Welcome!


Latest Articles from Web Security Journal
One key element that is often missing in the avid discussions on what’s keeping more enterprises out of the cloud is a common recognition that storage in the cloud is simply not what it should be. It may surprise you, but to a large degree the solution to some of the cloud’s biggest co...
With the end of the year buzz around predictions, it's hard not to join in the conversation. Our CenturyLink Cloud leadership team came together for a few predictions for the year head – and to show we are keepin' it real, we scored last year's predictions as well. 1. Enterprise-buye...
information and other data that must be protected. Medical practices, credit unions and independent retailers all face HIPAA, PCI and other standards. With so many regulations and limited budgets, how can small businesses keep up? Here are the top security mistakes that leave SMBs vuln...
When we set out to build the PerspecSys Cloud Data Control Gateway, we faced an important design decision: would the market prefer an “All-in-One” or a “Best-of-Breed” Cloud Security Broker? In the “All-in-One” camp, IT professionals have come to learn that the bundled modules from a ...
Recurring Revenue expert Aria Systems commends Condé Nast’s decision to launch a new division for online shopping and kindly invites the publisher of the world’s top magazines to a conversation about all the possible recurring revenue models they could employ to ensure success. Recent ...
TelecityGroup has won the “Best Data Center” award at Capacity Media’s 2013 Global Carrier Awards held in Amsterdam. The award recognizes TelecityGroup’s innovation, vision and excellence in delivering the premium data center environments for the global carrier community. In particul...
Axis Communications has announced the next generation of its market-leading system-on-chip for network video cameras and video encoders. The new ARTPEC-5 is based on dual core multiprocessor architecture, features a larger cache size and higher memory throughput. More processing power ...
VASCO Data Security International, Inc., announced on Thursday that it is collaborating with Kanoo Information Technology, a division of the E.K. Kanoo group of companies, to bring the VASCO authentication services to the Bahrain market. Kanoo Information Technology (Kanoo IT) combine...
Now that Big Data has become a household name, 2014 will be the year companies demand solid proof that data can help their decision-making and their bottom line. As the entire web becomes a seamlessly connected data warehouse, I predict that organizations will have the power at their f...
Avago Technologies Limited and LSI Corporation on Monday announced that they have entered into a definitive agreement under which Avago will acquire LSI for $11.15 per share in an all-cash transaction valued at $6.6 billion. The acquisition creates a highly diversified semiconductor ma...
In my last post, we learned that services are only like products if you are willing to oversimplify them. And if you oversimplify them, you can miss out on business opportunities. Services (actions supported by things) differ in several important ways from products (things supported b...
In a recent IDG News survey, high-ranking IT executives in North America and Europe were asked about the effect the NSA snooping practices have had on their cloud computing strategy. Despite the furor over the NSA, these leaders are still committed to the cloud. The Cliff's notes: In...
SecuritySolutionsWatch.com: Thank you for joining us today, Bryan. If you wouldn’t mind, please tell us a little bit about your background and your role at HP. Bryan Coapstick: As the Director of Mobile Innovation, I am responsible for ensuring that HP’s mobility initiatives successfu...
Explores three ways to help development teams bear the burden of security: use pen test results to harden the application, leverage service virtualization for security scenarios, & adopt policy-driven development to help engineers understand and satisfy management’s security expectatio...
We discussed my belief that the nines (99.99…%) are more marketing than the real deal today - What do you think? The market and tools used to measure your uptime immature or do not really exist. The concept of availability in the cloud is determined by the level of responsibility and l...
Disaster Recovery (DR) has typically only been used by organizations for applications deemed to be mission critical. This was because organizations didn’t want to incur the expense associated with DR for less important applications. Today, because of cloud computing, many organizations...
For some organizations, cloud computing can be a hard sell, even before you come to the question of how to handle cloud-computing security. Public cloud, private cloud, hybrid cloud, encryption, tokenization, data residency, privacy regulations – all are factors involved and the percei...
Within the ThreatConnect Intelligence Research Team (TCIRT), we feel that sharing what we know, whether publicly or privately, helps to grow our organization. We see information sharing as a key investment area, allowing our team to more efficiently save time and money while helping u...
"It's been a great show for NetIQ - we've had the opportunity to speak about how NetIQ is enabling the cloud - how we are allowing customers to get access to cloud services that enable service providers to deliver cloud services in a secure, compliant manner," explained Gary Ardito, Ch...
GreenButton™ on Thursday announced the GreenButton WarpDrive, a solution providing accelerated and secure transfers of large datasets to the cloud. Previously this capability was only available to GreenButton customers for running Big Compute and Big Data workloads; however, demand fro...
