Welcome!


From the Blogosphere

Web application security. Everyone knows how important it is (and if they don't, they should) and yet the complexity of managing services that provide it often result in, shall we say, less than holistic coverage of applications. At least that seems to be the case given some rather dis...
SYS-CON Events announced today that WHOA.com, an ISO 27001 Certified secure cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. WHOA.com is a le...
In recent years, the US government has become a leading advocate for continuous monitoring of security threats and vulnerabilities. But how effectively are departments and agencies in implementing these programs? And how do we measure success? Moving Towards Continuous Monitoring Tho...
For most C-level executives (and most of the rest of the planet too), the concept of ‘risk’ is generally first perceived as a negative. The notion of risk as a business positive (or a ‘business enabler’ even) is fanciful, flaky and fraught with fallibility – isn’t it? This proposition...
What keeps an IT manager up at night? Ghosts, goblins and ghouls? Guess again. It takes more than a few measly monsters to cause a lack of sleep in today’s IT department. IT used to exist primarily to monitor and maintain systems, protect against data breaches and malware attacks, an...
Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purp...
This book does a great job of covering all the security topics you need to know about to work successfully in a decent size enterprise. This book is a beast!!! It is 100% textbook, with a lot of exercises at the end of the chapters. If your class uses this book, get ready for a fire h...
One of the most difficult things to do today is to identify a legitimate user. Part of the problem is that the definition of a legitimate users depends greatly on the application. Your public facing website, for example, may loosely define legitimate as "can open a TCP connection and s...
Keeping data from getting out into the wild or being damaged by cyber attackers is what keeps CISOs, the executive team and boards of directors up at night. To protect organizations, cybersecurity needs to be automated and real-time, it needs to learn contextually like we do and it nee...
If you have a Network Operations Center (or NOC, as the kids call it), you have a skilled set of eyes monitoring your system and alerting your engineers when things go wrong. (If you have something like a NOC, such as a first tier team that processes tickets, we’re looking at you, too)...
With recent high profile data breaches companies should ensure they have the five following file governance policies in place in their company to secure their file assets. Ensure that an Identity Management policy is in-place, is clear, and if one exists that it is validated and check...
I’ve been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on a multi-week European vacation. After...
At the recent Mobile World Congress 2015 (MWC) in Barcelona, we heard operators and vendors discuss the future of mobile network connectivity around the globe. While we look forward to new updates on this subject (and updates from these major players), the conference was also ripe with...
Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat and risk analysis. Security team efforts haven’t been integrated, or if they are integrated, it is only through rudimentary tech...
After an application crash, we know how important it is to figure out what went wrong and plan so it doesn’t happen again. In this post, we’ll look at some common causes of major website crashes, along with preventive measures you can take to avoid them in the future. With this extra k...
At some point in the near future, our alarm clock will ring when the biometric scanner monitoring our sleep indicates we have achieved optimum rest. Our clock will connect with the coffee maker, and a steaming cup of brew will be waiting, while the lighting system in our home gradually...
A virtual Chief Information Security Officer (CISO) can be an invaluable asset to your company. The virtual CISO provides your business with a person that will be in charge of the electronic security aspects of your company. You will have an executive in place that will not only overse...
Health Shared Services BC in Vancouver implemented one of the healthcare industry’s first Service Asset and Configuration Management Systems to help them optimize performance of their IT systems and applications. We'll explore how HSSBC has successfully implemented one of the healthca...
A new report sponsored by CA Technologies examines how IT and business leaders aim to sync the security and mobile user experience. CA Technologies’ latest research determines that though top concerns of IT Security practices include the elimination of breaches, data protection and ide...
This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing may be the biggest and most overhyped term in Government information technology today. It is also the most discussed topic in agency s...
The GoDaddy customer breaches didn’t have to happen and don’t have to happen to you. Cisco threat researchers recently reported a dramatic uptick in Angler Exploit Kit-based attacks connected to compromised GoDaddy domain registry accounts. GoDaddy, which manages nearly a third of al...
