Welcome!


Latest Articles from Web Security Journal
This article explores how to detect fraud among online banking customers in real-time by running an ensemble of statistical and machine learning algorithms on a dataset of customer transactions and demographic data. The algorithms, namely Logistic Regression, Self-Organizing Maps and S...
VASCO Data Security International, Inc., announced it has sold its 200 millionth DIGIPASS authenticator. The milestone follows the company's recent announcement of record order intake in Q1 of 2014. "Global criminal hacking organizations pose a growing threat to our banking and enterp...
Anyone who has been involved with security knows there is a balance to providing both security and privacy and performance at the same time. Security is often blamed for performance woes, particularly when cryptography is involved. SSL and TLS have long addressed this balance by lev...
First and foremost you can’t have a successful software-defined model if your team still have a hardware-defined mentality. Change is inevitable and whether it's embraced or not it will happen. For experienced CIOs this is not the first time they've experienced this technological and c...
Considering most organisations have still not fully virtualized or moved towards a true Private Cloud model, SDDC is still in its infancy in terms of mainstream adoption and certainly won't be an overnight process. While typical early adopters are advancing quickly down the software-de...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in – unannounced and unnoticed. By the time these thieves get in, t...
SOASTA on Tuesday announced complete native app support with mPulse, its award-winning Real User Monitoring (RUM) solution, which now delivers the first and only multi-dimensional views of actual user behavior whether on mobile web, web or native mobile applications. Using the same adv...
In many industries, cloud computing is now vital to remaining competitive. The cloud typically offers superior flexibility, scalability, accessibility, and high availability, enabling businesses to grow more agile and responsive. Regulatory compliance concerns often make banks and othe...
In 2013, the total cost of natural disasters reached $192 billion, according to recent research from Impact Forecasting, a division of reinsurance company Aon Benfield, who conducts these reports each year. In 2012, Hurricane Sandy topped 2013’s most costly natural disaster. With dam...
Electronic signatures are an important component of any web application. They make it possible to keep business processes online even when a signature is required on a contract, form or application. If you are interested in learning how to quickly integrate e-signatures into your cloud...
The private cloud is misunderstood. At this stage, vendors can be forgiven for not having a firm idea of what the private cloud is and how it can uniquely improve their processes. Too many service providers have branded legacy technologies as "cloud-based," warping buyers' expectations...
CA Technologies on Tuesday unveiled CA Cloud Service Management, a mobile-ready, SaaS-based IT Service Management (ITSM) solution that delivers simplicity and speed across the enterprise. CA Cloud Service Management is designed with a unique ‘configure, don’t code’ approach that offer...
Last week's Joyent outage brought us thinking how many IT teams make the effort what is the meaningful downtime that will not have significant impact on their business. In this post I will not discuss this particular outage although it is a yet another good example for improving the IT...
We’ve distilled lessons learned from Snowden scandal and created 5 questions every CEO should be asking their CIO / CISO in order to avoid a catastrophic rogue insider event in the private sector both in using cloud as a vector of exfiltration as well as protecting their data stored in...
It’s no secret that doing nothing is often considered a safe bet. The psychology behind inaction is well understood, particularly in the case of IT — the path of least disruption is usually maintaining the status quo rather than trying something new, But once in a while, a decision ...
The promise of easy, rapid, and low-cost deployment is luring increasing numbers to the cloud. Is security the only remaining obstacle to total domination by the cloud? In his session at 14th Cloud Expo, John Gunn, VP of Corporate Communications for VASCO Data Security, will examine ...
As businesses look to unlock greater value out of their existing IT investments, they are increasingly re-evaluating their overall desktop strategy. A greater mobile workforce shifting usage models like BYOD and legacy infrastructure refresh cycles are all acting as catalysts in fuelin...
In their session at 14th Cloud Expo, Jeff Tegethoff, CEO of Appcore, and Krishna Subramanian, VP of Product Marketing, Cloud Platforms at Citrix, will take a closer look at how Citrix CloudPlatform enables the transformation of IT by enabling them to manage both traditional enterprise ...
Has Washington finally caught on to the cloud? As a "borderless technology," cloud computing is subject to the laws and regulations of many different countries – some more than others. The American legal and regulatory system has recently been paying more attention to cloud computing, ...
SYS-CON Events announced today that VASCO Data Security International, Inc., a global leader in authentication, digital signatures, and identity management, has been named “Bronze Sponsor” of SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Ja...
