Welcome!


Latest Articles from Web Security Journal
In a previous blog on Cloud Services Brokerage (CSB), I promised to return briefly to the topic of CSB monetization. The term CSB can refer to both to the activity of brokering cloud services, or to the software application (or suite of applications) used to manage that activity. The ...
With the "API economy" dominating the headlines in 2013, it's no surprise that Parasoft saw a surge of interest in how to ensure API reliability, security, and performance. Here's a recap of the 13 most-accessed API Integrity resources from 2013... API Integrity: How Buggy Are Today's...
LSI Corporation on Monday announced that LSI® Nytro™ flash accelerator cards have been selected as the PCIe® flash acceleration technology for Oracle’s next-generation Database Machine, Oracle Exadata X4. In addition, the companies have collaborated on bringing a new LSI Nytro technolo...
Savvy organizations, HP among them, are turning to preventing attacks, rather than just detecting them and remediating them. The high cost of unwanted intrusion and malware across corporate networks is well known. Less talked-about are the successful ways that organizations are thwart...
"Everybody is sharding because the data is getting bigger and bigger so there are just more ways to do it. The thing about sharding is you have to take Big Data and spread it across a lot of servers – that’s the most important thing," explained Cory Isaacson, CEO/CTO of CodeFutures Cor...
We live in a world that requires us to compete on our differential use of time and information, yet only a fraction of information workers today have access to the analytical capabilities they need to make better decisions. Now, with the advent of a new generation of embedded business ...
It’s been a great 2013. Out of the global $1.2 trillion dollars’ worth of business conducted online in 2013 across the globe, SOASTA is trusted with protecting 10% of that figure – or $150 billion. Based on the hundreds of brands SOASTA worked with this year and listened to the challen...
Many news organizations including The Washington Post are reporting that the latest documents leaked by former NSA contractor turned whistleblower Edward Snowden show the NSA is in the early stages of working to build a quantum computer that could possibly crack most types of encryptio...
Panzura has added new Secure Erase and Enterprise Antivirus Connector technologies in version 5.4.1.0 of its PZOS operating system for the Panzura Global Cloud Storage System. These new features increase security options beyond Panzura's FIPS 140-2 Level 3 encryption, which was announc...
Citrix announced on Wednesday that it has acquired Framehawk. The Framehawk solution, which optimizes the delivery of virtual desktops and applications to mobile devices, will be combined with HDX technology in the Citrix XenApp® and XenDesktop® products to deliver an unparalleled user...
Over the course of the past decade, there's been a lot of hype pertaining to the_ Internet of Things (IoT)_ and how China leads the U.S. in this technology -- yet many who are active on the Internet are still unaware of its existence. In its simplest form, IoT is an evolving wireless ...
RevChain Solutions, LLC (RCS), part of Windstream and a provider of enterprise carrier grade billing, account management and customer care solutions, announced on Tuesday that it has executed a three-year, $5 million extension for professional services and support with Empresa de Telec...
As web applications and cloud services continue to proliferate, identity theft, cyber fraud, cyber bullying, and simple misuse of confidential information online expand to chronic levels. Yet cloud providers are expected to ensure high security while maintaining a convenient user exper...
Recently large numbers of consumers in the US were understandably upset and angry when online purchases that they made in the days just prior to Christmas were not delivered in time. Yet it was not so long ago that online (and traditional mail order) purchases almost always took a very...
Over the past few years, the cloud evolution has answered all questions on the cloud being the right strategy. The key challenge that remains now is leveraging cloud capabilities and features in such a way that they can be used to innovate as well as solve business problems. If we rela...
CloudSigma on Monday announced that it has enhanced its solid-state drive (SSD) storage offering with highly-granular, affordable snapshot management technology to improve data protection and access in the cloud. Now, customers can seamlessly and cost-effectively incorporate enterprise...
Enterprises that rely heavily on fax, view regulatory compliance as a major business component. Non-compliance issues that arise from security breaches and other forms of information leakage often result in substantial regulatory penalties, both civil and criminal. As government regula...
That attackers are moving "up the stack", toward the application layer, should be no surprise. Increasingly, network layer attacks are a distraction; a means to engage security professionals attention while the real target - an application - is attacked. Even when this is not the case,...
"Testing is the last piece of the puzzle. What we have seen is speed – the need for acceleration in terms of software development – and once you start hitting speed you start hitting speed bumps and those speed bumps are quality," noted Wayne Ariola, Chief Strategy Officer at Parasoft,...
As the significant benefits of SaaS and hybrid cloud services become more evident, it’s no surprise that organizations are moving more mission-critical applications – e.g., email, VoIP, online meetings, document storage/collaboration, etc., – to the cloud. This is different than CRM ap...
