Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

SYS-CON Events announced today that Twistlock, the leading provider of cloud container security solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Twistlock is the industry's first enterprise security suite for container security. Twistlock's technology addresses risks on the host and within the application of the container, enabling enterprises to consistently enforce security policies, monitor and audit activity and identify and isolate threats in a container or cluster of containers. Twistlock's mission is to provide a full, enterprise-grade security stack for containers, so organizations can confidently adopt and maximize the benefits of containers in their production environment. For more information, visit https://www.twistlock.com/. @DevOpsSummit at Cloud E... (more)

DevSecOps on Fire | @DevOpsSummit #DevOps #Serverless #AI #DevSecOps

DevSecOps: Catching Fire In DevOps, those who can’t keep pace are often left behind. For many people leading DevOps initiatives over the past few years, this led to a painful choice of leaving security by the wayside. Many Waterfall-native approaches to security could not keep pace with their new DevOps-native requirements and they were shunned. Gene Kim and Josh Corman first sounded the death knell for security as we knew it during their 2012 RSA presentation, Security Is Dead. Long Live DevOps: IT at Ludicrous Speed. However, as with so many things in our world, necessity is the mother of invention. Leaving security out of the DevOps toolchain was not an option for some and unimaginable for others. Fast forward four years and things have changed dramatically. We are on the cusp of a new era of security that lives at ludicrous speed. Software-defined security is c... (more)

Ten Tips for Integrating Security into DevOps | @DevOpsSummit #DevOps #InfoSec

Ten Tips for Integrating Security into DevOps By Gene Kim Imagine a world where product owners, Development, QA, IT Operations, and Infosec work together, not only to help each other, but also to ensure that the overall organization succeeds. By working toward a common goal, they enable the fast flow of planned work into production (e.g., performing tens, hundreds, or even thousands of code deploys per day), while achieving world-class stability, reliability, availability, and security. In this world, Infosec is always working on ways to reduce friction for the team, creating the work systems that enable developers to be more productive and get better outcomes. By doing this, small teams can fully leverage the collective experience and knowledge of not just Infosec, but also QA and Ops, in their daily work without being dependent on other teams, deploying safely, s... (more)

Home Security Is Not Just #IoT | @CloudExpo #AI #M2M #DigitalTransformation

Cloud is a lot more pervasive than one may have imagined and in this article, we will focus on the various ways in which cloud technology is making home security systems robust and impenetrable. The term ‘Internet of Things’ gets thrown around quite a lot when we talk about cloud technology in domains outside of computer systems. But cloud technology in areas like home security is not merely about IoT. Cloud is a lot more pervasive than one may have imagined and in this article, we will focus on the various ways in which cloud technology is making home security systems robust and impenetrable. Cloud Storage Home security cameras have traditionally been the most trusted technologies to capture intruder movements. The trouble with traditional home security cameras has been that the evidence (video recording of intrusion) is within reaching distance of burglars. In oth... (more)

[session] @MongoDB on AWS | @CloudExpo #DevOps #APM #AI #Security

Bridging the Gap with MongoDB on AWS MongoDB Atlas leverages VPC peering for AWS, a service that allows multiple VPC networks to interact. This includes VPCs that belong to other AWS account holders. By performing cross account VPC peering, users ensure networks that host and communicate their data are secure. In his session at 20th Cloud Expo, Jay Gordon, a Developer Advocate at MongoDB, will explain how to properly architect your VPC using existing AWS tools and then peer with your MongoDB Atlas cluster. He'll discuss the security advantages you immediately gain, easier configuration of whitelisting networks and potential cost savings on bandwidth. Speaker Bio Jay Gordon is a Developer Advocate at MongoDB focused on providing users with a great experience with our Cloud products. He joined MongoDB in 2016 after many years as working as a System Administrator and D... (more)

[session] Enabling #FinTech | @CloudExpo @CloudRaxak #AI #ML #Blockchain

Enabling FinTechs for Success through Business-Driven Cloud Security FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, will show FinTechs how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continuous compliance, and set themselves up for success. Speaker Bio Sesh Murthy is the Co-Founder and CTO of Cloud Raxak. Before Cloud Raxak, he was the Vice President of Cloud Innovation at IBM Global Services. He has 29 years of experience in creating value for customers in cloud and technology se... (more)

[session] #IoT Devices and #Cybersecurity | @ThingsExpo @Battelle #AI #M2M

Cybersecurity Software Development Best Practices Cybersecurity is a critical component of software development in many industries including medical devices. However, code is not always written to be robust or secure from the unknown or the unexpected. This gap can make medical devices susceptible to cybersecurity attacks ranging from compromised personal health information to life-sustaining treatment. In his session at @ThingsExpo, Clark Fortney, Software Engineer at Battelle, will discuss how programming oversight using key methods can increase the cybersecurity of medical device code to prevent weaknesses and vulnerabilities from being introduced into a device. These include automatic code scanners, runtime analysis, following coding standards, and binary analysis tools to monitor for unexpected behavior. Speaker Bio Clark Fortney, Software Engineer at Battelle... (more)

Fusion to Exhibit at @CloudExpo | @FusionConnectSM #IoT #SDN #AI #ML

SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry's single source for the cloud. Fusion's advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including cloud communications, cloud connectivity, and cloud computing. Fusion's innovative, yet proven cloud solutions lower our customers' cost of ownership, and deliver new levels of security, flexibility, scalability, and speed of deployment. For more information, please visit http://www.fusionconnect.com. The World's Largest "Cloud Digital Transformation" Event @CloudExpo / @ThingsExpo... (more)

TechTarget: Cloud Storage Security at @CloudExpo NY | #SDN #DataCenter

At least 25% of workloads will never run on a public cloud, predicted Jeff Katzen, director of cloud practice at CenturyLink, a provider of everything from Internet and TV for homes to enterprise-grade cloud hosting services for global companies. During his Cloud Expo presentation, Katzen talked about CenturyLink clients whose decisions to implement hybrid cloud projects rest almost exclusively on their desire to control of some of their data, and protect it in very specific ways. "They want the ability to leverage a public cloud, but they also have very stringent security controls, so they also want dedicated security devices sitting in front of the public cloud platform," Katzen said. The key to utilizing cloud technology for all it's worth is to understand where its value can be applied to your unique architecture, he explained. Read TechTarget review here. @D... (more)

[slides] @LeeAtchison Talk at @CloudExpo | @NewRelic #IoT #AI #ML #DevOps

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Fly Two Mistakes High - Keeping High Availability in the Cloud When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. Download Slide Deck: ▸ Here "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure. Download Slide Deck: ▸ He... (more)

Extreme Computing | @CloudExpo @NVIDIA #HPC #BigData #IoT #AI #ML #DL

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Extreme Computing in the Cloud...How to Get It for FREE! Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. Download Slide Deck: ▸ Here In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is being used on IBM Cloud, Amazon, and Microsoft Azure and how to gain access to these resources in the cloud... for FREE! Download Slide Deck: ▸ Here Speaker Bio Michael O'Neill is an established leader for NVIDIA. He provides specializ... (more)