Welcome!


Latest Articles from Web Security Journal
Cloud computing is helping businesses combat a growing problem: Too much information and not enough storage capacity. With businesses increasingly facing the prospect of running out of storage capacity, adoption of cloud storage technologies continues to grow, according to a report f...
Akamai Technologies, Inc. and Prolexic Technologies, Inc. announced on Monday that the two companies have signed a definitive agreement for Akamai to acquire Prolexic, a provider of cloud-based security solutions for protecting data centers and enterprise IP applications from distribut...
Cloud this and cloud that are on the lips of every IT professional. Beyond being an overhyped buzzword, cloud computing is a technology that’s innovating the way that many businesses, from startups to enterprises, handle their IT needs. Whether it’s specific applications or a complete ...
The digital age has forced a kind of dependency never before seen, a dependency on our inbox. The mere thought of losing these emails is inconceivable where the thought of it leaves us with a sense of panic, one similar to losing our credit cards or house key. Unfortunately, the potent...
SYS-CON Events announced today that SecurityStockWatch.com has been named “Media Sponsor” of SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York, and the 15th International Cloud Expo®, which will take pla...
Cyber Monday commerce sales are expected to reach $2.2 billion this year, according to the Adobe Digital Index 2013 Online Shopping Forecast, making the Monday after Thanksgiving one of the most important days of the year for online retailers. Adobe also estimates that Cyber Monday sal...
In this series of blogs we will expose how fraudsters operate, we will run through several typical fraud scenarios, we will investigate where, how and why legacy detection solutions fall short, and what can be done to improve them. Banks and Insurance companies lose billions of dollar...
I was at the Velocity Conference in London last week. Of course, fish & chips is still a must eat, a double-decker is far more than a bus, and pea shooting is, as always, so… British! But away from these classic London cultural elements, at Velocity I heard more and more about perform...
Simplify user management by eliminating data redundancy and automating data maintenance with Red Hat Directory Server. You can also improve security, enabling administrators to store policies and access control information in the directory for a single authentication source across ente...
Ensure World Class Protection: Provide zero-day threat protection to all users at any location using Cisco’s SIO global intelligence network. Analyze and sanitize web traffic in real-time. Prevent data loss. Improve Control: Control your distributed web security infrastructure from a...
This whitepaper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries. It covers complete backup and re...
An executive summary that provides insight into the challenges organizations face when moving to a virtualized environment and covers best practices and solutions to help. Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization. ...
Read this whitepaper to learn how virtualization offers dramatic benefits for midsize companies, including efficiency, cost savings, and increased reliability and performance. Find out the best way to implement a virtualization solution to allow you to do more with less and free up IT ...
In this whitepaper, ESG covers what to look for in a virtualization protection solution as well as whether to consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection cap...
Back in the day - when the Internets were exploding and I was still coding - I worked in enterprise architecture. Enterprise architecture, for the record, is generally not the same as application development. When an organization grows beyond a certain point, it becomes necessary to st...
In this whitepaper see how 14 virtual backup products scored in this free evaluation report from Info-Tech Research Group. Learn more and read on.
VASCO Data Security International, Inc. has announced the launch of DIGIPASS 760, a visual transaction signing solution. DIGIPASS 760 is the first successful integration of Cronto’s patented solution into VASCO’s DIGIPASS product line. DIGIPASS 760 is an innovative authentication dev...
Security-as-a-service provides the necessary ingredient to transform continuous monitoring from compliance mandate to best practice: real time monitoring. Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I l...
The adoption of cloud storage technology for a broad range of consumer and business applications is transforming the storage landscape by transitioning away from traditional disk arrays to object-based storage systems that have the scalability, availability, resiliency and accessibilit...
Tests are an investment in the quality of any given system. There’s always a cost to build, run, and maintain each test in terms of time and resources. There’s also a great deal of value to be extracted from running the right test at the right time. It’s important to remember that for ...
Red Hat Directory Server is an LDAP-compliant server that centralizes application settings, user profiles, group data, policies, and access control information in a network-based registry. In this webinar, you’ll learn more about how Red Hat Directory Server can: Reduce administratio...
AppZero, a fast, more flexible way to move server applications, announced on Monday a collaboration with Microsoft in which Microsoft is recommending AppZero for moving a variety of applications from Windows Server 2003, which reaches the end of extended support in July, 2015, to Micro...
