Welcome!


Latest Articles from Web Security Journal
I had the privilege last week to present alongside Forrester Research's enterprise mobility expert John McCarthy in London. I was able to write a full page of notes from his presentation that I share here with you. The Age of Cheap and Cheerful Mobile is Over! It's now going to be c...
SysAid Technologies Ltd. on Wednesday announced it is using PEER 1 Hosting technologies within its new cloud-based data center to serve SysAid’s North American cloud customers. In addition to supporting SysAid’s existing cloud customers, its new data center, powered by PEER 1 Hosting t...
VaultLogix on Wednesday announced that it has purchased and is implementing EMC’s Isilon NAS scale-out storage products to ensure that its services for customers are the fastest, most reliable, and secure in the industry. EMC’s Isilon offers massive scalability with the world’s fastes...
Next month, the Network Centric Operations Industry Consortium (NCOIC) will introduce an open pattern that will enable governments, agencies and businesses to create a secure, hybrid IT environment quickly and cost effectively. Cloud computing expert Kevin Jackson has been named to lea...
Perpetual preparedness is tough to maintain. Vulnerability management tends to be an overwhelming task because of the growing number of devices and continual stream of warnings, alerts and notifications— whether it is security patches or zero day exploits, you name it. Mapping how thes...
"We have a threefold product and an in-memory database is our core platform, which helps our customers do completely net new workloads and we has some interesting high-performance use cases," explained Jon Webster, VP Business Development at GridGain Systems, in this SYS-CON.tv intervi...
A distributed denial of service (DDOS) attack on a Bitcoin wallet and transaction facilitator netted hackers with 1,265 Bitcoins worth $1 million. The hack attack started on November 15th, and it followed several other nefarious online maneuvers over a period of 48 hours. The victim is...
Synchronoss Technologies on Monday announced that it has reached 10 Million Personal Cloud Subscribers throughout the world since launching its Personal Cloud Platform this summer. Synchronoss' Personal Cloud Platform is an industry leading personal cloud solution that enables mobile o...
Growing trends such as BYOD will fuel the move to more pervasive use of identity and access management as a service, driven by the need for pervasive access and management and broader security concerns. Business trends like bring your own device (BYOD) are forcing organizations to saf...
As more business applications move to the cloud, security seems to be top-of-mind for all concerned parties. Also, the Bring Your Own Device (BYOD) to work trend, along with more smartphones and tablets that require wireless connectivity in the workplace, has increased the level of con...
AppZero, the fastest, most flexible way to move server applications, announced today its predictions for top Enterprise IT priorities as we head into 2014. Based on its research and work within the industry, AppZero declares modernization as the top priority for any Enterprise IT depa...
Identity Management (IDaaS) & Access Mgmt (SSO) solve similar but separate issues, but both serve as a cornerstone of an integrated security initiative. One of the biggest misconceptions in cloud security is the perception that identity management (IDaaS) and access management (SSO) a...
Many technologies have made their presence felt this year and continue to excite us with the promises they hold for the future. Cloud computing has now reached a stage where businesses are seriously experimenting and are starting to reap the transformational benefits it can deliver. If...
IBM has signed an agreement with Dexia and several major financial institutions in Europe to build and manage their IT infrastructure previously managed by Associated Dexia Technology Services (ADTS). As a result of this agreement, IBM takes a controlling share in ADTS establishing an ...
Our new survey tells us that up to 50% of online shoppers this year will use their mobile device. Good news is that most retail stores that have an online store now also offer a mobile version, e.g., http://m.gap.com, http://m.jcpenney.com, http://m.bestbuy.com. In the past years we ha...
As we move closer toward everything-as- a-service (XaaS), the title “Internet of Agents” seems to fit what is really happening. Agents are systems and devices that sense what is going on, and they exchange information with and act on behalf of other agents and people in ways that ultim...
“We see many companies looking to adopt BYOD strategies for employees, but few who are solely BYOD,” observed Milja Gillespie, Director of Product Marketing, Mobile Security, SAP, in this exclusive Q&A with Cloud Computing Journal. “Often, they offer corporate devices for certain types...
Telx together with Peak® (formerly PeakColo) announced on Thursday Peak's expansion into two Telx data centers, SCL2, a 40,000 square foot data center at 2820 Northwestern Parkway in Santa Clara, California and in ATL1, a 160,000 square foot data center located : at 56 Marietta Street ...
