Welcome!


Latest Articles from Web Security Journal
In my last blog, I discussed the debate surrounding the true definition of open and unfettered Internet, and the different interpretations various groups and individuals have on the matter. In this posting, we continue the discussion. The U.S. government has not enacted legislation to...
“Regulations and compliance are key trust topics with regards to cloud solutions and technology,” noted Sven Denecken, Vice President, Strategy and Co-Innovation Cloud Solutions, SAP AG, in this exclusive Q&A with Cloud Computing Journal. “But it is also more than security of access – ...
TwinStrata on Wednesday announced the results of its "Industry Trends: Data Backup in 2014" survey. Conducted between December 2013 and January 2014, the report analyzes responses from 209 IT personnel. The results indicate an urgent need for organizations to make significant improve...
The era of Big Data is upon us. Data is growing in volume, variety and velocity. At the same time, cybercrimes, breaches and advanced persistent threats are increasing at an alarming rate. As a result, the pressure is on to protect critical data and demonstrate compliance to a growing ...
Cloud hosting has been creating quite a buzz lately as being the latest, and some claim also the best type of web hosting around. It is quite different to your usually hosting server and certainly requires a lot of skill to use. Most of the time it cannot be run by a single person, but...
Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some e...
Yesterday one of the biggest outages in history, if not the biggest outage, happened to the Internet in China. Primarily and directly affected by that outage were most of the people living in China and browsing the Internet in China. Secondary, all companies doing online business in C...
If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders – case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, th...
OpenText Corporation has announced that it has completed its acquisition of GXS Group, Inc. (GXS), expanding OpenText's leadership in EIM by combining OpenText's Information Exchange portfolio with GXS's cloud-based business-to-business integration services and managed services. "I a...
Recent reports of a massive data breach affecting popular sites like Facebook, Twitter, Google and Yahoo have many companies rethinking security practices and wondering how to protect vital data. If your company uses cloud services to conduct business and manage data or is contemplatin...
2013 was a banner year for cloud backup adoption. It was also a year of wake-up calls: simple cloud backup doesn't constitute DR, transfer speeds are vital, and beware cloud as a commodity. Let's look to 2014 for more trends in cloud backup and DR in the cloud. This trend showed up in...
Coalfire has launched HIPAAcentral, a new compliance exchange that provides a comprehensive suite of services for covered entities and business associates and their subcontractors to manage, maintain and exchange healthcare regulatory compliance data. “The U.S. Department of Health an...
Industrial and Embedded service provider, Innodisk, is introducing a new line of peripheral modules for embedded applications. Users will be able to interface to LAN, serial ports (USB/RS232-422-485/PCIe), storage devices and video displays easily through these space-efficient embedded...
Cloud computing continues to transform the way organization are doing business, proving to be a transformative innovation for many enterprises. Considering how far the cloud has come in recent years spurs questions of what the future will look like and what types of changes we can expe...
I had the privilege of interviewing mobility expert Vaidy Iyer today. He is the founder and CEO of AppsFreedom, a company focused on providing enterprise mobility solutions in the form of Multi-Channel, Multi-Device Platform as a Service solutions to the SAP community. I asked if the...
Innodisk, a designer and manufacturer of SSDs for industrial applications, is committed to providing flash storage solutions that meet the unique security demands of the gaming and amusement industry without sacrificing reliability and performance. With its release of a new series of c...
In a previous blog on Cloud Services Brokerage (CSB), I promised to return briefly to the topic of CSB monetization. The term CSB can refer to both to the activity of brokering cloud services, or to the software application (or suite of applications) used to manage that activity. The ...
With the "API economy" dominating the headlines in 2013, it's no surprise that Parasoft saw a surge of interest in how to ensure API reliability, security, and performance. Here's a recap of the 13 most-accessed API Integrity resources from 2013... API Integrity: How Buggy Are Today's...
LSI Corporation on Monday announced that LSI® Nytro™ flash accelerator cards have been selected as the PCIe® flash acceleration technology for Oracle’s next-generation Database Machine, Oracle Exadata X4. In addition, the companies have collaborated on bringing a new LSI Nytro technolo...
Savvy organizations, HP among them, are turning to preventing attacks, rather than just detecting them and remediating them. The high cost of unwanted intrusion and malware across corporate networks is well known. Less talked-about are the successful ways that organizations are thwart...
