Welcome!


Latest Blogs from Cloud Security
The cloud provides two major advantages to load and performance procedures that help testing teams better model realistic behavior: instant infrastructure and geographic location. Cloud-based load testing also lowers the total cost of ownership, increases flexibility and allows testers...
As we have seen the growth in security challenges across the organization, we have also seen the growth in security spending and number of products that an enterprise buys. But have we, as an industry, been able to show that we are better off or worse? There is no clear yardstick to me...
Wow, if you ever wanted to learn about Rugged DevOps (some call it DevSecOps), sit down for a spell with Shannon Lietz, Ian Allison and Scott Kennedy from Intuit. We discussed a number of important topics including internal war games, culture hacking, gamification of Rugged DevOps and ...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-...
If we are involved in a cyber-war, where are the frontlines? What are the defenses that will work? Much of the efforts done so far in cybersecurity are nothing more than building an ineffective Maginot Line for cyber-defenses. Should we be spending more time (and money) in figuring ou...
Software as a Service (SaaS) is a model that has become a popular choice for deploying enterprise applications, delivering efficiencies and value to organizations in many ways. The benefits SaaS solutions deliver include not only avoiding the major resource drain and licensing costs as...
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices...
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DN...
Panzura has announced the results of its “State of Manufacturing Cross Site-CAD Collaboration” survey conducted at SOLIDWORKS World 2016. The survey details the top challenges that manufacturing professionals face when working within Computer Aided Design (CAD)/Computer Aided Manufactu...
Riverbed Technology has announced Australia-based packaging company, Visy, is the first organization to deploy a Riverbed and Microsoft joint solution designed to eliminate the headaches of its branch office IT infrastructure, improve business continuity and minimize business disruptio...
We all awoke last week to the latest regulatory and reputational risk since names like Madoff and Snowden burst into the headline. Weekly, there are smaller local skirmishes between the behavior of companies, public officials and the prying eyes of an ever more symbiotic relationship b...
Software as a Service has been around for a while. In its early years—late 1990s-early 2000s—it was mostly aimed at individual and departmental use, but in more recent years SaaS has been deployed at the enterprise level. There are companies that don’t use anything else. In the beginn...
Avnet Memec - Silica, StarChip, and Trusted Objects have announced their partnership for the deployment of an optimized security platform, encompassing a family of certified secure elements with tailored security protocols from sensor to enterprise server and unique personalization ser...
Whether intentional or accidental, data leaks are a huge concern for organizations. And it has been for years. Going back to a 2004 survey from an IT security forum hosted by Qualys, found that 67% of security executives do not have controls in place to prevent data leakage, A December...
VASCO Data Security International has announced that eSignLive ™, the e-signature choice for government organizations, has worked with Cloud Services Provider (CSP) Project Hosts to deliver its electronic signature solution in a FedRAMP SaaS-level compliant cloud. U.S. government agenc...
If you read our blog regularly then you know we’re pretty bullish about our OnPrem Agent product and its behind-the-firewall user-experience monitoring capabilities. What does it mean to monitor behind the firewall? Essentially you’re bringing Catchpoint’s Synthetic Monitoring capab...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and t...
This is an excerpt of some concepts from his upcoming book, NANOKRIEG: BEYOND BLITZKRIEG, a book covering the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare. With the latest terrori...
CloudPassage has announced the results of a recent study analyzing cybersecurity education at undergraduate computer science and engineering programs at top American universities. According to the findings, not one of the top 10 U.S. computer science programs (as ranked by the U.S. New...
QNAP® Systems, Inc. has released the new enterprise-class rackmount TVS-ECx80U-SAS R2 and TS-ECx80U R2 NAS series. Both series include two built-in SFP+ based 10GbE ports while keeping the same price tag as the previous TVS-ECx80U-SAS/TS-ECx80U series. The TS-ECx80U R2 series also incl...
The use of Electronic Medical Records (EMR) by medical professionals has increased dramatically. According to HealthIT.gov, 2015 statistics show that 56 percent of all U.S. office-based physicians (MD/DO) have demonstrated meaningful use of electronic health records. The downside of th...
