Web Security Journal

Bitium, based in Santa Monica, CA, works in the cloud to provide secure management of an enterprise's applications, users, and passwords in one place. We asked company Co-founder and CEO Scott Kriz (pictured below) a few questions about the company's vision and strategy. Cloud C... (more)
Enterprise applications are increasing in complexity, with multi-tier and distributed applications being the new standards for dealing with high-volume, high-scale requirements. In many development environments, the ideal scenario is to enable DevOps teams to manage dev/test envi... (more)
Software-Defined Security: Automating Policy in the Cloud Compute virtualization has been transformational, yet security policy implementation and enforcement has lagged behind in agility and automation. There are a number of key considerations when implementing policy in private ... (more)
Thriving in a Cloud, Big Data, Mobility and Security World This is the theme at this year's Dell World opening keynote and this view is supported by Gartner's Top 10 Strategic Technology Trends for 2015: Computing Everywhere - As mobile devices continue to proliferate, Gartner pr... (more)
How a Birth Certificate Will Secure the Internet of Things Connected devices are changing the way we go about our everyday life, from wearables to driverless cars, to smart grids and entire industries revolutionizing business opportunities through smart objects, capable of two-w... (more)
IBM Keynote at @ThingsExpo: Convergence of Big Data, Cloud & the Internet of Things Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean ... (more)
What You May Be Overlooking When it Comes to Endpoint Security Protecting your company's data seems like a nearly impossible task these days. Security horror stories pop up with frightening regularity, detailing business after business falling victim to security breaches that cost... (more)
Depending on whom you listen to, the private cloud is either dead or on the cusp of a major market breakthrough. Some tech pundits argue this technology has already been replaced by more efficient public cloud offerings and businesses just need time to catch up, while others clai... (more)
The Internet of Things needs an entirely new security model, or does it? Can we save some old and tested controls for the latest emerging and different technology environments? In his session at Internet of @ThingsExpo, Davi Ottenheimer, EMC Senior Director of Trust, will review... (more)
The State of Enterprise Cloud Computing and How to Move Toward the Future Over the last decade, cloud computing has undeniably become a critical component of the modern enterprise. It has evolved past Software-as-a-Service for a select number of enterprise applications to encompas... (more)
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufactur... (more)
The Cloud, Security and Breaches – Are the Barbarians at the Gate? Target. Home Depot. Community Health Systems. Nieman Marcus. Their names have been all in the news over the past year, though probably not in a way they would like. All have had very public data breaches affecting ... (more)
By Lohit Mehta Every organization should follow a proactive rather than a reactive approach to protect against threats, risks, and vulnerabilities to which if their IT infrastructure is exposed can lead to data loss, regulatory penalties, lawsuits, and damaged reputation. Moving... (more)
DevOps, Cloud and Your SDLC Cloud computing started a technology revolution; now DevOps is driving that revolution forward. By enabling new approaches to service delivery, cloud and DevOps together are delivering even greater speed, agility, and efficiency. No wonder leading inn... (more)
The cloud is proving to be a useful tool for businesses both large and small. What started out as an innovative idea has quickly transformed into a vital component of many business practices. Demand for cloud storage has only increased with each passing year as more and more data... (more)
Cloud Shifts the Burden of Security to Dev The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, to discuss how developers are extremely we... (more)
Security Issues in Cloud Computing: Porticor’s AWS Experts Discuss In a recent webinar, Porticor’s AWS cloud security experts took on the security challenges companies face when migrating to AWS (and other IaaS clouds) and offered alternatives that enable IT Directors to take adva... (more)
Shellshock, appropriately and of course punnily named, is ravaging the Internet right now. Active exploits continue to grow in number and in complexity. While there are multiple avenues through which this vulnerability can be exploited, the most active one at the moment appears ... (more)
Editor’s note: This post by Invincea CEO Anup Ghosh first appeared at LinkedIn. We knew this would be of interest to you and posted it here with the author’s permission.-bg I’ll say it up front, your security program does not work because it is based on three common myths we hol... (more)
UPDATE (9/28/2014): Our security team indicates that we're now seeing the majority of attempted exploits of Shellshock coming in through input parameters. They've provided ASM signatures to mitigate and recommend customers use these signatures to protect their applications. You c... (more)
© 2008 SYS-CON Media