Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Security Journal
Now that cloud services have become part of IT’s “new normal,” commonly referred to as “hybrid,” it seems obvious that the approaches and tools we use to manage IT would also evolve and mature, though the pace of evolution varies amongst companies, of course. According to a Website Mag...
The time of year that crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen.
Data security has long been thought the exclusive domain of large enterprises. Why would cyber-criminals bother with small and midsized companies when the big prizes are to be found hacking into large organizations? Unfortunately an increasing number of smaller companies find themselv...
Eighty-nine percent of knowledge workers retain access to the sensitive corporate applications and files of former employers. Earlier this year, a member of the team at Site-Eye, one of the top time-lapse film companies in the UK, noticed a disturbing problem with one of its client'...
Driven by applications and workloads, a hybrid data center is really a technology strategy of the entire infrastructure mix of on-premises and off-premises data compute resources.
Like an application delivery oasis popping out of the ground, follow along and watch as I almost trip showing you how to find F5 Booth 253 at Gartner Data Center 2014. #GartnerDC is all about IT Infrastructure and Operations Management and BIG-IP sits in the strategic point of control ...
If you thought the Bring Your Own Device (BYOD) craze was a headache, just wait until button cameras, smart watches, and spy glasses (already here) are a daily occurrence in the office. Workplace #Wearables will be a huge challenge in the coming years as more devices, clothing and pret...
#IoT #IDM #SDAS #infosec As the Internet of Things continues to expand (and it is expanding rapidly) the issue of access to applications is going to get a lot more messy. One of the benefits of cloud, so I'm told, is it is "easy access" for everyone. Indeed, it matt...
You wouldn't think of having a Thanksgiving meal without pie... but did you know that that pie can be just as essential for development as it is for a hearty Thanksgiving feast?
The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee ...
Enable continuous testing and expand test coverage and traceability by integrating API testing, service virtualization, and test environment management. We're excited to announce Parasoft's latest release: a consolidated platform uniting API testing, service virtualization, and test ...
Sporting a cool LineRate t-shirt, I show you how to find F5 booth 303 at AWS re:Invent. AWS re:Invent is a learning conference that offers 3 days of technical content so attendees can dive deeper into the AWS cloud computing platform. F5 storylines this week include an offering of a BI...
Despite the data privacy protections supposedly conferred by regulations like HIPAA and HITECH, consumers’ confidential health and personal information is still not safe enough. That’s the lesson to be learned from Franklin, TN-based Community Health Systems’ (CHS) August 18 regulatory...
The Amazon Web Services public infrastructure cloud is seeing massive adoption, and for good reason. Using AWS arms companies with advanced infrastructure that, in most cases, they could not possibly achieve in their own datacenters. In fact, According to Gartner, AWS has 5 times more ...
What do software testers most want to do while at work? What do software testers enjoy the most about their job? What do many testers struggle to find the time for each and every day? What’s absolutely critical to the success of your enterprise? There’s one simple answer to these ...
New deadline of September 19th to reflect new categories of IoT and FinTech London, UK - August 28th 2014 - The highly successful Tech Trailblazers Awards today announced a new bursary for early stage non VC backed startups, the Firestarter program. This has been created to ensure that...
The application economy promises many opportunities for companies and consumers alike, but the same technologies enabling all this app innovation are also opening the door… The post Managing IT security in an always-connected, app-driven world appe
…all this and more in this week’s compendium of open source news!   Two Steps Forward, One Step Back Sounds like a Strauss Waltz? Almost. After 10 years the city of Munich’s love affair with open source may be coming to an end.  Despite saving $16 million by using the custom ...
By Bob Gourley The Dunning–Kruger effect is a cognitive bias manifesting in unskilled individuals suffering from illusory superiority, mistakenly rating their ability much higher than is accurate. This bias is attributed to a metacognitive inability of the unskilled to recognize their ...
Major industry events are a great venue for companies to make announcements and communicate important market and product information. As the 2014 version of VMWorld fast approaches, what might we hear more about? Here are five predictions. NSX customers will be on display Industry chat...