It's not today, or tomorrow, but sometime in the not too distant future the bulk of the on-premise private cloud market is going to shrivel into a little raisin and die. A very small number of very large companies will operate private clouds that will be, by an large, poor substitutes ...
Please join us at one of our upcoming Email Security Webinars. Email Security is offered on Tuesday and Thursday. Please click on a title below to register. What You Will Learn in this Webinar Ensure world class protection: Block malware, blended threats and 99.999% of all SPAM ente...
My good friend J.D. Axford, a civil engineer and hero of all ducks for his wetlands work, sent me a very interesting (if you are into GPS tracking, GIS, mobile technology, artificial intelligence, accelerometers, etc.) article he wrote on how the physical is meeting the digital in the ...
In a previous blog we introduced the topic of cloud-as-it-is versus cloud as-we’d like-it-to-be. The cloud services broker (CSB) business model is gaining momentum as one way to turn the cloud into as-we’d-like-it-to-be. CSB is a term used for the activity of brokerage and also for the...
After years of talking to people inside and outside of my company about the benefits of cloud computing, I'm truly convinced that the most important benefit is not cost reduction or the ability to have new servers up and running in a few minutes. Of course those are great capabilities ...
I want to introduce you to a long time friend of mine J.D. Axford. He is a civil engineer with all kinds of acronyms after his name (P.E., CESCL, etc.), who has worked for most of his career in the Northwest of the USA in and around water and mud. He is a hero among the duck populati...
Once you have successfully exploited a target machine you may be faced with a common dilemma that many penetration testers have, do I have shell access or terminal access? Both are not the same and careful knowledge must be used when interacting with a shell access vs. terminal access...
It is hard to believe that there was a time when “the cloud” didn’t exist. Then, maybe 50 years ago, a lot of cloud-like things started to happen, such as remote computing, networked computing, resource sharing, virtual networks, and then, eventually, the Internet. But it still wasn’t ...
The latest headlines in the ongoing surveillance soap opera focus on the revelation that the U.S. has been eavesdropping directly on German Prime Minister Angela Merkel. The reaction in Germany has been strong with many officials publically condemning the surveillance. After the NSA’s...
Who doesn't love a good zombie flick, right? Hordes of undead ambling around in tattered clothing looking for something to eat. The low, drawn-out moans of a once-productive member of society, who now possesses the brainpower of a teenager on an 8-hour Call of Duty bender. While I don...
With a wealth of technology and online resources, many people are ditching the traditional 9-to-5 lifestyle and opting to become entrepreneurs. Unlike businesses of the past, where a large financial investment was required to get off the ground, today's startups can get the ball rollin...
There is no doubt that a focus on software defining the network - enabling automation, analytics, and orchestration via open APIs and other technologies - is changing the way network elements are viewed and compared across the industry. In the past, we lined up products and compared ...
With the rise of BYOD and the sharp growth of mobile devices, organizations worldwide, including those in need of government-level security, are turning to Virtual Bridges, Inc. to reduce risk and increase control over their sensitive data. With Virtual Bridges VDI private cloud soluti...
Everything as a Service has become nearly a synonym for cloud computing. That's unsurprising, as the benefits of cloud - from economy of scale to increased service velocity - are derived mainly from the abstraction of network, compute and storage resources into services that can be rap...
I've just had the opportunity to preview my good friend Melvin Greer's newest effort, "21st Century Leadership: Harnessing Innovation, Accelerating Business Success". Now in pre-release, this book highlights the compelling linkage between internet scale technology, advance business mod...
With the launch of Cisco’s software-defined networking startup Insieme expected tomorrow, our industry is about to hear a lot about “application-centric” everything. So what does “application-centric infrastructure” mean? First, some basics: Networking is about connecting computing de...
Given the differences in market maturity, cultural acceptance and local IT infrastructures, considerable regional differences exist in the deployment rates of cloud-based security systems. They all play a part in the level of spending dedicated to this delivery model -- when compared w...
Imagine how much you’d use the internet if you had to remember dozens of number combinations to do anything. DNS is arguably the primary technology enabling the Internet – translating the domain names people type into a browser into an IP address so the requested service can be found ...