Welcome!


From the Blogosphere

Without a doubt, we’re at a tipping point when it comes to security and the Internet of Things (IoT). Recently, security flaws have been exposed in consumer products, including children’s toys, baby monitors, cars, and pacemakers. In late October 2016, Dyn®, an internet infrastructure ...
In its 2017 State of Malware Report, Malwarebytes Labs recorded a 267 percent increase in ransomware between January 2016 and November 2016, with over 400 different variants in total. The report noted that while malware authors mostly relied on ransomware to make the bulk of their reve...
"Suddenly a lot of companies started focusing on producing services in the cloud. I like to call it Cloud Native - everything is built for the cloud. The main concept there is to enable developers to work fast," explained Ben Bernstein, CEO & Co-Founder of Twistlock, in this SYS-CON.tv...
The margins of cloud products like virtual machines are still in the 50% range. In essence, price drops are going to be a regular feature for the foreseeable future. This begets the question - are hosted solutions becoming irrelevant today? Boston-based market research firm, 451 Resear...
Join us at Cloud Expo June 6-8 to find out how to securely connect your cloud app to any cloud or on-premises data source – without complex firewall changes. More users are demanding access to on-premises data from their cloud applications. It’s no longer a “nice-to-have” but an import...
Cloud computing is more than servers and storage. In a crisis situation it can actually be a lifesaver. BlackBerry, in fact, has just become the first cloud-based crisis communication service to receive a Federal Risk and Authorization Management Program (FedRAMP) authorization from th...
In the age of global cyberattacks, corporate enterprises and government agencies that have some type of cloud-based network solutions should be looking at a strategic design focus that guarantees a very secure intelligent infrastructure unsusceptible to cyberattacks or natural disaster...
Every company wants to see their company getting press and media attention. Unless it is due to a hacker and a security breach. Every few weeks you see in the media stories of companies who were hacked. Getting a new credit card every few months because the data was hacked has been rou...
Keeping your enterprise data safe and secure is more important now than it ever has been. IT has always been an ever-changing industry, but in recent years, it has been changing more and more quickly. Now, thanks to the cloud, big data, and mobile devices all expanding at once, it may ...
The cloud provides two major advantages to load and performance procedures that help testing teams better model realistic behavior: instant infrastructure and geographic location. Cloud-based load testing also lowers the total cost of ownership, increases flexibility and allows testers...
According to a recent Gartner study, by 2020, it will be unlikelythat any enterprise will have a “no cloud” policy, and hybrid will be the most common use of the cloud. While the benefits of leveraging public cloud infrastructures are well understood, the desire to keep critical worklo...
A key challenge that retailers face today is the difficulty of accurately judging where they are on the digital maturity curve relative to their competitors. There appears to be little expertise in making this assessment; for example, 79% of digital leaders don’t know they are ranked a...
Talk of IT disasters can spark equal amounts of fear of them happening to us, and gratitude that the big one hasn't happened to us yet. Network World offers some tips on what not to do when migrating to the cloud to avoid disasters-or, at the very least, grumbling users. They recommend...
Put yourself in the shoes of Captain Edward Smith of the RMS Titanic, seconds after the iceberg was reported to him and seconds (there were 37 of them, reportedly) before he reacted. In this critical timeframe – this brief space of time when the inevitability of disaster became clear –...
A Man in the Middle attack, or MITM, is a situation wherein a malicious entity can read/write data that is being transmitted between two or more systems (in most cases, between you and the website that you are surfing). MITMs are common in China, thanks to the “Great Cannon.” The “Gre...
In DevOps, those who can’t keep pace are often left behind. For many people leading DevOps initiatives over the past few years, this led to a painful choice of leaving security by the wayside. Many Waterfall-native approaches to security could not keep pace with their new DevOps-native...
Imagine a world where product owners, Development, QA, IT Operations, and Infosec work together, not only to help each other, but also to ensure that the overall organization succeeds. By working toward a common goal, they enable the fast flow of planned work into production (e.g., per...
The past decade has seen an increasing trend in employees using mobile devices like smartphones and tablets to aid in their work. This trend has fostered organizations to adopt practices like bring-your-own-device (BYOD) with hopes of improving employee productivity and efficiency. The...