Electronic signatures are an important component of any web application. They make it possible to keep business processes online even when a signature is required on a contract, form or application. If you are interested in learning how to quickly integrate e-signatures into your clou...
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (1) system administrators who don’t need to see the data in the clear and (2)...
CiRBA Inc. on Tuesday announced that three members of its management team will be speaking at four industry events over the next two weeks: Gartner Infrastructure and Operations Management Events in Berlin and Orlando, Cloud Expo in New York and the J.P. Morgan 4th Annual Cloud & Beyon...
Mr. George Romas is the Technical Director of the Cybersecurity Solutions Group at HP Enterprise Services, U.S. Public Sector. SecuritySolutionsWatch.com: Thank you for joining us again today, George. It's been roughly one year since our first meeting when we spoke about building sec...
Like electricity, compute resources can readily scale up and burst, and workloads can easily operate geographically. Storage however is more like water, where moving large amounts of data can be very challenging, especially over distance. In his session at 14th Cloud Expo, Joe Arnold...
IBM on Monday announced that businesses of all sizes – from start-ups to large enterprises - are rapidly adopting IBM Bluemix to develop software in the cloud with greater speed, security and quality. IBM also announced additional services on Bluemix, which will move from beta testin...
A global asset management company needed to accelerate testing for parallel and Agile development. Learn how service virtualization and API test automation resulted in a 20X reduction in testing time. Ignis Asset Management is a global asset management company, headquartered in London...
“While cost has traditionally been a foundational benefit of the cloud, we believe that other factors can play a more important part in defining the cloud of tomorrow,” said Todd Gleason, Vice President of Technology at FireHost, in this exclusive Q&A with Cloud Expo conference chairs ...
With large security breaches constantly in the news, businesses are rightly concerned about security. Thankfully, big data and machine learning can work together to help. They read like a list of horror stories for businesses big and small alike. Sony’s PlayStation Network is hacked t...
Until this week the biggest anxiety when dealing with eBay has likely been fretting over a negative rating, concerns about slow shipping or a delayed refund. Then suddenly yesterday the media jumped all over the story that eBay had been hacked and users need to change their passwords. ...
Today, more than ever, end user experience is at the forefront of every CTO and CMO’s mind as more statistics show websites and applications are easily abandoned if users are not satisfied with their experience. But what makes a good experience? First we need to ask ourselves what is ...
Over the last months organizations' employees have embraced the BYOD practices, CIOs are concerned about security issues, lawyers have given their advice, and MDM vendors have taken their message to the companies. But while CIOs try to come up with the best solution to police this prac...
This report details findings from Forrester Research, Inc. about how the nine most significant solution providers for privileged identity management meet the 18-criteria evaluation and where they stand in relation to each other to help security and risk (S&R) professionals select the r...
The MAS guidelines for Internet Banking and Technology Risk Management (TRM), issued in June 2013, identify security and risk management issues in a comprehensive manner, covering everything from identity assurance and access controls to accountability and audit. This white paper detai...
Distrix, ein führender Entwickler von softwaredefinierten WAN-Produkten, die einfache, sichere und belastbare Netzwerke ermöglichen, gab heute die Änderung seines Namens von Spark Integration Technologies zu Distrix bekannt. Der neue Name spiegelt den Erfolg des Unternehmens beim Einsa...
When we think about what’s next, our frame of reference is almost universally anchored to what we are doing now. We look at how things are, and then we aim our sights forward. In some cases, we might make incremental moves ahead; in other cases, maybe we look for improvement by orders ...
SOASTA on Tuesday announced that it has entered into a technology and distribution partnership agreement with CA Technologies. The partnership will integrate SOASTA's Cloud based Web testing solution, CloudTest with CA Service Virtualization and CA LISA Test software suites. The soluti...
Risk-conscious enterprises across the globe have been reluctant to embrace the public cloud model. For many, compliance requirements are the source of the reluctance. For others, concerns about ceding control of their data to a cloud service provider, without the cloud service provider...
Reduce networking costs! Increase cyber security! Deploy applications faster! Add connectivity to our new office now! We’re under attack now – drop everything and jump on it now! How does IT management keep up with these demands? On top of that challenge, the promises of the Internet o...
Last month, the Information Security Forum released their annual prediction of the top 10 information security threats they foresee for the next two years – through 2016. While I found the entire list insightful, half of the list resonated strongly with me as someone who is working wit...