Welcome!


Latest Articles from Web Security Journal
Traditional methods of software development went over the waterfall in a barrel and smashed on the rocks below. The Agile Manifesto was written more than a decade ago. Agile adoption has worked wonders for software development. New products leap from concept to market faster than ever ...
Few companies are enjoying a better run of news right now than Cloudera. In mid-March the big data bell cow announced $160 million in funding led by T. Rowe Price. Less than two weeks later, Intel’s mega investment of $740 million is still a popular topic around our company’s water coo...
VASCO Data Security International, Inc., offers a native authentication integration solution for MYDIGIPASS.COM that allows application developers to protect their end users' online identity. In November 2013, VASCO launched DIGIPASS for Application Perimeter Protection SDK (DIGIPASS ...
The investment comes from Nexus Venture Partners and Intel Capital, and joins previous investors Andreessen Horowitz and Sierra Ventures. “The cloud has fundamentally improved how people access and use infrastructure. But developing cloud based applications is still a lengthy, expensi...
In light of the recent NSA snooping scandal via their PRISM program regarding private cloud computing security, many people are left wondering if their sensitive data is actually secure. In fact, the statistics points to this startling fact: businesses and individuals alike have been s...
Gigamon® announced on Tuesday the Defense Information Systems Agency (DISA) has selected its GigaVUE-HD4, part of its flagship H Series line of solutions, as part of the Joint Regional Security Stack (JRSS), a component of the Department of Defense's (DOD) Joint Information Environment...
While at the RSA Conference this past year I was amazed at the mindshare and enthusiasm that the security industry was giving to DevOps. It seemed that security pros were eager to flock and embrace DevOps. This got me to thinking and I asked my friend Gene Kim about it. Gene said DevOp...
Application logs contain a massive repository of events and come in many different formats. They can have valuable information, but gaining useful insight can be difficult without the assistance of machine learning to help reveal critical problems. Transaction logs can contain gigabyt...
Enterprise organizations are looking for service providers to be a trusted partner with them throughout the entire transition through steady state process. The key for cloud providers is to develop ongoing relationships with their customers using hands-on engagement processes from begi...
Cobbling together point solutions provides tools, but doesn't promote the key collaborative intelligence integrated cloud-based unified security offers. Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the ...
Businesses have IT because apps deliver value to their customers. This can be direct value - a user-facing app. Or it can be indirect - an internal app for managing sales, marketing, or even HR transactions. Either way, the idea is that the app will make the business more efficient and...
As "applications" continue to morph into what we once might have called "mashups" but no longer do because, well, SOA is officially dead, dontcha know, it is increasingly important for a variety of constituents within organizations - from business stakeholders to application owners to ...
What do you look for when you choose a Web hosting provider? These days, it seems difficult to compare the differences between each service, whether you’re talking about supported languages, databases or bandwidth. You might be tempted to pick the cheapest provider and plan in hopes of...
Companies are moving forward with cloud deployments at a rapid rate, according to Hosting and Cloud Go Mainstream: 2014, a Microsoft Corp.-commissioned study conducted by 451 Research LLC. The new study showed that more than 45 percent of organizations surveyed are beyond the pilot pha...
Fujitsu RunMyProcess and MongoDB extend their existing collaboration to deliver seamless integration for cloud solutions to joint customers. More than 350 companies around the world deploy Fujitsu RunMyProcess-based workflow applications that integrate MongoDB. Fujitsu RunMyProcess ...
Given the mountains of data now floating around, it is perhaps inevitable that the very function of data analytics is seen as somehow intrusive. There’s a constant glut of reports, columns and other stories bemoaning the lack of data privacy – and at times, they’re entirely justified. ...
There’s been plenty written and predicted about the future of cloud and Software-as-a-Service, and it’s hard to argue with its benefits – for both organizations and users. If our cloud-based future is to come true though, we must pay closer attention to the service levels users are get...
Virtualized and private cloud infrastructures are all about sharing resources – compute, storage and network. Optimizing these environments comes down to the ability to properly balance capacity supply and application demand. In practical terms, this means allocating the right amount o...
Banks face a difficult tug-of-war every day. Consumers demand innovative new services – regulators demand security, compliance and soundness of all offerings. How can a bank resist being pulled in every direction and find a middle ground? Banks can look to startup technology companies...
Software is increasingly critical to an organization's competitiveness, but the applications being developed consistently meet business stakeholder expectations only 17% of the time. What's the problem...and what's the secret to ensuring that expectations are met?
