Welcome!


Latest Articles from Web Security Journal
PCI DSS is the industry standard for the safe and secure processing of payment card transactions. In order for a business to effectively process card payments, PCI DSS needs to be used and maintained. As more firms head online, the internet offering a great many business opportunities ...
As businesses aspire to move more and more application workloads outside of the boundaries of their private cloud data centers, public cloud service providers are increasingly implementing a private cloud staple: resiliency. In his session at 14th Cloud Expo, John Roese, SVP and Chie...
Pundits, owing to SDN still being very young and not widely adopted, continue to put forth treatise upon treatise as to why organizations should be falling over themselves to go out and get themselves some SDN. Now. Not tomorrow, today. One of the compelling reasons to adopt is to add...
Finansbank in Istanbul has developed an impressive record of managed risk and deployments, with an eye to greater automation over time. Governance, risk management and compliance (GRC) form a top-tier of requirements for banks anywhere in the world as they create and deploy applicatio...
IBM on Monday announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., a privately held database-as-a-service (DBaaS) provider that enables developers to easily and quickly create next generation mobile and web apps. "IBM is leading the charge in helping its clien...
AccelOps on Thursday announced its global survey of 140 IT security professionals found that while cloud usage continues to rise, cloud security remains stagnant. Results indicate that 73 percent of survey respondents are running a greater number of mission-critical applications in the...
“Software-defined,” like any new trend that technology companies rush to attach to has suffered from marketing hype. Starting in mid-2012 with the acquisition of Nicera by VMware, most traditional infrastructure technology vendors across compute, networking, and storage have some messa...
Everyone is putting “DevOps” on their LinkedIn profile, and everyone is trying to hire them. In his session at 2nd DevOps Summit, Jez Humble, a principal at ThoughtWorks, will argue this is not a recruitment problem but an organization’s failure. He will discuss how to grow great peo...
Out-of-band metadata and business context outside hypermedia applications are by definition exterior to the contract, and thus aren’t amenable to any distributed computing architectural style that relies too heavily on static APIs. Therein lies the essential challenge of the API. To th...
Recent high-profile events (2010 Haitian Earthquake, 2011 Tōhoku Earthquake and Tsunami, 2013 Typhoon Haiyan/Yolanda) have highlighted the growing importance played by the international community in successful humanitarian assistance and disaster response. These events also showcased t...
With more organizations embracing cloud mandates and moving quickly to flash-accelerated, shared storage infrastructures, NetApp introduced a new line of enterprise storage systems and enhanced software designed to accelerate the broadest range of virtualized applications. "As they ad...
Hostway Corporation on Thursday announced the appointment of 30-year technology industry veteran Robert Boles to the post of Chief Executive Officer. He succeeds John Martis, who is the new Chief Operating Officer and will work with Boles to broaden the company’s Infrastructure-as-a-Se...
#SDN #Devops #LineRate When you put software into the data path there are some things it better have to make sure it doesn't become a liability The software-everywhere drumbeat continues to resound across the entire industry. Experts assure us that software can perform as well as har...
Innodisk has announced a full-rate production of a nanoSSD SATA device that conforms to JEDEC’s standard (MO-276). Innodisk integrates a flash control chip, NAND flash, and ball grid array (BGA) package to deliver a nanoSSD that is approximately 1% of the size (16mm x 20mm x2mm) of a ...
The initial wave of data efficiency features for primary storage focus on silos of information organized in terms of individual file systems. Deduplication and compression features provided by some vendors are limited by the scalability of those underlying file systems, essentially the...
October 1, 2013, was the most anticipated date for the Obama administration since his re-election. It was to be the day every American would have access to health care on one centralized website. However, according to at least one report only six people enrolled in Obamacare on the fir...
IDenticard® Access Control is a leading manufacturer of integrated access control solutions to protect employees, visitors, and facilities. Owned by Brady Corporation (NYSE:BRC), a $1.15 billion manufacturer of identification products, IDenticard Access Control draws on its 30 years of...
What have you done online today – checked LinkedIn? Facebook? Twitter? Opened and sent business emails? Used business apps? Every business employee also has a private life – and it’s becoming increasingly difficult to keep the two separate. Rather than ignoring the growing role of soci...
Last year’s revelations of government surveillance programs by the NSA and others, along with possible lack of enforcement of the Safe Harbor program by the FTC, caused the European Civil Liberties Committee to recommend suspending the entire EU-U.S. Safe Harbor approach. If the recomm...
