Welcome!


Latest Blogs from Web Security Journal
For business leaders today, it’s not enough to drive company growth, seek competitive advantages and provide vision. In this era of advanced cyberattacks, executives also need to keep their companies’ data security strategies top of mind. The Ponemon Institute’s 2014 Cost of Data Breac...
Successful hacks can paralyze websites, enable corporate or personal data to fall into the wrong hands and potentially damage the image, reputation and sales pipeline of the organization under attack. For many, this begs the question ‘Why us?’ To find out, let’s delve into the psyche o...
For many of us in the enterprise software industry, modernizing IT while maintaining legacy systems is a tightrope walk where it pays to look ahead, stay balanced, and be nimble. As 2014 races to a close, those of us focused on terminal emulation software solutions have a responsibil...
When the Tsunami of system failures paralyzes your organization from a coordinated cyber-attack, it’s too late for the CEO to think your organization can “get through this event.” It’s too late. Too many top executives and futurists are giddy about what the future holds with the “Int...
The time of year that crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen.
Data security has long been thought the exclusive domain of large enterprises. Why would cyber-criminals bother with small and midsized companies when the big prizes are to be found hacking into large organizations? Unfortunately an increasing number of smaller companies find themselv...
Eighty-nine percent of knowledge workers retain access to the sensitive corporate applications and files of former employers. Earlier this year, a member of the team at Site-Eye, one of the top time-lapse film companies in the UK, noticed a disturbing problem with one of its client'...
The speed of product development has increased massively in the past 10 years. At the same time our formal secure development and SDL methodologies have fallen behind. This forces product developers to choose between rapid release times and security. In his session at DevOps Summit, M...
In 2007, there were virtually no mobile apps. Last year alone, over 100 billion apps were downloaded, generating $26 billion in sales. App stores operated by Apple and Google now offer more than a million apps each and people every day depend on apps like Facebook, Google Maps and Uber...
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possibl...
The cloud has made many things simpler by allowing us to achieve economies of scale, eliminating the software installation process and enabling access of information from virtually anywhere. The list of benefits goes on, but contrary to popular belief, moving to the cloud will not make...
Got a plan for your move to the cloud? If you do, you’re in the minority. According to a recent study, a mere 31 percent of those planning a move to the cloud actually have a strategy for migrating data and applications. The rest don’t. To avoid the complexity and cost, we recommend h...
Depending on whom you listen to, the private cloud is either dead or on the cusp of a major market breakthrough. Some tech pundits argue this technology has already been replaced by more efficient public cloud offerings and businesses just need time to catch up, while others claim ther...
The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee ...
Over the last decade, cloud computing has undeniably become a critical component of the modern enterprise. It has evolved past Software-as-a-Service for a select number of enterprise applications to encompassing entire business platforms, spanning various business devices and operating...
Don’t emphasize network security at the cost of endpoint security; the two can be integrated and work hand in hand. The result is a safer, more secure business ready for the challenges of the future.
Operationalization (which is really hard to say, go ahead - try it a few times) is a concept that crosses the lines between trends and technologies. Both SDN and DevOps share the notion of "operationalization" as a means to achieve the goal of aligning IT with business priorities, like...
Long story short, remote wipes aren’t a perfect solution. The original intent had some validity, but it also raises too many concerns. Wiping is really only an effective solution in an ideal world. Unfortunately, thieves don’t play by the rules and find ways around our solutions. For t...
I was recently on a business trip out to Wausau, WI. The purpose was to conduct a training session on web application development for a new batch of associates at our onshore development center. When I picked up my rental car at the airport, I was very happy to discover it had built in...
You don't necessarily get 2x the value from your logs when your volumes double. Value is more aligned with the analysis and trends you can extract from your data. It's no secret that log data is quickly becoming one of the most valuable sources of information within organizations. The...
It’s a clear message being heard across the industry - widespread adoption of cloud applications is only a matter of time. However, the tricky part for many is, how much time do organizations actually have to hold out? And why should they switch? For starters – the cost savings are cl...