A recent press report quoted unnamed US intelligence sources saying Russia had no intention of invading the Ukraine. The appraisal became the subject of considerable debate when Russian President Vladimir Putin ordered his nation's military into Ukraine's Crimea region. Follow-on media...
In my last blog, I discussed how today’s Internet is vastly different than the Internet envisioned at the start of the net neutrality debate. As promised, I’d now like to get into some fictional examples that paint the picture of why this is such a polarizing topic for so many. Exampl...
Cloud computing brings a myriad of benefits for any enterprise, but it is also a cause for concern in a world where, according to InformationWeek, cyber criminals are now targeting "any company where they can find data to resell, disrupt or exploit." Moving your company's sensitive da...
The cable companies and telcos who dominate the U.S. market for Internet access won a victory when they succeeded in having the heart of the FCC’s ruling on net neutrality struck down. Now, for the first time legally, those companies can both block content and offer fast lane services ...
Cloud migration innovator AppZero has announced a $3M round of funding to support enterprises moving to the cloud, including those faced with moving millions of applications to newer operating systems from Windows Server 2003, which reaches the end of extended support next year. Leadi...
IBM on Wednesday announced it has deployed a business-to-business (B2B) cloud-based network that will help transform the Indian automotive industry by accelerating the movement of data and reducing transaction costs by up to 80 percent. The new exchange – AutoDX – was developed in part...
DocuSign on Tuesday announced the company has raised an additional $85 million with the vast majority from large institutional public funds and the balance from existing investors. DocuSign will use the funds to fuel continued growth as the global standard for Digital Transaction Manag...
Learn how a Process Intelligence Engine identifies business risks and highlights opportunities for process improvement by collecting, correlating and analyzing raw observations throughout the SDLC (source code, defects, build, requirements, ALM, test management…)— helping you mitigate ...
Taking office technology to a new level, Brother is preparing to showcase its latest mobile-focused innovations - and has literally gone beyond the clouds and into space. The office tech specialist's newest technology is designed to meet the demands of today's mobile savvy workforce -...
The new wonder metal, graphene, is being looked at as a building block for communications and electronic devices on the level of what the transistor was sixty years ago. Graphene is a one-atom thick, mesh-like (think hexagonal honeycomb or chicken wire), semi metal that will add more ...
Recording and maintaining good evidence of testing is growing more important all the time. The ability to document what actually happened during the development of hardware or software is vital in many industries. Medical equipment is a great example, as any failure could lead to unexp...
IBM has announced a unique new development environment and capabilities-as-a-service to help clients and developers speed the adoption of "hybrid" clouds, which have the potential to usher in a new era of innovation across the enterprise. As part of its initiative, IBM has invested mor...
As promised in our earlier post, here are the final predictions we saw making the rounds in the blogosphere at the start of the year. Many are predicting that Microsoft will get more serious about the cloud. Amazon dominated the cloud news in 2013, but 2014 will be a good year for Mic...
There's been a lot of discussion on the Internet about the definition of Platform-as-a-Service. Here's just a few very active Twitter discussions to illustrate the level of activity and passion over the topic: This is just a few of the hundreds of tweets returned when I queried "Paas"...
For decades, on-premises installations meant application developers and systems administrators had access to this pre-boot sequence, whether it was for easing asset management, helping to recover from failure, or fine tuning systems for performance. The move to the cloud meant losing a...
PCI DSS is the industry standard for the safe and secure processing of payment card transactions. In order for a business to effectively process card payments, PCI DSS needs to be used and maintained. As more firms head online, the internet offering a great many business opportunities ...
As businesses aspire to move more and more application workloads outside of the boundaries of their private cloud data centers, public cloud service providers are increasingly implementing a private cloud staple: resiliency. In his session at 14th Cloud Expo, John Roese, SVP and Chie...
Pundits, owing to SDN still being very young and not widely adopted, continue to put forth treatise upon treatise as to why organizations should be falling over themselves to go out and get themselves some SDN. Now. Not tomorrow, today. One of the compelling reasons to adopt is to add...
Finansbank in Istanbul has developed an impressive record of managed risk and deployments, with an eye to greater automation over time. Governance, risk management and compliance (GRC) form a top-tier of requirements for banks anywhere in the world as they create and deploy applicatio...
IBM on Monday announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., a privately held database-as-a-service (DBaaS) provider that enables developers to easily and quickly create next generation mobile and web apps. "IBM is leading the charge in helping its clien...