Web Security Journal

By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal ... (more)
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data secu... (more)
CIOs are increasingly concerned about cloud security. And they should be. With the recent outbreak of visible breaches at high-profile organizations like Target, Anthem, and others, and the subsequent damage they cause, corporations are scrambling to make sure their cloud applica... (more)
Cyber Attacks We continue to see an increasing trend in cyber-attacks in line with the growth of new technologies, and enterprises have to protect themselves. It is critical for enterprises to devise their own measures to protect against cyber-attacks because any tolerance on thi... (more)
As we kick off 2015, I predict that this will go down in history as the year of the Threat Intelligence Platform (TIP). We say goodbye to the year of the advanced persistent threat (APT) in 2014, just as this time last year we waved adieu to mobile device management (MDM). We've... (more)
Finding Security a Home in a DevOps World Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps a... (more)
The next edition of the HP Discover Podcast Series explores how a Tunisian IT services provider improves their IT service management (ITSM) offerings and capabilities leveraging cloud-based services. To learn more about better IT control and efficiency using the latest ITSM tool... (more)
​Peeling Back the Layers of the Cloud Security Onion I had the chance to sit down with Lee Slaughter, Skytap's Manager of Information Security, to discuss security in the cloud, the efforts that make up a thorough due diligence when choosing a cloud provider, and how to keep up ... (more)
NaviSite, Inc., a Time Warner Cable company, has opened a new enterprise-class data center located in Santa Clara, California. The new data center will enable NaviSite to meet growing demands for its enterprise-class Cloud and Managed Services from existing and new customers. Thi... (more)
Derive Insights from Any Data, Not Just Big Data Big Data is amazing, it's life changing and yes it is changing how we see our world. Big Data, however, can sometimes be too big. Organizations that are not amassing massive amounts of information and feeding into their decision b... (more)
Many businesses are realizing the advantages of moving essential business services to cloud-based models, including communications, voice, and CRM. The associated advantages of the cloud have allowed businesses to be more flexible, scalable and enjoy higher cost savings. However,... (more)
Understanding FedRAMP and Overcoming Obstacles FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice,... (more)
In this demo at 15th Cloud Expo, Derek Tumulak, Vice President of Product Management at Vormetric, takes you through what Vormetric does, and some of the data security capabilities they offer. A lot of times you don't need high-tech solutions to solve problems; a lot of times it... (more)
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufactu... (more)
The benefits of cloud billing can be irresistible. Always-on availability, flexibility, elastic scalability, low cost, global reach. But with high-profile security breaches from the likes of Target, Sony and health insurer Anthem, it's understandable that thinking about turning y... (more)
CommVault has launched Simpana for Endpoint Data Protection, a new solution set designed to help protect and enable the mobile workforce by efficiently backing-up laptops, desktops and mobile devices and providing secure access and self-service capabilities. With today's mobile ... (more)
Four Steps for Securing Your Data in the Cloud with Identity and Access Management Cloud has become part of the enterprise landscape with nearly 90 percent of businesses having adopted cloud-based apps and services. However, organizations need to make sure that these cloud solut... (more)
At the end of the year, WhiteHat Security posted an interesting blog titled, "The Parabola of Reported WebAppSec Vulnerabilities" in which a downward trend in web application vulnerabilities (as collected by the folks at Risk Based Security's VulnDB) was noted beginning in 2008 a... (more)
The Three Most Important Benefits of Infrastructure as a Service Cloud computing offerings are almost overwhelming at this point. There are so many different services and service providers competing for your business that it can be hard to know what's really best for you. Understa... (more)
Why a Data Security Platform Should Be a Priority for Your Enterprise by Derek Tumulak When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact pe... (more)
© 2008 SYS-CON Media