Web Security Journal

Fraud is definitely top of mind for all banks. Steve Rosenbush at the Wall Street Journal recently wrote about Visa’s new Big Data analytic engine which has changed the way the company combats fraud. Visa estimates that its new Big Data fraud platform has identified $2 billion in... (more)
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get... (more)
The Benefits of Software-Defined Security At Gartner’s Security & Risk Management Summit, analysts identified 2014’s Top 10 Technologies for Information Security. They singled out software-defined security as a trend to watch, stating that because its “impact on security will be... (more)
The very name is kind of ridiculous, don't you think? The word "ephemeral" means it can go away. It's temporary. Fleeting, even. So why would I want to depend on storing something in a medium that can disappear without warning? And why am I forced to buy more of it when all I wan... (more)
Download Slide Deck: ▸ Here New Security Models for the 'Internet of Things' The Internet of Things needs an entirely new security model, or does it? Can we save some old and tested controls for the latest emerging and different technology environments? In his session at Inter... (more)
A few months ago, I spoke at the conference where I explained the difference between caching and an in-memory data grid. Today, having realized that many people are also looking to better understand the difference between two major categories in in-memory computing: In-Memory Dat... (more)
AWS Security Tips from Amazon Web Services CISO, Stephen Schmidt In a recent interview at AWS re:Invent, the vice president of AWS security engineering and the chief information security officer of Amazon Web Services, Stephen Schmidt, had these cloud security tips for AWS custome... (more)
Why the Fast Data World Needs a Proven and Mature In-Memory Data Fabric Much of what human beings experience as commonplace today - social networking, online gaming, mobile and wearable computing -- was impossible a decade ago. One thing is certain: we're going to see even more im... (more)
There are boggling challenges on the planet, each of them affecting all of us, one way or another. Food. Clean water. Vaccinations. Health care in general. Then those second-level concerns which are also catalysts for the big problems: transportation, communications, finance. Th... (more)
Cloud computing is increasingly becoming part of the enterprise IT landscape. In fact, a recent cloud security survey conducted by HP reveals that 70 percent of all respondents say their company is using some form of the cloud. The study also found that cloud penetration jumps to... (more)
FBI Provides An Update On Sony Hack Investigation Including Some Tech Details On Attribution The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the pas... (more)
Executive Viewpoint 2015 Prediction: Porticor – 2015 will be the Year of ‘Encrypt Everything’ Several current trends in cloud computing leading into 2015 actually exhibit a tension between themselves. One trend, a well-known fact that will continue in the New Year to a greater e... (more)
Your Enterprise Has Too Many Cyber-ish People By John Scott Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. etc, but really should it be? It seems more like a jobs program that moves ... (more)
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to ... (more)
Three Reasons Why Sony Hack Will Change Security By Anup Ghosh Editor’s note: As an advisor to Invincea I closely track not only their capabilities but the context they provide the community. Anup Ghosh, CEO of Invincea published well reasoned context on the Sony Hack at the Invi... (more)
Cloud Adoption Trend is Driven by Strategic Imperatives As this year comes to a close, let's take one last look at the most pervasive cloud computing trends -- including increased usage across the different cloud service models, the key business drivers and the impact of agile i... (more)
The Sony Hack, It’s Still Not War Or Terrorism By SeanLawson For more than a decade we have heard constant warnings about the coming of “cyber war” and “cyber terrorism.” The prophets of cyber doom have promised that cyber attacks are just around the corner that will be on par ... (more)
Multi-Factor Authentication: Eight Considerations for CXOs For business leaders today, it's not enough to drive company growth, seek competitive advantages and provide vision. In this era of advanced cyberattacks, executives also need to keep their companies' data security strat... (more)
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufactu... (more)
The Quotable @ScottMcNealy Said: Trying to run a business without awareness of the cyber threat is asking to be fired By Bob Gourley The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking ou... (more)
© 2008 SYS-CON Media