CloudEntr allows users to gain convenient access to all their web-based applications by authenticating just once with a unique log-in credential. With CloudEntr businesses are also able to smoothly transition from weak user-selected passwords to stronger protection, through complex pas...
Ixia has announced that it has completed the previously announced acquisition of Net Optics, Inc., a leading provider of total application and network visibility solutions. With the addition of Net Optics’ product portfolio, Ixia will offer industry-leading, comprehensive network visib...
Highmark Inc. is Pennsylvania’s largest health insurance company by membership. It was created in 1996 by the consolidation of two Pennsylvania licensees of the Blue Cross and Blue Shield Association – Pennsylvania Blue Shield (now Highmark Blue Shield) and Blue Cross of Western Pennsy...
"Validation of our PCI DSS compliance ensures that our API Management customers can leverage our enterprise-class cloud platform to ensure the security and availability of their applications and data, as well as help meet their own requirements for PCI compliance in their API Programs"...
There is a lot of confusion and hype about the cloud and SaaS (Software as a Service), and at Corent we experience it on a regular basis. One of the things I’ve been seeing and hearing about is the concept of a marketplace of cloud applications. I’ve observed that applications sold thi...
Cloud computing is helping businesses combat a growing problem: Too much information and not enough storage capacity. With businesses increasingly facing the prospect of running out of storage capacity, adoption of cloud storage technologies continues to grow, according to a report f...
Akamai Technologies, Inc. and Prolexic Technologies, Inc. announced on Monday that the two companies have signed a definitive agreement for Akamai to acquire Prolexic, a provider of cloud-based security solutions for protecting data centers and enterprise IP applications from distribut...
Cloud this and cloud that are on the lips of every IT professional. Beyond being an overhyped buzzword, cloud computing is a technology that’s innovating the way that many businesses, from startups to enterprises, handle their IT needs. Whether it’s specific applications or a complete ...
The digital age has forced a kind of dependency never before seen, a dependency on our inbox. The mere thought of losing these emails is inconceivable where the thought of it leaves us with a sense of panic, one similar to losing our credit cards or house key. Unfortunately, the potent...
SYS-CON Events announced today that SecurityStockWatch.com has been named “Media Sponsor” of SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York, and the 15th International Cloud Expo®, which will take pla...
Cyber Monday commerce sales are expected to reach $2.2 billion this year, according to the Adobe Digital Index 2013 Online Shopping Forecast, making the Monday after Thanksgiving one of the most important days of the year for online retailers. Adobe also estimates that Cyber Monday sal...
In this series of blogs we will expose how fraudsters operate, we will run through several typical fraud scenarios, we will investigate where, how and why legacy detection solutions fall short, and what can be done to improve them. Banks and Insurance companies lose billions of dollar...
I was at the Velocity Conference in London last week. Of course, fish & chips is still a must eat, a double-decker is far more than a bus, and pea shooting is, as always, so… British! But away from these classic London cultural elements, at Velocity I heard more and more about perform...
Simplify user management by eliminating data redundancy and automating data maintenance with Red Hat Directory Server. You can also improve security, enabling administrators to store policies and access control information in the directory for a single authentication source across ente...
Ensure World Class Protection: Provide zero-day threat protection to all users at any location using Cisco’s SIO global intelligence network. Analyze and sanitize web traffic in real-time. Prevent data loss. Improve Control: Control your distributed web security infrastructure from a...
This whitepaper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries. It covers complete backup and re...
An executive summary that provides insight into the challenges organizations face when moving to a virtualized environment and covers best practices and solutions to help. Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization. ...
Read this whitepaper to learn how virtualization offers dramatic benefits for midsize companies, including efficiency, cost savings, and increased reliability and performance. Find out the best way to implement a virtualization solution to allow you to do more with less and free up IT ...
In this whitepaper, ESG covers what to look for in a virtualization protection solution as well as whether to consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection cap...
Back in the day - when the Internets were exploding and I was still coding - I worked in enterprise architecture. Enterprise architecture, for the record, is generally not the same as application development. When an organization grows beyond a certain point, it becomes necessary to st...
In this whitepaper see how 14 virtual backup products scored in this free evaluation report from Info-Tech Research Group. Learn more and read on.
VASCO Data Security International, Inc. has announced the launch of DIGIPASS 760, a visual transaction signing solution. DIGIPASS 760 is the first successful integration of Cronto’s patented solution into VASCO’s DIGIPASS product line. DIGIPASS 760 is an innovative authentication dev...