Cloud is a lot more pervasive than one may have imagined and in this article, we will focus on the various ways in which cloud technology is making home security systems robust and impenetrable. The term ‘Internet of Things’ gets thrown around quite a lot when we talk about cloud techn...
These days attacks are becoming more sophisticated and more common. Mobile devices, cloud computing and the Internet of Things have increased the number of access points that must be secured. To complicate matters, CISOs are been directed to secure system without compromising the seaml...
There has never been a reasonable expectation of online privacy, and there never will be. Regardless of what you may have recently heard about joint resolutions or nullifications, nothing has changed. Internet Service Providers (ISPs) have always had the right to use your data as they ...
Software-defined is a concept that refers to the ability to control some or all of the functions of a system using software. The concept is sometimes incorrectly characterized as a buzzword or marketing jargon, when in fact it has a clear meaning that needs to be understood by organiza...
Everyone wants their device of choice right there next to them 24/7. To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on ...
Recent market analysis from Cisco demonstrates the torrid adoption of cloud-based services. By 2019, more than four-fifths of all data center traffic, 83 percent, will be based in the cloud (up from 65 percent today). Most of this action will be going to public cloud services, which wi...
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model, and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. In part two, we talked about...
You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil each othe...
Cloud computing is here to stay. The agility and scalability of the cloud model – as well as its ability to transform up-front capital expenditures into flexible operating expenditures – are too compelling to ignore. For CIOs in organizations of all sizes, the question is no longer wh...
Recently I had to design the backup infrastructure for cloud workloads for a client in order to ensure that we comply with the Business Continuity and Disaster Recovery standards they have set. However, following traditional IT practices in the cloud quite often poses certain challenge...
The origins of SAP GRC software goes back decades, but adoption has been slow. But with the rigor of modern compliance regimes like SOX, coupled with the sheer volume and complexity of online transactions, there’s been an accelerating movement away from document-centric review processe...
For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That’s one of the reasons executives often discover security breaches when an external researcher — or worse, a journalist — gets in touch to ask why hundreds of ...
From 2006 to 2011, Power Ventures operated a groundbreaking online communications, personal data management, and social networking aggregator hosted at the website www.power.com. Power offered registered users the capacity to access multiple online social networks (e.g., LinkedIn, Twit...
There is no more effective way to reduce your overall test environment spend than to migrate to cloud test environments and embrace testing and infrastructure automation. The nature of test environments is inherently temporary—you set up an environment, run through an automated test su...
Adoption and use of cloud-based software engineering platforms will accelerate in 2017. Teams have been working in the cloud for a few years now, but in 2017, the trend will gain far more momentum as senior engineering staff and service providers realize and document the benefits of cl...
vdiconImagine not having to carry around a laptop or be sitting in a cubicle to access your work desktop applications. Virtual desktop infrastructure (VDI) is appealing to many different constituencies because it combines the benefits of anywhere access with desktop support improvement...
In today’s globally connected world, data security breaches are bound to occur. This, in turn, increases the importance of digital forensic readiness, or the ability to access and trust computer log data in the identification of a breach and the determination of what datasets may have ...
When it comes to organizing and coordinating your data, you should start creating a simple plan today. Have you ever wondered how massive corporations achieve high levels of success and seem to be perfectly organized from the inside out? That’s because they have systems and structures ...
Ransomware attacks escalated dramatically in 2016. In fact, there was a 300 percent increase in ransomware attacks last year, according to the FBI, to an average of 4,000 attacks a day, up from 1,000 ransomware attacks a day in 2015. What’s more, organizations are targeted more frequen...
As software continues to pervade our lives, the security of that software continues to grow in importance. We need to keep private data private. We need to protect financial transactions and records. We need to protect online services from infiltration and attack. We can obtain this p...
After yet another cloud outage yesterday (see AWS’s S3 outage was so bad Amazon couldn’t get into its own dashboard to warn the world) the world (or at least its North American part) once again went crazy how dangerous the cloud is and how you should go build your own data ...
As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data cen...