It has been some year in the world of Cloud and Cloud Storage in particular. We witnessed the demise of Nirvanix, as well as the revelations of Edward Snowdon outlining the surveillance of the PRISM surveillance program and the alleged collusion with major US Service providers. Amidst...
"The entire market knew for a long time that to test a site at scale required a lot of hardware. SOASTA was founded a little before the cloud and when the cloud came that was the pivot point as that was exactly what the load testing market had been waiting for," explained Brad Johnson,...
2013 has been incredibly eventful for the cloud industry, mostly for making itself an eminent presence in the mainstream IT market. Businesses of all sizes have made their ways to the cloud, confirming my 2013 predictions. Government agencies worldwide take the cloud seriously, as demo...
Computer security has become much harder to manage in recent years, and this is due to the fact that attackers continuously come up with new and more effective ways to attack our systems. As attackers become increasingly sophisticated we as security professionals must ensure that they ...
ObserveIT has announced that it has raised $20 million from Bain Capital Ventures. Growing over 3,500% in the past five years, ObserveIT’s solution is used at more than 800 corporations in 70+ countries. ObserveIT will use the funding to expand U.S. headquarters and overall product dev...
"AccelOps provides analytics driven IT operations management for cloud, virtualize infrastructure, and client-server environments," explained Flint Brenton, president and CEO of AccelOps, in this SYS-CON.tv interview at the 13th International Cloud Expo®, held Nov 4–7, 2013, at the San...
As regulatory oversight across the financial landscape continues to drive greater transparency and stricter penalties, outsourcing to the private cloud has become an integral resource for hedge fund and private equity managers. Cloud infrastructure services are now synonymous with incr...
Enterprises are seeing a great potential in cloud-based services. However, security is a primary concern that keeps enterprise from harnessing the full potential. Identity management is one of the most important aspects of security. There is always an authentication required in an appl...
The medical needs of developing countries are staggering and come in many shapes and sizes. The trouble is the real issues can only be understood once an individual or organization gets involved. About 10 years ago, our organization was routinely shipping medical supplies to hard-to-re...
Like millions of other Americans, I learned the other night about the massive data breach at Target. The Washington Post is reporting that sensitive details on over 40 million credit and debit cards were exposed. While the information associated with the crime is still coming out, the ...
One key element that is often missing in the avid discussions on what’s keeping more enterprises out of the cloud is a common recognition that storage in the cloud is simply not what it should be. It may surprise you, but to a large degree the solution to some of the cloud’s biggest co...
With the end of the year buzz around predictions, it's hard not to join in the conversation. Our CenturyLink Cloud leadership team came together for a few predictions for the year head – and to show we are keepin' it real, we scored last year's predictions as well. 1. Enterprise-buye...
information and other data that must be protected. Medical practices, credit unions and independent retailers all face HIPAA, PCI and other standards. With so many regulations and limited budgets, how can small businesses keep up? Here are the top security mistakes that leave SMBs vuln...
When we set out to build the PerspecSys Cloud Data Control Gateway, we faced an important design decision: would the market prefer an “All-in-One” or a “Best-of-Breed” Cloud Security Broker? In the “All-in-One” camp, IT professionals have come to learn that the bundled modules from a ...
Recurring Revenue expert Aria Systems commends Condé Nast’s decision to launch a new division for online shopping and kindly invites the publisher of the world’s top magazines to a conversation about all the possible recurring revenue models they could employ to ensure success. Recent ...
TelecityGroup has won the “Best Data Center” award at Capacity Media’s 2013 Global Carrier Awards held in Amsterdam. The award recognizes TelecityGroup’s innovation, vision and excellence in delivering the premium data center environments for the global carrier community. In particul...
Axis Communications has announced the next generation of its market-leading system-on-chip for network video cameras and video encoders. The new ARTPEC-5 is based on dual core multiprocessor architecture, features a larger cache size and higher memory throughput. More processing power ...
VASCO Data Security International, Inc., announced on Thursday that it is collaborating with Kanoo Information Technology, a division of the E.K. Kanoo group of companies, to bring the VASCO authentication services to the Bahrain market. Kanoo Information Technology (Kanoo IT) combine...
Now that Big Data has become a household name, 2014 will be the year companies demand solid proof that data can help their decision-making and their bottom line. As the entire web becomes a seamlessly connected data warehouse, I predict that organizations will have the power at their f...
Avago Technologies Limited and LSI Corporation on Monday announced that they have entered into a definitive agreement under which Avago will acquire LSI for $11.15 per share in an all-cash transaction valued at $6.6 billion. The acquisition creates a highly diversified semiconductor ma...