Cloud security is a top concern for any organization migrating to the cloud. The threats are many. For example, the fact your data resides in a shared, multi-tenant environment is a threat that has become a reality with the latest Xen virtualization bug, which allowed a malicious fu...
At first glance, it might seem that the goals of DevOps and regulatory compliance are inherently at odds. Whereas much of the buzz around DevOps advocates delivering software at dizzying rates, compliance and security are concerned with proper oversight of the change management process...
Storing data of any kind on the cloud can be a risk, but there are ways to mitigate the risks. With such an abundance of cloud providers, there are plenty of options for you to choose from for security purposes. Finding a vendor that encrypts data in motion as well as data at rest is a...
Much of what human beings experience as commonplace today - social networking, on-line gaming, mobile and wearable computing -- was impossible a decade ago. One thing is certain: we're going to see even more impressive advances in the next few years. However, this will be the result of...
The path to successful application delivery has been a long and winding road for many companies. Back in the days of Y2K and the dot-coms, applications were often delivered out of a physical data center. This usually consisted of a dedicated raised-floor room at the corporate headquart...
Despite the data privacy protections supposedly conferred by regulations like HIPAA and HITECH, consumers’ confidential health and personal information is still not safe enough. That’s the lesson to be learned from Franklin, TN-based Community Health Systems’ (CHS) August 18 regulatory...
The Amazon Web Services public infrastructure cloud is seeing massive adoption, and for good reason. Using AWS arms companies with advanced infrastructure that, in most cases, they could not possibly achieve in their own datacenters. In fact, According to Gartner, AWS has 5 times more ...
It is no doubt that the latest and greatest technologies get your juices flowing. Researching the details, comparing the benchmarks, imagining the differences you could make within your organization if you could just put the right technology solutions in the right place. If only budget...
Earlier in the year, Gartner forecast that by year-end 2016, more than 50 percent of global companies will have stored customer-sensitive data in a public cloud platform. These services can scale very quickly, which has made them very popular for applications that have a requirement fo...
Enterprise applications are increasing in complexity, with multi-tier and distributed applications being the new standards for dealing with high-volume, high-scale requirements. In many development environments, the ideal scenario is to enable DevOps teams to manage dev/test environmen...
Shellshock, appropriately and of course punnily named, is ravaging the Internet right now. Active exploits continue to grow in number and in complexity. While there are multiple avenues through which this vulnerability can be exploited, the most active one at the moment appears to be ...
With the capability to reduce both CapEx and OpEx, it’s easy to see why the SDN-NFV trend has taken hold in the hosting and mobile industry. Early use cases include network virtualization from cloud service providers and enterprise data centers, bandwidth calendaring and network tappin...
Data is arguably the most prolific and most valuable of resources. As such, it needs to be protected both as a company asset and in keeping with data privacy laws. Data protection is most acute in healthcare, which is something of a latecomer to fast-evolving heterogeneous electronic e...
Electric Cloud's Juan Jimenez recently blogged: "Consider this statement of truth – the bane of any Continuous Delivery strategy is testing. You can have wildly fast builds...completely automated Continuous Integration and Delivery... but if your Continuous Testing slows your Agile-ity...
You can't truly accelerate the SDLC without a dependable continuous testing process. Evolving from automated to continuous testing requires on-demand access to a complete, realistic test environment. Yet, such access can be extremely difficult to achieve with today's increasingly compl...
Do you avoid stores that have had a credit card breach? You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the impact of identity theft on consumer behavi...
In a post Snowden world it is clear that for cloud data security, we need strong encryption. When properly implemented, encryption in the cloud reduces risk to levels acceptable for sensitive data. There is no doubt data protection in the cloud computing era is never going to be a ‘...
In the video at this link and embedded below I provide some context on new approaches to data can enhance outcomes for public sector organizations, with a focus on real world use cases. I also mention key requirements which apply at most government organizations for their data and how ...
On the one hand, the BYOX trends that drive cloud service adoption and worker self-enablement are transforming traditional IT into a User-Centric IT model that focuses on empowering and enabling workers. On the other hand, the free-wheeling nature of the cloud and the regular news of ...