Egnyte, the provider of the most comprehensive file-sharing platform for the enterprise, has announced its global expansion plans, with the establishment of regional centers in Spokane, Washington and New York, as well as a European headquarters in London and broadened operations in Po...
BYOD may be the word of the day on the street but underlying the "come as you are" approach to computing is a variety of technology that enables organizations to confidently take up the gauntlet thrown down by users to support their demand to use the computing platform of their choice....
The cloud’s main story so far has been one of horizontal providers, such as salesforce.com, Microsoft and Amazon, offering one-size-fits-all solutions. While these providers had some success in the financial services sector, their products weren’t specialized enough to address the need...
Rob Wigley is Director, Cybersecurity Consulting Services at HP Enterprise Services, U.S. Public Sector. He has more than 30 years of information technology experience supporting manufacturing, high tech, healthcare, and public sector market segments. For the last 10 years, he has focu...
Worldwide IT spending is projected to rise US$3.8 trillion in 2014 according to recent Gartner research, a 3.1 percent increase from spending in 2013, which was $3.7 trillion. While not a huge jump in dollars, it does indicate that companies have been conserving cash over the past few ...
Virtualization can significantly reduce costs for organizations but to ensure that risk of outage and data loss is mitigated, organizations should ensure that their backup provider meets certain qualifications.
How can your business benefit from using the cloud? We hear the term all the time in the tech world, but it's never really clearly defined. Those of us who are using social media or saving data with online sources are already using it. Perhaps you just didn't know it. Amazon is one of ...
Given the business expectations at each stage of the SDLC, Continuous Testing delivers a quantitative assessment of risk as well as actionable tasks that help mitigate these risks before they progress to the next stage of the SDLC. The goal is to eliminate meaningless tests and produc...
Storing important information around the office has always been the go-to format for saving essential data. Of course, having it somewhere on hand provides peace of mind, as you know it is literally held within your building, so when someone needs a hard copy, you are able to go out an...
Expand on-premise identity management capabilities by utilizing the flexibility and agility of an IDaaS and SSO to augment permissions for cloud-based apps. The modern enterprise is a fluid entity. As an IT construct it expands and contracts (sometimes simultaneously), and many of the...
A newly released report from McKinsey & Company, Risk and Responsibility in a Hyperconnected World: Implications for Enterprises, highlights the findings of a year’s worth of McKinsey research conducted in partnership with the World Economic Forum. Based on the interviews with over 200...
AppZero, the fastest way to move enterprise applications, today announced the results of its first "State of Readiness for Windows Server 2003 End of Support (EOS)" survey. The 2013 results of more than 200 Fortune 1,000 companies show that 40% of respondents wish to move to the cloud...
Veeam® Software on Tuesday announced record revenue results for the fourth quarter and full year of 2013. This marks Veeam’s 24th consecutive quarter in which quarterly bookings revenue has grown by more than 50 percent over the same period during the previous year. In 2013, annual b...
As companies produce an ever-increasing amount of data that’s pushing network and bandwidth capacity to its extremes, virtual desktop infrastructure (VDI) is becoming a popular solution to these concerns and as an effective platform for a BYOD policy. During the recent bout of intense...
We're in the middle of another major shift in computing and IT: the decline of the hard disk and the rise of solid-state memory. Solid-state has been around for a while, but it's always been expensive, volatile and low capacity. That's changing, and it's changing IT as well. Computing...
Traditional BYOD policies had two main concerns: Companies worried about security; employees worried about privacy. VDIs are almost perfectly suited to solve these BYOD issues. Bring Your Own Device policies have fascinated both the corporate world and the tech world for some time now...
Global information technology networks that are rich in services are typically complex and require hard-to-manage security solutions. The latest versions of next-generation firewalls now offer multiple security layers that can complicate management, particularly as more and more featur...
So many organizations switched to third-party help desk solutions without really putting in place any performance measures or tracking mechanisms to really measure how good – or bad – the support is. Some executives got a big bonus for “thinking out of the box” and coming up with a c...
In the race to implement Continuous Delivery, emphasis on build-and-deploy has overshadowed Continuous Testing. Service Virtualization's simulation technology allows you to test your component in a complete environment—any time you want. "Part of the problem with service virtualizati...
Rather than talking about what others should do or consider for their data protection needs, for this post I wrote down some notes using my Livescribe about what I need and want for my environment. As part of walking the talk in future posts I'm going to expand a bit more on what I'm d...
“Cloud computing” is more than just a buzzword – it has transformed the tech industry. Having been in the business of building enterprise infrastructure for over 15 years, I’ve had the opportunity to witness how cloud has altered the landscape, including most recently at my company, Ne...