgan Mobil...
I had the privilege of attending a mobile security event this week and speaking with many experts on the matter. I am not a mobile security expert, so my role was to speak on mobile strategies and trends and to learn as much as I could. What did I learn? I learned the difference b...