Pivot3 has announced the availability of Edge Protect, a hyperconverged SAN storage solution for mid-sized and remotely distributed surveillance applications. Edge Protect delivers enterprise-class IT capabilities on off-the-shelf x86 server hardware, enabling users to realize the bene...
Arista Networks, Inc. (NYSE: ANET), has announced financial results for its fourth quarter and year ended December 31, 2015. Revenue of $245.4 million, an increase of 41.5% compared to the fourth quarter of 2014, and an increase of 12.8% from the third quarter of 2015. Non-GAAP gross...
I came across this great article in CIO from Mary Branscombe, in which she discusses the perceived security concerns of moving fast with DevOps. She addresses the concerns people feel towards the speed of rapid releases, automation, and continuous integration and deployment, all of whi...
Trend Micro International has announced the close of an agreement to acquire TippingPoint from Hewlett Packard Enterprise (HPE). Trend Micro TippingPoint solutions are immediately available to bring customers comprehensive threat intelligence and protection for current and zero-day vul...
Private, public or hybrid cloud? This is the question that is being asked by C-level executives and IT professionals across the globe, as each enterprise continues to mature its cloud strategy and rethink the earlier role of cloud and whether to move away from an all public or private ...
Virtusa Corporation has been named an Aspirant on Everest Group’s recent report: HealthcarePayer Big Data and Analytics IT Services – Service Provider Landscape with PEAK Matrix™ Assessment 2015. In this report, Everest Group analyzed the capabilities of 18 IT service providers specif...
There are always threats out there on the big bad internet. The majority of breaches happen at the application layer and many OWASP Top 10s like SQL injection are still malicious favorites to gain entry. Add to that the availability of DDoS tools, anonymous proxies and the rise of hack...
This week we came across an interesting phishing campaign. Users receive a file named “paymentxxx.pdf.” The file is a recently created PDF v1.5 made with Microsoft Word 2007, which can be opened by any PDF reader—Adobe or any other. The PDF is a single-page document and contains a hype...
Thanks to the professional, virtuous work of security researchers Chris Valasek and Charlie Miller and some fantastic reporting on this research by Andy Greenberg of Wired Magazine, we have long known that theoretical hacks against cars are no longer theoretical. They are real. Many co...
Radware has announced that TeraGo Networks has chosen Radware’s DDoS Attack Mitigation solution to power their new suite of security services. Headquartered in Ontario, Canada, TeraGo Networks owns and manages a national IP network, providing service to 46 major markets across Canada....
SYS-CON Events announced today that LeaseWeb USA Inc., one of the world's largest hosting brands, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. LeaseWeb USA has announced that its platform ...
In December 1998 when transitioning into a job doing intelligence support to DoD computer network defense, one of my mentors reminded me of a Reagan-era publication that helped the public better understand the Soviet threat called "Soviet Military Power." This document was based on th...
Recently I changed some of my passwords. Some due to typical rotation time and a couple due to potential breaches and encouragement from the affected site. No, I’m not going to tell you which ones or how I go about it but I noticed that it took about 3 days for my fingers to key the co...
In the 1946 classic ‘Hair Raising Hare,’ Bugs Bunny asks, ‘Have you ever have the feeling you were being watched? Like the eyes of strange things are upon you?’ Like Bugs often did, he breaks the fourth wall and involves the audience directly, invoking a feeling that someone is looking...
This post provides an update on the ongoing battle between Apple and the U.S. government regarding Syed Rizwan Farook's iPhone, recovered by police after the horrific massacre in San Bernadino on December 2, 2015. It is just days before the March 22, 2016 hearing in this long-running...
In part one of this series, "Rugged DevOps: Survival is Not Mandatory", I shared news that 1 in 16 open source and third-party components downloaded last year included a known vulnerability. That may not seem like too many until you realize the average company downloads well over 200,...
SYS-CON Events announced today that VAI, a leading ERP software provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. VAI (Vormittag Associates, Inc.) has announced that users of its S2K ...
SYS-CON Events announced today that (ISC)²® ("ISC-squared") will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. (ISC)²® and KPMG LLP have announced they will survey federal cybersecurity executiv...
Hybrid cloud is rapidly becoming essential to today’s information technology processes. This is why hybrid cloud risk management has become the keystone to many modern corporate strategies. To effectively manage this shift, leading enterprises are reorganizing how the business side of ...