Like DDoS attacks, aggressive screen scraping can create huge spikes in traffic, cause brownouts, and even take you down for extended periods of time. Web scraping doesn’t make the headlines and most people aren’t aware of the damage it can cause to your website’s success. Thieves an...
Application troubleshooting survey reveals integrated tools lead to significant response time improvements Thirty-seven percent of developers rely on user notifications to identify issues, yet integrated tools reduce customer impact by 62%. See the Infographic below or download the c...
When it comes to cybersecurity initiatives, the U.S. government has not taken a back seat. Perhaps owning to the number of high profile breaches and damaging insider attacks that have occurred in the past few years, this White House in particular has been very vocal about the federal g...
A discussion from The Open Group San Diego 2015 examining the both need and outlook for Cybersecurity standards among supply chains. The latest discussion, examining the both need and outlook for Cybersecurity standards among supply chains, is moderated by Dave Lounsbury, Chief Techno...
If you’ve ever watched a submarine movie like The Hunt for Red October, Crimson Tide, or U-571 you’ll notice that these scripts always include running a surprise drill soon after getting underway from port. When a submarine submerges after a long port call one of the first things a cap...
Where were you on February 3, 2015 at 3:40 p.m. PST? Snowed in? Desperately trying to refresh Netflix? If so, you weren’t alone. It turns out even best and biggest companies experience failure from time to time. Despite the success of their Chaos Monkey approach to operations, the Inte...
Some times our customers would prefer to use SSH to connect from the server our XL Deploy is running on and their targets. By default Windows does not support SSH, but XebiaLabs’ tools do support SSH on windows. The tricky part is that most implementations of SSH for Windows also req...
FedRAMP defines the requirements for cloud service providers’ security controls, including vulnerability scanning, incident monitoring, logging, and reporting. CSPs in use at federal agencies or in acquisition must meet the cloud computing requirements defined by FedRAMP. Whether o...
Over the last several weeks, we’ve examined the risks of using the public cloud in the enterprise workplace. From unauthorized file access to regulatory noncompliance, the potential scenarios vary from dire to more dire – and it’s up to decision makers to take control of their organiza...
We continue to see an increasing trend in cyber-attacks in line with the growth of new technologies, and enterprises have to protect themselves. It is critical for enterprises to devise their own measures to protect against cyber-attacks because any tolerance on this front is more than...
Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adop...
As we kick off 2015, I predict that this will go down in history as the year of the Threat Intelligence Platform (TIP). We say goodbye to the year of the advanced persistent threat (APT) in 2014, just as this time last year we waved adieu to mobile device management (MDM). We’ve seen ...
Tunisie Electronique, a Tunisian IT services provider, improved their IT service management offerings and capabilities leveraging cloud-based services. To learn more about better IT control and efficiency using the latest ITSM tools and services, we are joined by Fadoua Ouerdiane, IT ...
​I had the chance to sit down with Lee Slaughter, Skytap's Manager of Information Security, to discuss security in the cloud, the efforts that make up a thorough due diligence when choosing a cloud provider, and how to keep up with external and internal threats to your business. Noel:...
The benefits of cloud billing can be irresistible. Always-on availability, flexibility, elastic scalability, low cost, global reach. But with high-profile security breaches from the likes of Target, Sony and health insurer Anthem, it’s understandable that thinking about turning your bi...
Cloud has become part of the enterprise landscape with nearly 90 percent of businesses having adopted cloud-based apps and services. However, organizations need to make sure that these cloud solutions don’t compromise the hard-won security policies that govern the rest of the informati...
At the end of the year, WhiteHat Security posted an interesting blog titled, "The Parabola of Reported WebAppSec Vulnerabilities" in which a downward trend in web application vulnerabilities (as collected by the folks at Risk Based Security's VulnDB) was noted beginning in 2008 after h...
Cloud computing offerings are almost overwhelming at this point. There are so many different services and service providers competing for your business that it can be hard to know what’s really best for you. Understanding what kinds of solutions work for your business means getting a h...
When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact performance. Organizations need to realize that the complexity and fear of access control is a...