Welcome!


Latest Blogs from Cloud Security
Advances in thin clients, desktop virtualization (VDI), cloud management services, and mobile delivery networks are allowing both increased security and edge applications performance gains. The next BriefingsDirect thought leadership panel discussion focuses on the heightened role of ...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Pro...
Edge Hosting has announced a partnership with and the availability of CloudFlare, a web application firewall, CDN and DDoS mitigation service. “This partnership enhances Edge Hosting’s world class, perimeter layer, application (layer 7) defensive mechanism,” said Mark Houpt, Edge Host...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a ri...
Information security has become a critical priority for many businesses over the past decade, and for good reason. It seems like a new breach is exposed on nearly a daily basis, impacting another organization and its patrons. However, some companies believe that they're safe because th...
The U.S. Army Intelligence and Security Command (INSCOM) has awarded BAE Systems a five-year contract worth as much as $75 million to provide enhanced geospatial intelligence technical and analytical support. The award was issued under the INSCOM Global Intelligence indefinite deliver...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a ri...
Many of you are very familiar with iRules, our Tool Command Language (Tcl) based scripter. It’s a powerful application delivery tool to have a programmable proxy that allows you to manipulate – in real time – any network traffic passing through the BIG-IP. Many BIG-IP fans have used it...
We now work in a world in which data flows to and from the cloud across platforms, geographies and applications. In his session at 18th Cloud Expo, Jeff Greenwald, Senior Director of Market Development at HGST, will discuss the millennial approach to managing how data is stored, prote...
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc....
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Pro...
Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology flexibility and agility. Containers work on both public and p...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your ...
TierPoint has been selected by GlaxoSmithKline (GSK) to support the company's global data consolidation and protection initiatives. GSK is a research-based pharmaceutical and healthcare company. As part of its overall strategy to increase growth, reduce risk and improve long-term fina...
As the march to connect each and every noun on this planet continues with a blistering pace, the various ways, contraptions and sensors used to collect data is greatly expanding. What once was a (relatively) small collection of fitness trackers, smartwatches, thermostats, automobiles a...
Internet of Things (IoT), hybrid cloud services, mobile-first, and DevOps are increasing the demands and complexity of the overall development process. Key factors to improving both development speed and security despite these new challenges include new levels of collaboration and com...
As we have seen the growth in security challenges across the organization, we have also seen the growth in security spending and number of products that an enterprise buys. But have we, as an industry, been able to show that we are better off or worse? There is no clear yardstick to me...
The cloud provides two major advantages to load and performance procedures that help testing teams better model realistic behavior: instant infrastructure and geographic location. Cloud-based load testing also lowers the total cost of ownership, increases flexibility and allows testers...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-...
If we are involved in a cyber-war, where are the frontlines? What are the defenses that will work? Much of the efforts done so far in cybersecurity are nothing more than building an ineffective Maginot Line for cyber-defenses. Should we be spending more time (and money) in figuring ou...
Software as a Service (SaaS) is a model that has become a popular choice for deploying enterprise applications, delivering efficiencies and value to organizations in many ways. The benefits SaaS solutions deliver include not only avoiding the major resource drain and licensing costs as...
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DN...
Panzura has announced the results of its “State of Manufacturing Cross Site-CAD Collaboration” survey conducted at SOLIDWORKS World 2016. The survey details the top challenges that manufacturing professionals face when working within Computer Aided Design (CAD)/Computer Aided Manufactu...
Riverbed Technology has announced Australia-based packaging company, Visy, is the first organization to deploy a Riverbed and Microsoft joint solution designed to eliminate the headaches of its branch office IT infrastructure, improve business continuity and minimize business disruptio...
We all awoke last week to the latest regulatory and reputational risk since names like Madoff and Snowden burst into the headline. Weekly, there are smaller local skirmishes between the behavior of companies, public officials and the prying eyes of an ever more symbiotic relationship b...
Software as a Service has been around for a while. In its early years—late 1990s-early 2000s—it was mostly aimed at individual and departmental use, but in more recent years SaaS has been deployed at the enterprise level. There are companies that don’t use anything else. In the beginn...
Avnet Memec - Silica, StarChip, and Trusted Objects have announced their partnership for the deployment of an optimized security platform, encompassing a family of certified secure elements with tailored security protocols from sensor to enterprise server and unique personalization ser...
Whether intentional or accidental, data leaks are a huge concern for organizations. And it has been for years. Going back to a 2004 survey from an IT security forum hosted by Qualys, found that 67% of security executives do not have controls in place to prevent data leakage, A December...
VASCO Data Security International has announced that eSignLive ™, the e-signature choice for government organizations, has worked with Cloud Services Provider (CSP) Project Hosts to deliver its electronic signature solution in a FedRAMP SaaS-level compliant cloud. U.S. government agenc...
If you read our blog regularly then you know we’re pretty bullish about our OnPrem Agent product and its behind-the-firewall user-experience monitoring capabilities. What does it mean to monitor behind the firewall? Essentially you’re bringing Catchpoint’s Synthetic Monitoring capab...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and t...
This is an excerpt of some concepts from his upcoming book, NANOKRIEG: BEYOND BLITZKRIEG, a book covering the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare. With the latest terrori...
CloudPassage has announced the results of a recent study analyzing cybersecurity education at undergraduate computer science and engineering programs at top American universities. According to the findings, not one of the top 10 U.S. computer science programs (as ranked by the U.S. New...
QNAP® Systems, Inc. has released the new enterprise-class rackmount TVS-ECx80U-SAS R2 and TS-ECx80U R2 NAS series. Both series include two built-in SFP+ based 10GbE ports while keeping the same price tag as the previous TVS-ECx80U-SAS/TS-ECx80U series. The TS-ECx80U R2 series also incl...
The use of Electronic Medical Records (EMR) by medical professionals has increased dramatically. According to HealthIT.gov, 2015 statistics show that 56 percent of all U.S. office-based physicians (MD/DO) have demonstrated meaningful use of electronic health records. The downside of th...
Pivot3 has announced the availability of Edge Protect, a hyperconverged SAN storage solution for mid-sized and remotely distributed surveillance applications. Edge Protect delivers enterprise-class IT capabilities on off-the-shelf x86 server hardware, enabling users to realize the bene...
Arista Networks, Inc. (NYSE: ANET), has announced financial results for its fourth quarter and year ended December 31, 2015. Revenue of $245.4 million, an increase of 41.5% compared to the fourth quarter of 2014, and an increase of 12.8% from the third quarter of 2015. Non-GAAP gross...
I came across this great article in CIO from Mary Branscombe, in which she discusses the perceived security concerns of moving fast with DevOps. She addresses the concerns people feel towards the speed of rapid releases, automation, and continuous integration and deployment, all of whi...
Trend Micro International has announced the close of an agreement to acquire TippingPoint from Hewlett Packard Enterprise (HPE). Trend Micro TippingPoint solutions are immediately available to bring customers comprehensive threat intelligence and protection for current and zero-day vul...
Private, public or hybrid cloud? This is the question that is being asked by C-level executives and IT professionals across the globe, as each enterprise continues to mature its cloud strategy and rethink the earlier role of cloud and whether to move away from an all public or private ...