Welcome!


Security & Cloud Computing

In a previous blog on Cloud Services Brokerage (CSB), I promised to return briefly to the topic of CSB monetization. The term CSB can refer to both to the activity of brokering cloud services, or to the software application (or suite of applications) used to manage that activity. The ...
With the "API economy" dominating the headlines in 2013, it's no surprise that Parasoft saw a surge of interest in how to ensure API reliability, security, and performance. Here's a recap of the 13 most-accessed API Integrity resources from 2013... API Integrity: How Buggy Are Today's...
We live in a world that requires us to compete on our differential use of time and information, yet only a fraction of information workers today have access to the analytical capabilities they need to make better decisions. Now, with the advent of a new generation of embedded business ...
It’s been a great 2013. Out of the global $1.2 trillion dollars’ worth of business conducted online in 2013 across the globe, SOASTA is trusted with protecting 10% of that figure – or $150 billion. Based on the hundreds of brands SOASTA worked with this year and listened to the challen...
Many news organizations including The Washington Post are reporting that the latest documents leaked by former NSA contractor turned whistleblower Edward Snowden show the NSA is in the early stages of working to build a quantum computer that could possibly crack most types of encryptio...
Recently large numbers of consumers in the US were understandably upset and angry when online purchases that they made in the days just prior to Christmas were not delivered in time. Yet it was not so long ago that online (and traditional mail order) purchases almost always took a very...
Over the past few years, the cloud evolution has answered all questions on the cloud being the right strategy. The key challenge that remains now is leveraging cloud capabilities and features in such a way that they can be used to innovate as well as solve business problems. If we rela...
As the significant benefits of SaaS and hybrid cloud services become more evident, it’s no surprise that organizations are moving more mission-critical applications – e.g., email, VoIP, online meetings, document storage/collaboration, etc., – to the cloud. This is different than CRM ap...
It has been some year in the world of Cloud and Cloud Storage in particular. We witnessed the demise of Nirvanix, as well as the revelations of Edward Snowdon outlining the surveillance of the PRISM surveillance program and the alleged collusion with major US Service providers. Amidst...
Computer security has become much harder to manage in recent years, and this is due to the fact that attackers continuously come up with new and more effective ways to attack our systems. As attackers become increasingly sophisticated we as security professionals must ensure that they ...
As regulatory oversight across the financial landscape continues to drive greater transparency and stricter penalties, outsourcing to the private cloud has become an integral resource for hedge fund and private equity managers. Cloud infrastructure services are now synonymous with incr...
Enterprises are seeing a great potential in cloud-based services. However, security is a primary concern that keeps enterprise from harnessing the full potential. Identity management is one of the most important aspects of security. There is always an authentication required in an appl...
The medical needs of developing countries are staggering and come in many shapes and sizes. The trouble is the real issues can only be understood once an individual or organization gets involved. About 10 years ago, our organization was routinely shipping medical supplies to hard-to-re...
Like millions of other Americans, I learned the other night about the massive data breach at Target. The Washington Post is reporting that sensitive details on over 40 million credit and debit cards were exposed. While the information associated with the crime is still coming out, the ...
One key element that is often missing in the avid discussions on what’s keeping more enterprises out of the cloud is a common recognition that storage in the cloud is simply not what it should be. It may surprise you, but to a large degree the solution to some of the cloud’s biggest co...
With the end of the year buzz around predictions, it's hard not to join in the conversation. Our CenturyLink Cloud leadership team came together for a few predictions for the year head – and to show we are keepin' it real, we scored last year's predictions as well. 1. Enterprise-buye...
In light of the recent NSA snooping scandal via their PRISM program regarding private cloud computing security, many people are left wondering if their sensitive data is actually secure. In fact, the statistics points to this startling fact: businesses and individuals alike have been s...
When we set out to build the PerspecSys Cloud Data Control Gateway, we faced an important design decision: would the market prefer an “All-in-One” or a “Best-of-Breed” Cloud Security Broker? In the “All-in-One” camp, IT professionals have come to learn that the bundled modules from a ...
Now that Big Data has become a household name, 2014 will be the year companies demand solid proof that data can help their decision-making and their bottom line. As the entire web becomes a seamlessly connected data warehouse, I predict that organizations will have the power at their f...
In my last post, we learned that services are only like products if you are willing to oversimplify them. And if you oversimplify them, you can miss out on business opportunities. Services (actions supported by things) differ in several important ways from products (things supported b...
