Welcome!


From the Blogosphere

A data breach could happen to anyone. Data managed by your company is valuable to someone, no matter what the data is. Everything has a price tag on the dark web. It is especially true when it is customer data, such as personal and payment card details. When your customers’ data turns...
Opining about the future of AI at the recent Brilliant Minds event at Symposium Stockholm, Google Executive Chairman Eric Schmidt rejected warnings from Elon Musk and Stephen Hawking about the dangers of AI, saying, “In the case of Stephen Hawking, although a brilliant man, he’s not a ...
Are you still pondering whether to integrate cloud computing services into the structure of your IT network? You are not the only one. Most IT professionals are very concerned about data security, so they aren’t that willing to switch to cloud computing solutions that easily. It’s a fa...
It seems like every day we see reminders of the importance of thorough security testing from all areas of the software world. Security has become an especially critical consideration for APIs in recent years. Organizations rely on APIs to share and receive information - either from a t...
It feels like the barbarians are continually at the gate. We can’t seem to go more than a week before a new data breach is in the news, impacting potentially millions of individuals. The targets range from companies like Omni Hotels, which had been breached affecting up to 50,000 custo...
Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world's largest conglomerates see this new model as a "must do". This rapid shift is, in fact, accelerating. As Jeff Bertolucci observes in "The Shift to Cloud S...
While on a call with a customer last week, I was faced with the question of why the customer’s site had slowed down, even after they had switched to full SSL. Well, to be honest, it’s pretty obvious; SSL is more expensive from a web performance perspective. However, it wasn’t until I ...
As the Big Data marketplace moves closer to a point of mass-maturity, business leaders have begun to take new approaches to implementation and utilization. Advanced analytics solutions have made their way into a range of industries and regions, and companies that successfully align the...
The next BriefingsDirect security market transformation discussion explores how airline Allegiant Air solved its payment card industry (PCI) problem -- and got a whole lot better security culture to boot. When Allegiant needed to quickly manage its compliance around the Payment Card I...
Distributed Denial-of-Service (DDoS) attacks have become the primary threat to the availability of networks and online services and the peak attack sizes have grown by a factor of more than 50 over the last 10 years. Today, botnets and easy-to-use tools for launching DDoS attacks have ...
Cybercrime costs the global economy as much as $450 billion each year. And, the median cost of cybercrime has increased by nearly 200% in the last five years. Meanwhile, collaboration has become the cornerstone of successful organizations. But collaboration often comes with a risk. ...
Cloud Service Brokerage is changing from an industry footnote toward becoming a major system integration play. This role has now become a crucial component of a cloud computing transition because they help organizations aggregate multiple cloud services, integrate services with in-hous...
One of the greatest challenges facing business and government organizations is how to store and move sensitive data around the world while maintaining security. Storing and securing critical data held within data centers (whether physical or virtual) is top of mind from the boardroom t...
Insider threats are on the rise more than ever. It’s a malicious activity that originates from users within an organization, as opposed to attacks like DDoS that come from the outside. Cyber hackers of this kind get inside the system to steal intellectual property from the company via ...
Advances in thin clients, desktop virtualization (VDI), cloud management services, and mobile delivery networks are allowing both increased security and edge applications performance gains. The next BriefingsDirect thought leadership panel discussion focuses on the heightened role of ...
Information security has become a critical priority for many businesses over the past decade, and for good reason. It seems like a new breach is exposed on nearly a daily basis, impacting another organization and its patrons. However, some companies believe that they're safe because th...
It is my firm belief that developers today are not focused on security during periods of head-down development. I would love to know the percentage of web developers that know about the Open Web Application Security Project or OWASP. This non-profit organization is simply focused on th...
Security is one of the most controversial topics in the software industry. How do you measure security? Is your favorite software fundamentally insecure? Are Docker containers secure? Dan Walsh, SELinux architect, wrote: "Some people make the mistake of thinking of containers as a bet...
Organizations are experiencing a new emphasis when it comes to cybersecurity. They are moving from securing the perimeter to securing the data within it, which is the result of the proliferation of connected devices in organizations today: smartphones, tablets and the IoT. Organization...
Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists. The cloud brings unique advantages to individual and business users alike and this explains the exponenti...
