Web Security Journal

Hybrid Cloud: The Benefits Go Way Beyond the Total Cost of Ownership Savings Today, IT is not just a cost center. IT is an enabler and driver of business. With the emergence of the hybrid cloud paradigm, IT now has increasingly more capabilities to create new strategic opportuniti... (more)
Five Security Practices That Can Hinder Your Business How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements ... (more)
For most C-level executives (and most of the rest of the planet too), the concept of ‘risk' is generally first perceived as a negative. The notion of risk as a business positive (or a ‘business enabler' even) is fanciful, flaky and fraught with fallibility - isn't it? This propo... (more)
Three Keys to Success for Continuous Monitoring in Government In recent years, the US government has become a leading advocate for continuous monitoring of security threats and vulnerabilities. But how effectively are departments and agencies in implementing these programs? And ... (more)
Les Hazlewood, Stormpath CTO, already showed you how to build a Beautiful REST+JSON API. Now learn how to secure your API, handle API authentication, and manage API keys and authentication tokens for server, JavaScript and Mobile clients. Les will deep dive into technical best p... (more)
Four Biggest Fears of the Modern IT Manager What keeps an IT manager up at night? Ghosts, goblins and ghouls? Guess again. It takes more than a few measly monsters to cause a lack of sleep in today's IT department. IT used to exist primarily to monitor and maintain systems, prote... (more)
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company... (more)
SaaS Bill of Rights - It's All About the SaaS By Alan Kessler Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve ... (more)
One of my recent conversations with a Cloud security expert at a conference opened up doors to some new information for me personally. Our conversation was around the current status of the Cloud Industry, the security challenges and how we can make the Cloud more secure and so on... (more)
Replication, Backup, and Recovery, the Trends and Realities One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will ... (more)
SYS-CON Events announced today that Litmus Automation will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Litmus Automation's vision is to provide a solution for companies that are in a ru... (more)
This book is a beast!!! It is 100% textbook, with a lot of exercises at the end of the chapters. If your class uses this book, get ready for a fire hose of information. It covers a ton of topics and covers them in depth. Although it is a text book the authors do there best to keep ... (more)
Security as Code One of the most difficult things to do today, given the automated environments in which we operate, is to identify a legitimate user. Part of the problem is that the definition of a legitimate users depends greatly on the application. Your public facing website,... (more)
SYS-CON Events announced today that WHOA.com, an ISO 27001 Certified secure cloud computing company, has been named "Bronze Sponsor" of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. WHOA.com ... (more)
Keeping data from getting out into the wild or being damaged by cyber attackers is what keeps CISOs, the executive team and boards of directors up at night. To protect organizations, cybersecurity needs to be automated and real-time, it needs to learn contextually like we do and ... (more)
Cloud-Based Disaster Recovery - No Masters in Disasters Needed The concept of a cloud facilitating applications is by no means new. Those of us who diagrammed network connectivity around 1993 will recall drawing a big puffy cloud symbol in between two local area networks. The clou... (more)
By Sam Lewis If you have a Network Operations Center (or NOC, as the kids call it), you have a skilled set of eyes monitoring your system and alerting your engineers when things go wrong. (If you have something like a NOC, such as a first tier team that processes tickets, we’re ... (more)
Five File Governance Policies and Features Companies Must Have It seems that not a week goes by without another high profile data breach or revelation about lax security, both on premise and on-Cloud.  Given this companies should, at a bare minimum, consider implementing the follo... (more)
Announcing SafeLogic Named “Sponsor” of @CloudExpo New York SYS-CON Events announced today that SafeLogic has been named "Collectible Conference Bag Sponsor" of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New Y... (more)
I’ve been traveling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on a multi-week European vacation. Af... (more)
© 2008 SYS-CON Media