"Everybody is sharding because the data is getting bigger and bigger so there are just more ways to do it. The thing about sharding is you have to take Big Data and spread it across a lot of servers – that’s the most important thing," explained Cory Isaacson, CEO/CTO of CodeFutures Cor...
We live in a world that requires us to compete on our differential use of time and information, yet only a fraction of information workers today have access to the analytical capabilities they need to make better decisions. Now, with the advent of a new generation of embedded business ...
It’s been a great 2013. Out of the global $1.2 trillion dollars’ worth of business conducted online in 2013 across the globe, SOASTA is trusted with protecting 10% of that figure – or $150 billion. Based on the hundreds of brands SOASTA worked with this year and listened to the challen...
Many news organizations including The Washington Post are reporting that the latest documents leaked by former NSA contractor turned whistleblower Edward Snowden show the NSA is in the early stages of working to build a quantum computer that could possibly crack most types of encryptio...
Panzura has added new Secure Erase and Enterprise Antivirus Connector technologies in version 5.4.1.0 of its PZOS operating system for the Panzura Global Cloud Storage System. These new features increase security options beyond Panzura's FIPS 140-2 Level 3 encryption, which was announc...
Citrix announced on Wednesday that it has acquired Framehawk. The Framehawk solution, which optimizes the delivery of virtual desktops and applications to mobile devices, will be combined with HDX technology in the Citrix XenApp® and XenDesktop® products to deliver an unparalleled user...
Over the course of the past decade, there's been a lot of hype pertaining to the_ Internet of Things (IoT)_ and how China leads the U.S. in this technology -- yet many who are active on the Internet are still unaware of its existence. In its simplest form, IoT is an evolving wireless ...
RevChain Solutions, LLC (RCS), part of Windstream and a provider of enterprise carrier grade billing, account management and customer care solutions, announced on Tuesday that it has executed a three-year, $5 million extension for professional services and support with Empresa de Telec...
As web applications and cloud services continue to proliferate, identity theft, cyber fraud, cyber bullying, and simple misuse of confidential information online expand to chronic levels. Yet cloud providers are expected to ensure high security while maintaining a convenient user exper...
Recently large numbers of consumers in the US were understandably upset and angry when online purchases that they made in the days just prior to Christmas were not delivered in time. Yet it was not so long ago that online (and traditional mail order) purchases almost always took a very...
Over the past few years, the cloud evolution has answered all questions on the cloud being the right strategy. The key challenge that remains now is leveraging cloud capabilities and features in such a way that they can be used to innovate as well as solve business problems. If we rela...
CloudSigma on Monday announced that it has enhanced its solid-state drive (SSD) storage offering with highly-granular, affordable snapshot management technology to improve data protection and access in the cloud. Now, customers can seamlessly and cost-effectively incorporate enterprise...
Enterprises that rely heavily on fax, view regulatory compliance as a major business component. Non-compliance issues that arise from security breaches and other forms of information leakage often result in substantial regulatory penalties, both civil and criminal. As government regula...
That attackers are moving "up the stack", toward the application layer, should be no surprise. Increasingly, network layer attacks are a distraction; a means to engage security professionals attention while the real target - an application - is attacked. Even when this is not the case,...
"Testing is the last piece of the puzzle. What we have seen is speed – the need for acceleration in terms of software development – and once you start hitting speed you start hitting speed bumps and those speed bumps are quality," noted Wayne Ariola, Chief Strategy Officer at Parasoft,...
As the significant benefits of SaaS and hybrid cloud services become more evident, it’s no surprise that organizations are moving more mission-critical applications – e.g., email, VoIP, online meetings, document storage/collaboration, etc., – to the cloud. This is different than CRM ap...
It has been some year in the world of Cloud and Cloud Storage in particular. We witnessed the demise of Nirvanix, as well as the revelations of Edward Snowdon outlining the surveillance of the PRISM surveillance program and the alleged collusion with major US Service providers. Amidst...
"The entire market knew for a long time that to test a site at scale required a lot of hardware. SOASTA was founded a little before the cloud and when the cloud came that was the pivot point as that was exactly what the load testing market had been waiting for," explained Brad Johnson,...
2013 has been incredibly eventful for the cloud industry, mostly for making itself an eminent presence in the mainstream IT market. Businesses of all sizes have made their ways to the cloud, confirming my 2013 predictions. Government agencies worldwide take the cloud seriously, as demo...
Computer security has become much harder to manage in recent years, and this is due to the fact that attackers continuously come up with new and more effective ways to attack our systems. As attackers become increasingly sophisticated we as security professionals must ensure that they ...