Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here IoT Security Certifications In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Download Slide Deck: ▸ Here Speaker Bio Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide recognized certification against various international standards. Download Slide Deck: ▸ Here He also has extensive experience as a trainer and an educator in the fields of Information Security, Risk Management and IT. Throughout his career, he has wor... (more)

[slides] Security of Smart Things | @ThingsExpo @Ford #IoT #IIoT #M2M #DX #SmartCities

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Security of Smart Things With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. Download Slide Deck: ▸ Here In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interactively to engage with the audience and consisted of the following three parts: Smart Things, benefits and risks Security of things Data and privacy Download Slide Deck: ▸ Here Speaker Bio Nevi Kaja works as a Research Engineer at Ford Motor Company and he is a PhD ... (more)

Progress Launches First Vendor-Agnostic Hybrid Data Gateway at @CloudExpo | @ProgressSW #BigData #Analytics #AI #DX

Join us at Cloud Expo June 6-8 to find out how to securely connect your cloud app to any cloud or on-premises data source - without complex firewall changes. More users are demanding access to on-premises data from their cloud applications. It's no longer a "nice-to-have" but an important differentiator that drives competitive advantages. It's the new "must have" in the hybrid era. Users want capabilities that give them a unified view of the data to get closer to customers and grow business. They're dealing with greater volumes of data than ever before, and much of this resides behind corporate firewalls. Traditional approaches for exposing this data, such as VPN and SSH tunneling are difficult to manage and not engineered for the cloud. If you want to create a frictionless data access experience for your customers, join us at Cloud Expo, June 6-8 in New York City.... (more)

[demo] @AlertLogic's Cloud Security | @CloudExpo #SDN #IoT #DevOps

AlertLogic's 'Security Built for the Cloud' Demo Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here In their Live Hack" presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This "Live Hack" useds open source attack tools that are free and available for download by anybody. Attendees learned where to find and how to operate these tools for the purpose of testing their own IT infrastructure. They also witnessed a cyber-attack from both sides - attacker and defender. An inside view of how indicators of compromise are researched to develop security content to be deployed for detection based on these attacks. Download Slide Deck: ▸ Here Speaker Bios Stephen Coty ... (more)

Is Your Enterprise Data Secure? | @CloudExpo #Cloud #BigData #Analytics

Keeping your enterprise data safe and secure is more important now than it ever has been. IT has always been an ever-changing industry, but in recent years, it has been changing more and more quickly. Now, thanks to the cloud, big data, and mobile devices all expanding at once, it may seem like the entire IT field is completely different every other day. This means your company is going to almost always be re-evaluating and upgrading your network security tools and methods. It's hard to deal with the current threats to your data, never mind prepare for new ones. Fortunately, while it is stressful to keep up with this changing world, it's not impossible. If your team is up to the challenge and is dedicated to protecting your network and the big data you collect, it is possible. Here are five techniques you can use to eliminate a large number of threats and secure yo... (more)

DevCentral Cloud Month – Week Two

What’s this week about? You got a mini taste of DevCentral’s Cloud Month last week and week two we really dig in. This week we’re looking at Build and Deployment considerations for the Cloud. The first step in successfully deploying in a cloud infrastructure. Starting today, Suzanne and team show us how to deploy an application in AWS; On Wednesday, Greg, harking the Hitchhiker’s Guide, explains Azure’s Architectural Considerations; Marty uncovers Kubernetes concepts and how to deploy an application in Kubernetes this Thursday; on #Flashback Friday, Lori takes us down memory lane wondering if SOA is still super. Filling my typical Tuesday spot, Hitesh reveals some foundational building blocks of F5’s cloud/automated architectures. These will help get you off the ground and your head in the clouds, preferably Cloud Nine. Enjoy! ps Related: 5 steps to building a c... (more)

It’s 11 PM – Do You Know Where Your Data Is? | @CloudExpo #IoT #BigData

I was recently on a business trip out to Wausau, WI. The purpose was to conduct a training session on web application development for a new batch of associates at our onshore development center. When I picked up my rental car at the airport, I was very happy to discover it had built in Bluetooth integration for my phone. I have this feature on both cars at home. I love the convenience of having the car become an accessory for my mobile device. I immediately bound my phone with the car's Bluetooth. Then something unusual happened. My phone prompted me with a question: ‘Chevy/Malibu would like access to your contacts list, click OK to grant request.' My first reaction was no, and canceled the request. Each time I started the car, it would persistently ask the question. My curiosity got the better of me, and I finally relinquished and said OK to see what happened next.... (more)

DevCentral Cloud Month – Week Three

What’s this week about? We hope you’re enjoying DevCentral’s Month thus far and Suzanne, Hitesh, Greg, Marty and Lori ready to go again this week. Last week we got you deployed in AWS and Kubernetes, learned the basics of Azure, got knee-deep in Cloud/Automated architectures and celebrated SOA’s survival. Now that your cloud is installed and running, this week we look at things like security, migration, services, automation and the challenges of data management. Monday, Suzanne will help you secure your new AWS application with a F5 WAF; Tuesday, Hitesh will explore the Services Model for cloud architectures; Wednesday, Greg gets into Deployment Scenarios for BIG-IP in Azure; if you thought 24 minutes was quick, on Thursday Marty shows how to deploy an app into Kubernetes even faster; and Lori and her infinite cloud wisdom, wonders if the technical and data integrat... (more)

[session] Satellite Storage for #FinTech Security | @CloudExpo #AI #ML #DX

Satellite Storage: The Ultimate Cold Vault for Fintech Security For financial firms, the cloud is going to increasingly become a crucial part of dealing with customers over the next five years and beyond, particularly with the growing use and acceptance of virtual currencies. There are new data storage paradigms on the horizon that will deliver secure solutions for storing and moving sensitive financial data around the world without touching terrestrial networks. In his session at 20th Cloud Expo, Cliff Beek, President of Cloud Constellation Corporation, will discuss new best practices to bypass the internet and the many applications for this technology, including the financial sector, which is notoriously vulnerable to attack. Speaker Bio Cliff Beek is the president of Cloud Constellation Corporation. He has extensive experience with the management and financing of... (more)

Announcing @OutscaleInc to Exhibit at @CloudExpo | #DevOps #DX #Security

SYS-CON Events announced today that Outscale, a global pure play Infrastructure as a Service provider and strategic partner of Dassault Systèmes, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Founded in 2010, Outscale simplifies infrastructure complexities and boosts the business agility of its customers. Outscale delivers a secure, reliable and industrial strength solution for its customers, which include solopreneurs, fast-growing startups, large multi-national companies and government agencies. The company is a strategic partner to Dassault Systémes, and today powers hundreds of organizations throughout North America, Europe and Asia. Outscale's U.S. headquarters is located in Jersey City, New Jersey, and its global headquarters is in Saint-Cloud, France. For more in... (more)

[session] #IoT Security Certifications | @ThingsExpo @PECB #M2M #Security

IoT Security Certifications In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), will provide an overview of various initiatives to certifiy the security of connected devices and future trends in ensuring public trust of IoT. Speaker Bio Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide recognized certification against various international standards. He also has extensive experience as a trainer and an educator in the fields of Information Security, Risk Management and IT. Throughout his career, he has worked in North America, Latin America and Asia with individuals and various companies of all sizes. Internet ... (more)