Welcome!


Latest Articles from Web Security Journal
Has Washington finally caught on to the cloud? As a "borderless technology," cloud computing is subject to the laws and regulations of many different countries – some more than others. The American legal and regulatory system has recently been paying more attention to cloud computing, ...
SYS-CON Events announced today that VASCO Data Security International, Inc., a global leader in authentication, digital signatures, and identity management, has been named “Bronze Sponsor” of SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Ja...
Electronic signatures are an important component of any web application. They make it possible to keep business processes online even when a signature is required on a contract, form or application. If you are interested in learning how to quickly integrate e-signatures into your clou...
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (1) system administrators who don’t need to see the data in the clear and (2)...
CiRBA Inc. on Tuesday announced that three members of its management team will be speaking at four industry events over the next two weeks: Gartner Infrastructure and Operations Management Events in Berlin and Orlando, Cloud Expo in New York and the J.P. Morgan 4th Annual Cloud & Beyon...
Mr. George Romas is the Technical Director of the Cybersecurity Solutions Group at HP Enterprise Services, U.S. Public Sector. SecuritySolutionsWatch.com: Thank you for joining us again today, George. It's been roughly one year since our first meeting when we spoke about building sec...
Like electricity, compute resources can readily scale up and burst, and workloads can easily operate geographically. Storage however is more like water, where moving large amounts of data can be very challenging, especially over distance. In his session at 14th Cloud Expo, Joe Arnold...
IBM on Monday announced that businesses of all sizes – from start-ups to large enterprises - are rapidly adopting IBM Bluemix to develop software in the cloud with greater speed, security and quality. IBM also announced additional services on Bluemix, which will move from beta testin...
A global asset management company needed to accelerate testing for parallel and Agile development. Learn how service virtualization and API test automation resulted in a 20X reduction in testing time. Ignis Asset Management is a global asset management company, headquartered in London...
“While cost has traditionally been a foundational benefit of the cloud, we believe that other factors can play a more important part in defining the cloud of tomorrow,” said Todd Gleason, Vice President of Technology at FireHost, in this exclusive Q&A with Cloud Expo conference chairs ...
With large security breaches constantly in the news, businesses are rightly concerned about security. Thankfully, big data and machine learning can work together to help. They read like a list of horror stories for businesses big and small alike. Sony’s PlayStation Network is hacked t...
Until this week the biggest anxiety when dealing with eBay has likely been fretting over a negative rating, concerns about slow shipping or a delayed refund. Then suddenly yesterday the media jumped all over the story that eBay had been hacked and users need to change their passwords. ...
Today, more than ever, end user experience is at the forefront of every CTO and CMO’s mind as more statistics show websites and applications are easily abandoned if users are not satisfied with their experience. But what makes a good experience? First we need to ask ourselves what is ...
Over the last months organizations' employees have embraced the BYOD practices, CIOs are concerned about security issues, lawyers have given their advice, and MDM vendors have taken their message to the companies. But while CIOs try to come up with the best solution to police this prac...
This report details findings from Forrester Research, Inc. about how the nine most significant solution providers for privileged identity management meet the 18-criteria evaluation and where they stand in relation to each other to help security and risk (S&R) professionals select the r...
The MAS guidelines for Internet Banking and Technology Risk Management (TRM), issued in June 2013, identify security and risk management issues in a comprehensive manner, covering everything from identity assurance and access controls to accountability and audit. This white paper detai...
Distrix, ein führender Entwickler von softwaredefinierten WAN-Produkten, die einfache, sichere und belastbare Netzwerke ermöglichen, gab heute die Änderung seines Namens von Spark Integration Technologies zu Distrix bekannt. Der neue Name spiegelt den Erfolg des Unternehmens beim Einsa...
When we think about what’s next, our frame of reference is almost universally anchored to what we are doing now. We look at how things are, and then we aim our sights forward. In some cases, we might make incremental moves ahead; in other cases, maybe we look for improvement by orders ...
SOASTA on Tuesday announced that it has entered into a technology and distribution partnership agreement with CA Technologies. The partnership will integrate SOASTA's Cloud based Web testing solution, CloudTest with CA Service Virtualization and CA LISA Test software suites. The soluti...