Hosting providers are often judged by their ability to ensure network availability/uptime. Unfortunately, distributed denial of service (DDoS) easily impact service availability and, in some instances, completely take down a hosting platform. As DDoS attacks continue to increase in siz...
Humorous metaphor about the cloud aside, this is a not-so-lighthearted blog entry. This is the convergence of progress, loss, and humility. In the fall of 2015, Salesforce.com (SFDC) announced upcoming initiatives for the Internet of Things. What we now know is that it was envisioned ...
Recent reports from the GAO indicate the US government is falling behind the technology gap, effecting everything from nuclear weaponry preparedness to an increase in medical errors that have pushed them to become the third leading cause of US deaths. We have IT solutions to solve prob...
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly ...
Today nearly all of us have our information stored on the cloud. It’s a very easy solution that allows users to seamlessly create back-ups of photos, contacts and other personal information, giving users access to their accounts anywhere from any device. Perhaps its most prized feature...
Many of you are very familiar with iRules, our Tool Command Language (Tcl) based scripter. It’s a powerful application delivery tool to have a programmable proxy that allows you to manipulate – in real time – any network traffic passing through the BIG-IP. Many BIG-IP fans have used it...
Ransom Trojans have evolved over time. The newer variants target files on a computer’s local drives, network shares and cloud paths alike. It's been years since it became obvious that crypto isn't necessarily usable for benign purposes only. Back in the day, a variety of data encrypt...
The EMV liability shift that began in October 2015 is likely to reduce card present payment card fraud. That’s a double-edged sword for retailers with an online presence and those who accept mobile payments, as fraudsters are seeking easier routes to ill-gotten gain. Add to this the on...
Wow, if you ever wanted to learn about Rugged DevOps (some call it DevSecOps), sit down for a spell with Shannon Lietz, Ian Allison and Scott Kennedy from Intuit. We discussed a number of important topics including internal war games, culture hacking, gamification of Rugged DevOps and ...
As the march to connect each and every noun on this planet continues with a blistering pace, the various ways, contraptions and sensors used to collect data is greatly expanding. What once was a (relatively) small collection of fitness trackers, smartwatches, thermostats, automobiles a...
Internet of Things (IoT), hybrid cloud services, mobile-first, and DevOps are increasing the demands and complexity of the overall development process. Key factors to improving both development speed and security despite these new challenges include new levels of collaboration and com...
Most people love new technology. It can make us more productive. It can lower our costs. It can be very “cool.” So, if it’s true and most people love new technology, why do we tend to adopt new technology on a “curve?” Why do innovators and early adopters jump in early while others bec...
As we have seen the growth in security challenges across the organization, we have also seen the growth in security spending and number of products that an enterprise buys. But have we, as an industry, been able to show that we are better off or worse? There is no clear yardstick to me...
The cloud provides two major advantages to load and performance procedures that help testing teams better model realistic behavior: instant infrastructure and geographic location. Cloud-based load testing also lowers the total cost of ownership, increases flexibility and allows testers...
Initially, we came across ransomware which exploited the entire system and just restricted you from interacting with your own device, later on requiring you to pay dollars if you want to go back and use your computer. And then it started becoming obsolete because an end-user. People...
According to a study the rising number of cloud-specific security attacks are likely to propel the demand for cloud security systems to 20 percent CAGR over the next four years. Adoption of cloud computing services has risen and so have the security risks associated with them. Accordi...
It is a sad but very real truth that many, dare I say most, IT professionals consider alerts to be the bane of their existence. After all, they’re annoying, noisy, mostly useless and frequently false. Thus, we IT professionals who specialize in IT monitoring are likely well acquainted ...
If we are involved in a cyber-war, where are the frontlines? What are the defenses that will work? Much of the efforts done so far in cybersecurity are nothing more than building an ineffective Maginot Line for cyber-defenses. Should we be spending more time (and money) in figuring ou...
Software as a Service (SaaS) is a model that has become a popular choice for deploying enterprise applications, delivering efficiencies and value to organizations in many ways. The benefits SaaS solutions deliver include not only avoiding the major resource drain and licensing costs as...
Currently, the preferred method of data protection of cloud giants, such as Google, is to replicate the data across different locations (i.e., data centers), rather than performing a true back up. This is done because a true back up seems logistically too complicated given the amount o...