In a recent IDG News survey, high-ranking IT executives in North America and Europe were asked about the effect the NSA snooping practices have had on their cloud computing strategy. Despite the furor over the NSA, these leaders are still committed to the cloud. The Cliff's notes: In...
SecuritySolutionsWatch.com: Thank you for joining us today, Bryan. If you wouldn’t mind, please tell us a little bit about your background and your role at HP. Bryan Coapstick: As the Director of Mobile Innovation, I am responsible for ensuring that HP’s mobility initiatives successfu...
Explores three ways to help development teams bear the burden of security: use pen test results to harden the application, leverage service virtualization for security scenarios, & adopt policy-driven development to help engineers understand and satisfy management’s security expectatio...
We discussed my belief that the nines (99.99…%) are more marketing than the real deal today - What do you think? The market and tools used to measure your uptime immature or do not really exist. The concept of availability in the cloud is determined by the level of responsibility and l...
Disaster Recovery (DR) has typically only been used by organizations for applications deemed to be mission critical. This was because organizations didn’t want to incur the expense associated with DR for less important applications. Today, because of cloud computing, many organizations...
For some organizations, cloud computing can be a hard sell, even before you come to the question of how to handle cloud-computing security. Public cloud, private cloud, hybrid cloud, encryption, tokenization, data residency, privacy regulations – all are factors involved and the percei...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. Engineers are extremely well poised to perform tasks critical for securing the application—provided that certain key obstacles are overcome. Before the move to the ...
Growing trends such as BYOD will fuel the move to more pervasive use of identity and access management as a service, driven by the need for pervasive access and management and broader security concerns. Business trends like bring your own device (BYOD) are forcing organizations to saf...
Identity Management (IDaaS) & Access Mgmt (SSO) solve similar but separate issues, but both serve as a cornerstone of an integrated security initiative. One of the biggest misconceptions in cloud security is the perception that identity management (IDaaS) and access management (SSO) a...
Many technologies have made their presence felt this year and continue to excite us with the promises they hold for the future. Cloud computing has now reached a stage where businesses are seriously experimenting and are starting to reap the transformational benefits it can deliver. If...
As we move closer toward everything-as- a-service (XaaS), the title “Internet of Agents” seems to fit what is really happening. Agents are systems and devices that sense what is going on, and they exchange information with and act on behalf of other agents and people in ways that ultim...
There is a lot of confusion and hype about the cloud and SaaS (Software as a Service), and at Corent we experience it on a regular basis. One of the things I’ve been seeing and hearing about is the concept of a marketplace of cloud applications. I’ve observed that applications sold thi...
Cloud this and cloud that are on the lips of every IT professional. Beyond being an overhyped buzzword, cloud computing is a technology that’s innovating the way that many businesses, from startups to enterprises, handle their IT needs. Whether it’s specific applications or a complete ...
The digital age has forced a kind of dependency never before seen, a dependency on our inbox. The mere thought of losing these emails is inconceivable where the thought of it leaves us with a sense of panic, one similar to losing our credit cards or house key. Unfortunately, the potent...
Security-as-a-service provides the necessary ingredient to transform continuous monitoring from compliance mandate to best practice: real time monitoring. Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I l...
The adoption of cloud storage technology for a broad range of consumer and business applications is transforming the storage landscape by transitioning away from traditional disk arrays to object-based storage systems that have the scalability, availability, resiliency and accessibilit...
Tests are an investment in the quality of any given system. There’s always a cost to build, run, and maintain each test in terms of time and resources. There’s also a great deal of value to be extracted from running the right test at the right time. It’s important to remember that for ...
In a previous blog we introduced the topic of cloud-as-it-is versus cloud as-we’d like-it-to-be. The cloud services broker (CSB) business model is gaining momentum as one way to turn the cloud into as-we’d-like-it-to-be. CSB is a term used for the activity of brokerage and also for the...
After years of talking to people inside and outside of my company about the benefits of cloud computing, I'm truly convinced that the most important benefit is not cost reduction or the ability to have new servers up and running in a few minutes. Of course those are great capabilities ...
It is hard to believe that there was a time when “the cloud” didn’t exist. Then, maybe 50 years ago, a lot of cloud-like things started to happen, such as remote computing, networked computing, resource sharing, virtual networks, and then, eventually, the Internet. But it still wasn’t ...