Risk-conscious enterprises across the globe have been reluctant to embrace the public cloud model. For many, compliance requirements are the source of the reluctance. For others, concerns about ceding control of their data to a cloud service provider, without the cloud service provider...
Reduce networking costs! Increase cyber security! Deploy applications faster! Add connectivity to our new office now! We’re under attack now – drop everything and jump on it now! How does IT management keep up with these demands? On top of that challenge, the promises of the Internet o...
Last month, the Information Security Forum released their annual prediction of the top 10 information security threats they foresee for the next two years – through 2016. While I found the entire list insightful, half of the list resonated strongly with me as someone who is working wit...
InMage on Monday announced the release of Scout 7.1, enabling customers to leverage the public, hosted and private cloud as a target for backup and/or disaster recovery (DR). This next generation solution for hybrid cloud backup, recovery and migration is available in three form factor...
Companies are bracing for the challenge of upgrading hundreds or thousands of servers ahead of the "end of life" of Windows Server 2003 in July, 2015. Join this informative webinar to hear Microsoft's recommendations and see a demonstration of AppZero, the only automated way to "uplev...
For Windows environments, it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they only access the servers and resources required to perform their job and only during the approved times to...
If you're not virtualizing, you're missing reduced equipment, management, and utilities costs, along with increased server utilization rates and the right path to cloud computing. But when you virtualize, backup becomes even more of an issue. Traditional agent-based backup and recovery...
As a SaaS business matures, the importance and value of SaaS metrics increase. Most SaaS businesses begin their journey down the SaaS metrics path by tracking recurring revenue in relation to customer acquisition costs. After building a solid customer base, churn becomes a priority. Th...
To help maintain control and remain ever-ready for improvements, healthcare SaaS application developer PointClickCare recently adopted a cloud-based IT service management solution. Whether it's monitoring medication management in a closed-loop integration with pharmacies, or managing ...
Heartland, based in Princeton, New Jersey, has improved governance results in innovative ways across the organization, thanks to both security best practices and HP Fortify tools. Heartland Payment Systems has successfully leveraged software-assurance tools and best practices to driv...
There are two pieces of good news to come out of Heartbleed. First, we haven’t heard of any significant security breaches, which mean that the industry as a whole is getting better at fixing problems as they arise. The second is that, because Heartbleed presented every single cloud pr...
Solidifying its position as a leading IT infrastructure and cloud provider, Peak 10 has been named the first provider in the Americas to achieve the Cisco Powered Disaster Recovery as a Service (DRaaS) designation under the Cisco® Cloud and Managed Services Advanced Certification. This...
Arlington Computer Products improved their financial processes and operations using the new AribaPay cloud-based B2B payment service. Agile business services are entering into a new era, an integrated and on-demand approach to ordering, billing, and settlement processes between buyers...
AppDynamics is excited to unveil details behind our new Application Intelligence Platform which is the technology foundation for the AppDynamics portfolio of performance monitoring, automation and analytics solutions (transaction analytics was also announced today). Today’s software d...
SOASTA® Inc., on Tuesday announced that Huawei has selected SOASTA to provide continuous integration and robust functional test automation for its business and consumer offerings. Huawei will utilize SOASTA TouchTest and CloudTest for internal testing of Huawei’s apps, ensuring peak pe...
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In its list of the eight most significant cybersecurity threats for 2013, Forbes c...
SYS-CON Events announced today that Silanis, the world’s leading electronic signature provider, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Silanis is the world’s leading electron...
Learn how MedicAlert automated the functional, security, and performance testing for new APIs – enabling them to become an increasingly agile and valued provider of new healthcare information services. MedicAlert pioneered the use of medical ID products and delivers the most dependabl...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
Many cloud hosting providers have achieved ticket-of-entry credibility in the data warehousing industry by building simple colocation centers. A first-tier database as a service (DBaaS) contender, however, is set apart by a value-added service approach that is strategic, consultative a...
Every company worries about competition. When I ran a large enterprise solutions organization, I took steps every day to ensure we were outpacing the competition. Frequently this involved making “build” vs “buy” decisions for the various product parts or services we needed to drive our...