Brocade Vyatta 5600 vRouter adds new functionality to accelerate Network Functions Virtualisation (NFV) adoption SAN JOSE, Calif., August 19, 2014 - Telefónica (NYSE: TEF) and Brocade (NASDAQ: BRCD) have partnered to establish new benchmarks for the deployment and performance of N...
Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at the risks involved with mobile devices and how to secure them. Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent ...
In a Feb 2014 survey, 94 percent of organizations surveyed reported running applications or experimenting with infrastructure-as-a-service.[1] According to research firm Nasumi, there is over one exabyte currently stored in the cloud. An exabyte is over a billion GB.[2] Considering the...
By William McElmurry For healthcare professionals participating in the Centers for Medicare & Medicaid Services electronic health record (EHR) incentive program, you’ll soon need to demonstrate compliance with the Stage 2 Meaningful Use requirements in order to continue recei...
GFT will also sponsor the Big Data Trailblazers Award LONDON, UK - August 12th 2014 - The highly successful Tech Trailblazers Awards today announced a new category for the awards, the FinTech Trailblazers, which is being created with new sponsor GFT, a leading IT solutions provider in ...
By Bob Gourley Tapping Global Threat Intelligence To Secure Enterprise Networks Cyber Security Symposium August 27, 2014 | 11 AM -1:30 PM EST Ruth’s Chris Steakhouse, Arlington, VA For more and to register see: http://ctolink.us/1nKbQqy On July 9, 2014, the Cybersecurity Informati...
In the five seconds it takes you to read this, 60% of your visitors just abandoned your site. Another 20% were gone before you even hit the first comma, and 30% of all them are purchasing from one of your competitors. That's what Limelight Networks "State of the User Experience" says,...
On Monday 11th August 2014 Infosecurity Magazine officially re-launched its website to reflect the latest in user experience, functionality and style. For the last 10 years Infosecurity Magazine has been at the cutting edge of some of the most dramatic and transformative moments of inf...
London, United Kingdom, August 07, 2014 --(PR.com)-- The Storage Made Easy Private Enterprise File Sync and Share Solution is an on-premise solution that is completely private and can be deployed by enterprises as well as being available as a white-label OEM solution for service provi...
Thursday 7 August, 2014 nCrypted Cloud today announced the opening of its European operation. nCrypted Cloud is the secure collaboration application that seamlessly integrates with leading cloud storage services such as Box, Dropbox, Egnyte, GoogleDrive and OneDrive. It all...
Have you ever wished that enterprise integration were as simple as snapping together LEGO Blocks? That’s the vision of San Mateo, California-based SnapLogic. The brainchild of […]
By Bob Gourley Editor’s note: We believe the release below will be of high interest to enterprise technologists since it directly relates to topics of enhanced functionality and security of your mission critical infrastructure. – bg From: http://ctolink.us/1v1WiaZ Monday, A...
Thunder and AX WAFs Pass Rigorous Testing Woking, Surrey: 4th August 2014 - Wick Hill is now shipping A10 Network's Thunder and AX Series application delivery controllers (ADCs), with web application firewall (WAF) version 2.1 certification from ICSA Labs, an independent division of Ve...
It’s that time of year again… time for another beautiful late-summer Gartner Catalyst conference in America’s Finest City: San Diego. Aside from being my hometown, the reason San Diego is so great is that it has balance. The warm sun is balanced by the cool ocean breeze, the strong bus...
By Vic Mankotia CA Technologies booth at RSA APJ Conference in Singapore last week. The evolution of cloud, mobility and social networks have opened organizations and their… The post Security and software go hand-in-hand in the application economy
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. Two of the main differences are elasticity and dynamism, which are part of the cloud’s DNA. The fact that security-related c...
Application delivery is always evolving. Initially, applications were delivered out of a physical data center, either dedicated raised floor at the corporate headquarters or from some leased space rented from one of the web hosting vendors during the late 1990’s to early 2000’s or some...
Final deadline for all entries is August 29thLONDON, UK - July 28th 2014 - The Tech Trailblazers Awards early bird rates close at midnight Pacific time this Thursday, leaving enterprise tech startups with just a few days to make savings on their awards submissions fee. The discounted r...