Welcome!


Latest Articles from Web Security Journal
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...
SYS-CON Events, Inc. named Cisco "Gold Sponsor" of upcoming Cloud Expo, co-located with 3rd International Internet of @ThingsExpo, the largest IoT event in the world. 15th International Cloud Expo will take place November 4-6, 2014 at the Santa Clara Convention Center in Santa Clara, C...
This one-hour webinar will cover the core benefits and features of up.time, including how up.time proactively monitors, alerts and reports on the performance, availability, and capacity of all physical servers, virtual machines, network devices, applications, and services. We’ll take y...
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although f...
In a Feb 2014 survey, 94 percent of organizations surveyed reported running applications or experimenting with infrastructure-as-a-service[1]. According to research firm Nasumi, there is over one exabyte currently stored in the cloud. An exabyte is over a billion GB[2]. Considering the...
A recent Inc.com article claimed that the percentage of U.S. small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent (l). This forecast was gleaned from a just released Emergent Research and Intuit study. Th...
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting eve...
Chris Matthieu is Co-Founder & CTO at Octoblu, Inc. He has two decades of telecom and web experience. He launched his Teleku cloud communications-as-a-service platform at eComm in 2010 which was acquired by Voxeo. Next he built an opensource Node.JS PaaS called Nodester which was acqui...
Security professionals are constantly negotiating the tension of balancing ease-of-use with data security. Savvy security professionals know that their users will often choose a less secure technology that makes getting things done easier over a more secure technology that makes gettin...
You can't truly accelerate the SDLC without a dependable continuous testing process. Evolving from automated to continuous testing requires on-demand access to a complete, realistic test environment. Yet, such access can be extremely difficult to achieve with today's increasingly compl...
Recent high profile security breaches at major online websites tell us static passwords are not the answer. Even recent SMS security additions to consumer websites do little to address the issue. Fortunately, a more secure authentication system is available for consumer websites that ...
IBM on Monday announced it has acquired the business operations of Lighthouse Security Group, LLC, a premier cloud computing security services provider. Lighthouse Security Group's Gateway platform protects identity and data in an increasingly complex IT environment where more company ...
Explosive technological advancement has created a molten landscape of disruption, reinvention and creation. New services arrive and become versatile building blocks for new ideas, products and businesses. As intuitive and intelligent technology relieves us of administrative burdens, we...
Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIOs conquering these types of challenges? Find...
Evelyn de Souza is a cloud compliance and data privacy strategy leader at Cisco responsible for championing solutions to address emerging industry trends. She is a strong proponent of building repeatable processes that enable organizations to sustain compliance while optimizing data se...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, to discuss how developers are extremely well-poised to perform tasks critical for securin...
Lantronix, Inc. (NASDAQ: LTRX), a leading global provider of smart IoT (Internet of Things) solutions, announced the worldwide availability of its new PremierWave® SE1000 -- a high performance, programmable, Ethernet-based System-on-Module (SOM) that enables hardware and software engin...
Security is critical to Internet of Things (IoT) adoption because we want to make sure we can trust the sensors, actuators, rules engines and other connected componentry we embed in every element of our existence. Bringing this down to earth is as easy as pointing out that people's sma...
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, ...
According to Gartner, Big Data refers to "high volume, high velocity, and/or high variety information assets” – and, this is the key – “that require new forms of processing to enable enhanced decision making, insight discovery and process optimization." While Big Data may seem like an ...
Encryption is a key element of a complete security strategy. The 2013 Global Encryption Trends Study shows a steady increase in the use of encryption solutions over the past nine years. Thirty-five percent of organizations now have an encryption strategy applied consistently across the...
This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropria...
It is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. Andi Mann from CA Technologies recently pointed out that, at every turn, customers are interacting more and more with businesses through appli...
Ramesh Kesanupalli is the Founder of Nok Nok Labs and a Founding Member of FIDO Alliance. SecuritySolutionsWatch.com: Thank you for joining us today, Ramesh. It’s an honor to speak with the founder of Nok Nok Labs and the visionary behind the creation of the FIDO Alliance. Before we d...
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts ex...
Vormetric on Tuesday announced that Rackspace Hosting has joined the Cloud Partner program, and will be offering encryption and key management services to customers via Vormetric's Transparent Encryption solution. Vormetric's Transparent Encryption combines the performance, flexibility...
up.time, from uptime software, monitors performance, availability and capacity across all servers, virtual machines, applications, IT services, and the network. Proactively find IT system performance issues before they happen, report on total capacity, easily identify troublemakers, tr...
Rivetz Corp. has been named as one of the AlwaysOn Global 100 Companies to Watch, congratulations! Please tell us, what is Rivetz all about and what do you do? Steven Sprague: Rivetz is leveraging the trusted execution technologies in new devices powered by Intel and ARM to protect th...
Ransomware is the latest example of the increasingly sophisticated and damaging inventions of hackers. Individuals and organizations of all sizes are finding that their data has been locked down or encrypted until a ransom is paid. One program, CryptoLocker, infected more than 300,000 ...
The cloud has hit the mainstream. Businesses in the United States currently spend more than $13 billion on cloud computing and managed hosting services, and Gartner projects that by 2015, end-user spending on cloud services could be more than $180 billion worldwide. It is estimated tha...
Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority ...
The threats facing network operators all over the world, spanning service providers, enterprises, cloud and hosting providers and mobile operators alike, are by no means stalling. While optimism is always the name of the game, we know all too well in security that trying to keep pace w...
Incident response involves addressing and managing the security events on a network and the execution of proper responses to those events. The end game is to limit the damage and reduce recovery time and costs. This is achieved with the implementation of an incident response plan tha...
If your organization’s got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them. One of the most worrying threats of late, especially when it comes to cloud data security, is government spy...
The online world has become a dangerous place. According to a survey, 90 percent of all companies fell victim to a security breach in the last twelve months. Hacking and advanced persistent threats (APTs) have rendered the two-factor authentication token, now over 20 years old, essenti...
I write and speak often on the need to have a thoughtful Code Halo strategy in addition to your mobile and digital strategies. Code Halos is the term for the information that surrounds people, organizations, and devices. Many companies consider Code Halostrategies only for marketing, s...
How do we blaze a better path to a secure mobile future? How do we make today’s ubiquitous mobile devices as low risk as they are indispensable? As smartphones have become de rigueur in the global digital economy, users want them to do more work, and businesses want them to be more pr...
As we become more connected online, the old system of site-specific passwords and user identity are no longer equal to the task. We need to find new ways of providing identities and authorization.
Despite the hype and drama surrounding the HTTP 2.0 effort, the latest version of the ubiquitous HTTP protocol is not just a marketing term. It's a real, live IETF standard that is scheduled to "go live" in November (2014). And it changes everything. There are a lot of performanc...
Time compression, travel limits, and increasing complexity in every walk of professional life have driven web and video conferencing from new application to essential services – just like phone, FAX and email before it. This paper describes how OmniJoin™ cloud computing technology and ...