Welcome!


Latest Articles from Web Security Journal
The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cl...
Cloud computing security can be a conundrum. The point of using the public cloud is to outsource certain infrastructure and application needs to third party providers, after all. How can you secure your data once it leaves your perimeter and your control? As puzzling as it may seem, th...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, Davi Ottenheimer, EMC Senior Director of Trust, will review hands-on lessons with IoT devices...
There has been a lot of media attention on Heartbleed and as always that means a lot of bizarre and often conflicting advice. I sat down (for a very long time) to find the truth of the matter and bring it together in one single article for those involved in enterprise mobility. "The ...
VASCO Data Security International, Inc., has announced on Tuesday that it will release its Q1 2014 results on Thursday, April 24th. On April 24, at 10.00 am EDT/16.00 CET, VASCO will hold a conference call, which will be streamed on the VASCO website. Mr. T. Kendall Hunt, Chairman an...
While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security bre...
SOASTA on Tuesday announced the company has expanded its award-winning mobile functional test automation solution, TouchTest, to include local test labs of Apple iOS and Google Android smart phones and tablets. The TouchTest Private Device Cloud is a simple to manage, affordable intern...
There are things we tend to take for granted in our everyday lives. We have certain expectations that don’t even have to be spoken, they’re just a given. If you walk into a room and turn on the light switch, the lights will go on, it’s assumed. If you turn the water faucet on, water wi...
SYS-CON Events announced today that BUMI, a premium managed service provider specializing in data backup and recovery, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Manhattan-based ...
The selfie that changed the world, or at least Twitter, has been in the news for the past month. On March 2, 2014, the infamous Oscar selfie of Ellen and her celebrity friends broke a record of 2 million retweets before midnight the same night. That record was previously set by Preside...
Chief Security Officers (CSO), CIOs and IT Directors are all concerned with providing a secure environment from which their business can innovate and customers can safely consume without the fear of Distributed Denial of Service attacks. To be successful in today's hyper-connected worl...
Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, as is the case with MSPs. In terms of the IT challenges,...
McAfee, part of Intel Security, on Wednesday outlined its strategy for enabling the secure Internet of Things. Utilizing McAfee’s history of securing the most demanding digital environments, McAfee is building and delivering future-focused security solutions that are essential to unlea...
Securing your data comes down to making both physical and virtual changes to your data center. From interior and exterior surveillance systems to software that detects system-level changes across remote and distributed locations, you must make use of any and all available strategies to...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization’s assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...
As organizations continue expanding their adoption of the public cloud, many IT and security professionals are beginning to see that they need improved cloud-monitoring and cloud-auditing capabilities. By cloud monitoring, I’m referring to the process of identifying cloud use within an...
The proliferation of cloud-based applications for the enterprise grows each day, and more and more professionals have grown dependent on these apps as the consumerization of IT flourishes in today’s mobile enterprise. With the consumerization of IT, employees have become their own IT e...
Identities are everywhere today. Much more than just providing access and auditing for on-premises applications and corporate desktops, organizations are now tasked with provisioning, managing and securing identities for applications running on-premises, in the cloud and on mobile devi...
Traditional methods of software development went over the waterfall in a barrel and smashed on the rocks below. The Agile Manifesto was written more than a decade ago. Agile adoption has worked wonders for software development. New products leap from concept to market faster than ever ...
Few companies are enjoying a better run of news right now than Cloudera. In mid-March the big data bell cow announced $160 million in funding led by T. Rowe Price. Less than two weeks later, Intel’s mega investment of $740 million is still a popular topic around our company’s water coo...
VASCO Data Security International, Inc., offers a native authentication integration solution for MYDIGIPASS.COM that allows application developers to protect their end users' online identity. In November 2013, VASCO launched DIGIPASS for Application Perimeter Protection SDK (DIGIPASS ...
The investment comes from Nexus Venture Partners and Intel Capital, and joins previous investors Andreessen Horowitz and Sierra Ventures. “The cloud has fundamentally improved how people access and use infrastructure. But developing cloud based applications is still a lengthy, expensi...