I had the privilege last week to present alongside Forrester Research's enterprise mobility expert John McCarthy in London. I was able to write a full page of notes from his presentation that I share here with you. The Age of Cheap and Cheerful Mobile is Over! It's now going to be c...
SysAid Technologies Ltd. on Wednesday announced it is using PEER 1 Hosting technologies within its new cloud-based data center to serve SysAid’s North American cloud customers. In addition to supporting SysAid’s existing cloud customers, its new data center, powered by PEER 1 Hosting t...
VaultLogix on Wednesday announced that it has purchased and is implementing EMC’s Isilon NAS scale-out storage products to ensure that its services for customers are the fastest, most reliable, and secure in the industry. EMC’s Isilon offers massive scalability with the world’s fastes...
Next month, the Network Centric Operations Industry Consortium (NCOIC) will introduce an open pattern that will enable governments, agencies and businesses to create a secure, hybrid IT environment quickly and cost effectively. Cloud computing expert Kevin Jackson has been named to lea...
Perpetual preparedness is tough to maintain. Vulnerability management tends to be an overwhelming task because of the growing number of devices and continual stream of warnings, alerts and notifications— whether it is security patches or zero day exploits, you name it. Mapping how thes...
"We have a threefold product and an in-memory database is our core platform, which helps our customers do completely net new workloads and we has some interesting high-performance use cases," explained Jon Webster, VP Business Development at GridGain Systems, in this SYS-CON.tv intervi...
A distributed denial of service (DDOS) attack on a Bitcoin wallet and transaction facilitator netted hackers with 1,265 Bitcoins worth $1 million. The hack attack started on November 15th, and it followed several other nefarious online maneuvers over a period of 48 hours. The victim is...
Synchronoss Technologies on Monday announced that it has reached 10 Million Personal Cloud Subscribers throughout the world since launching its Personal Cloud Platform this summer. Synchronoss' Personal Cloud Platform is an industry leading personal cloud solution that enables mobile o...
Growing trends such as BYOD will fuel the move to more pervasive use of identity and access management as a service, driven by the need for pervasive access and management and broader security concerns. Business trends like bring your own device (BYOD) are forcing organizations to saf...
As more business applications move to the cloud, security seems to be top-of-mind for all concerned parties. Also, the Bring Your Own Device (BYOD) to work trend, along with more smartphones and tablets that require wireless connectivity in the workplace, has increased the level of con...
AppZero, the fastest, most flexible way to move server applications, announced today its predictions for top Enterprise IT priorities as we head into 2014. Based on its research and work within the industry, AppZero declares modernization as the top priority for any Enterprise IT depa...
Identity Management (IDaaS) & Access Mgmt (SSO) solve similar but separate issues, but both serve as a cornerstone of an integrated security initiative. One of the biggest misconceptions in cloud security is the perception that identity management (IDaaS) and access management (SSO) a...
Many technologies have made their presence felt this year and continue to excite us with the promises they hold for the future. Cloud computing has now reached a stage where businesses are seriously experimenting and are starting to reap the transformational benefits it can deliver. If...
IBM has signed an agreement with Dexia and several major financial institutions in Europe to build and manage their IT infrastructure previously managed by Associated Dexia Technology Services (ADTS). As a result of this agreement, IBM takes a controlling share in ADTS establishing an ...
Our new survey tells us that up to 50% of online shoppers this year will use their mobile device. Good news is that most retail stores that have an online store now also offer a mobile version, e.g., http://m.gap.com, http://m.jcpenney.com, http://m.bestbuy.com. In the past years we ha...
As we move closer toward everything-as- a-service (XaaS), the title “Internet of Agents” seems to fit what is really happening. Agents are systems and devices that sense what is going on, and they exchange information with and act on behalf of other agents and people in ways that ultim...
“We see many companies looking to adopt BYOD strategies for employees, but few who are solely BYOD,” observed Milja Gillespie, Director of Product Marketing, Mobile Security, SAP, in this exclusive Q&A with Cloud Computing Journal. “Often, they offer corporate devices for certain types...
Telx together with Peak® (formerly PeakColo) announced on Thursday Peak's expansion into two Telx data centers, SCL2, a 40,000 square foot data center at 2820 Northwestern Parkway in Santa Clara, California and in ATL1, a 160,000 square foot data center located : at 56 Marietta Street ...
CloudEntr allows users to gain convenient access to all their web-based applications by authenticating just once with a unique log-in credential. With CloudEntr businesses are also able to smoothly transition from weak user-selected passwords to stronger protection, through complex pas...
Ixia has announced that it has completed the previously announced acquisition of Net Optics, Inc., a leading provider of total application and network visibility solutions. With the addition of Net Optics’ product portfolio, Ixia will offer industry-leading, comprehensive network visib...