In light of the recent NSA snooping scandal via their PRISM program regarding private cloud computing security, many people are left wondering if their sensitive data is actually secure. In fact, the statistics points to this startling fact: businesses and individuals alike have been s...
Gigamon® announced on Tuesday the Defense Information Systems Agency (DISA) has selected its GigaVUE-HD4, part of its flagship H Series line of solutions, as part of the Joint Regional Security Stack (JRSS), a component of the Department of Defense's (DOD) Joint Information Environment...
While at the RSA Conference this past year I was amazed at the mindshare and enthusiasm that the security industry was giving to DevOps. It seemed that security pros were eager to flock and embrace DevOps. This got me to thinking and I asked my friend Gene Kim about it. Gene said DevOp...
Application logs contain a massive repository of events and come in many different formats. They can have valuable information, but gaining useful insight can be difficult without the assistance of machine learning to help reveal critical problems. Transaction logs can contain gigabyt...
Enterprise organizations are looking for service providers to be a trusted partner with them throughout the entire transition through steady state process. The key for cloud providers is to develop ongoing relationships with their customers using hands-on engagement processes from begi...
Cobbling together point solutions provides tools, but doesn't promote the key collaborative intelligence integrated cloud-based unified security offers. Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the ...
Businesses have IT because apps deliver value to their customers. This can be direct value - a user-facing app. Or it can be indirect - an internal app for managing sales, marketing, or even HR transactions. Either way, the idea is that the app will make the business more efficient and...
As "applications" continue to morph into what we once might have called "mashups" but no longer do because, well, SOA is officially dead, dontcha know, it is increasingly important for a variety of constituents within organizations - from business stakeholders to application owners to ...
What do you look for when you choose a Web hosting provider? These days, it seems difficult to compare the differences between each service, whether you’re talking about supported languages, databases or bandwidth. You might be tempted to pick the cheapest provider and plan in hopes of...
Companies are moving forward with cloud deployments at a rapid rate, according to Hosting and Cloud Go Mainstream: 2014, a Microsoft Corp.-commissioned study conducted by 451 Research LLC. The new study showed that more than 45 percent of organizations surveyed are beyond the pilot pha...
Fujitsu RunMyProcess and MongoDB extend their existing collaboration to deliver seamless integration for cloud solutions to joint customers. More than 350 companies around the world deploy Fujitsu RunMyProcess-based workflow applications that integrate MongoDB. Fujitsu RunMyProcess ...
Given the mountains of data now floating around, it is perhaps inevitable that the very function of data analytics is seen as somehow intrusive. There’s a constant glut of reports, columns and other stories bemoaning the lack of data privacy – and at times, they’re entirely justified. ...
There’s been plenty written and predicted about the future of cloud and Software-as-a-Service, and it’s hard to argue with its benefits – for both organizations and users. If our cloud-based future is to come true though, we must pay closer attention to the service levels users are get...
Virtualized and private cloud infrastructures are all about sharing resources – compute, storage and network. Optimizing these environments comes down to the ability to properly balance capacity supply and application demand. In practical terms, this means allocating the right amount o...
Banks face a difficult tug-of-war every day. Consumers demand innovative new services – regulators demand security, compliance and soundness of all offerings. How can a bank resist being pulled in every direction and find a middle ground? Banks can look to startup technology companies...
Software is increasingly critical to an organization's competitiveness, but the applications being developed consistently meet business stakeholder expectations only 17% of the time. What's the problem...and what's the secret to ensuring that expectations are met?
A recent press report quoted unnamed US intelligence sources saying Russia had no intention of invading the Ukraine. The appraisal became the subject of considerable debate when Russian President Vladimir Putin ordered his nation's military into Ukraine's Crimea region. Follow-on media...
In my last blog, I discussed how today’s Internet is vastly different than the Internet envisioned at the start of the net neutrality debate. As promised, I’d now like to get into some fictional examples that paint the picture of why this is such a polarizing topic for so many. Exampl...