Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Security Journal
What do software testers most want to do while at work? What do software testers enjoy the most about their job? What do many testers struggle to find the time for each and every day? What’s absolutely critical to the success of your enterprise? There’s one simple answer to these ...
New deadline of September 19th to reflect new categories of IoT and FinTech London, UK - August 28th 2014 - The highly successful Tech Trailblazers Awards today announced a new bursary for early stage non VC backed startups, the Firestarter program. This has been created to ensure that...
The application economy promises many opportunities for companies and consumers alike, but the same technologies enabling all this app innovation are also opening the door… The post Managing IT security in an always-connected, app-driven world appe
…all this and more in this week’s compendium of open source news!   Two Steps Forward, One Step Back Sounds like a Strauss Waltz? Almost. After 10 years the city of Munich’s love affair with open source may be coming to an end.  Despite saving $16 million by using the custom ...
By Bob Gourley The Dunning–Kruger effect is a cognitive bias manifesting in unskilled individuals suffering from illusory superiority, mistakenly rating their ability much higher than is accurate. This bias is attributed to a metacognitive inability of the unskilled to recognize their ...
Major industry events are a great venue for companies to make announcements and communicate important market and product information. As the 2014 version of VMWorld fast approaches, what might we hear more about? Here are five predictions. NSX customers will be on display Industry chat...
Brocade Vyatta 5600 vRouter adds new functionality to accelerate Network Functions Virtualisation (NFV) adoption SAN JOSE, Calif., August 19, 2014 - Telefónica (NYSE: TEF) and Brocade (NASDAQ: BRCD) have partnered to establish new benchmarks for the deployment and performance of N...
Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at the risks involved with mobile devices and how to secure them. Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent ...
In a Feb 2014 survey, 94 percent of organizations surveyed reported running applications or experimenting with infrastructure-as-a-service.[1] According to research firm Nasumi, there is over one exabyte currently stored in the cloud. An exabyte is over a billion GB.[2] Considering the...
By William McElmurry For healthcare professionals participating in the Centers for Medicare & Medicaid Services electronic health record (EHR) incentive program, you’ll soon need to demonstrate compliance with the Stage 2 Meaningful Use requirements in order to continue recei...
GFT will also sponsor the Big Data Trailblazers Award LONDON, UK - August 12th 2014 - The highly successful Tech Trailblazers Awards today announced a new category for the awards, the FinTech Trailblazers, which is being created with new sponsor GFT, a leading IT solutions provider in ...
By Bob Gourley Tapping Global Threat Intelligence To Secure Enterprise Networks Cyber Security Symposium August 27, 2014 | 11 AM -1:30 PM EST Ruth’s Chris Steakhouse, Arlington, VA For more and to register see: http://ctolink.us/1nKbQqy On July 9, 2014, the Cybersecurity Informati...
In the five seconds it takes you to read this, 60% of your visitors just abandoned your site. Another 20% were gone before you even hit the first comma, and 30% of all them are purchasing from one of your competitors. That's what Limelight Networks "State of the User Experience" says,...
On Monday 11th August 2014 Infosecurity Magazine officially re-launched its website to reflect the latest in user experience, functionality and style. For the last 10 years Infosecurity Magazine has been at the cutting edge of some of the most dramatic and transformative moments of inf...
London, United Kingdom, August 07, 2014 --(PR.com)-- The Storage Made Easy Private Enterprise File Sync and Share Solution is an on-premise solution that is completely private and can be deployed by enterprises as well as being available as a white-label OEM solution for service provi...
Thursday 7 August, 2014 nCrypted Cloud today announced the opening of its European operation. nCrypted Cloud is the secure collaboration application that seamlessly integrates with leading cloud storage services such as Box, Dropbox, Egnyte, GoogleDrive and OneDrive. It all...
Have you ever wished that enterprise integration were as simple as snapping together LEGO Blocks? That’s the vision of San Mateo, California-based SnapLogic. The brainchild of […]
By Bob Gourley Editor’s note: We believe the release below will be of high interest to enterprise technologists since it directly relates to topics of enhanced functionality and security of your mission critical infrastructure. – bg From: http://ctolink.us/1v1WiaZ Monday, A...
Thunder and AX WAFs Pass Rigorous Testing Woking, Surrey: 4th August 2014 - Wick Hill is now shipping A10 Network's Thunder and AX Series application delivery controllers (ADCs), with web application firewall (WAF) version 2.1 certification from ICSA Labs, an independent division of Ve...
It’s that time of year again… time for another beautiful late-summer Gartner Catalyst conference in America’s Finest City: San Diego. Aside from being my hometown, the reason San Diego is so great is that it has balance. The warm sun is balanced by the cool ocean breeze, the strong bus...
By Vic Mankotia CA Technologies booth at RSA APJ Conference in Singapore last week. The evolution of cloud, mobility and social networks have opened organizations and their… The post Security and software go hand-in-hand in the application economy
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. Two of the main differences are elasticity and dynamism, which are part of the cloud’s DNA. The fact that security-related c...
Application delivery is always evolving. Initially, applications were delivered out of a physical data center, either dedicated raised floor at the corporate headquarters or from some leased space rented from one of the web hosting vendors during the late 1990’s to early 2000’s or some...
Final deadline for all entries is August 29thLONDON, UK - July 28th 2014 - The Tech Trailblazers Awards early bird rates close at midnight Pacific time this Thursday, leaving enterprise tech startups with just a few days to make savings on their awards submissions fee. The discounted r...
By Bob Gourley Palo Alto Networks protects thousands of enterprise and governments from cyber threats. They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform. The Palo Alto Networks security platform natively brings toget...
24 July 2014 - Pioneering technology services company, telent Technology Services Ltd, has increased its IT security capability by acquiring a 25% stake in CNS Group, the London-based information assurance and cyber security specialists.IT Security is an increasingly critical component...
Do you avoid stores that have had a credit card breach? You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the impact of identity theft on consumer behavi...
Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run ac...
Wednesday 23 July, 2014 Graduates from Northumbria University, Newcastle, have once again taken the London degree shows by storm, bringing home a total of 15 awards and securing employment with internationally-renowned organisations. Impressing some of the creative industries'...
LONDON, UK - July 15th 2014 - The highly successful Tech Trailblazers Awards today introduced an additional category to reflect growing industry interest and engagement in the Internet of Things (IoT).In addition to existing enterprise technology categories such as Cloud, Infosecurity ...
Content and Metadata Federation Improves Performance and Security for Multisite Teams Using Git and P4DKey Points:New architecture enables global teams to access and manage revisions of shared content at LAN speed using Perforce, Git or both Organisations can selectively promote conten...
Inhalts- und Metadatenföderierung verbessert Leistung und Sicherheit für verteilte Git- und P4D-TeamsHighlights:Neue Architektur ermöglicht globalen Teams den Zugriff auf und die Verwaltung von Überarbeitungen an gemeinsam genutzten Inhalten mit LAN-Geschwindigkeit ...
London, UK - 15th July, 2014 - RedPixie, a global technology firm which specialises in transforming IT environments for business success, today announced that Rob Neal has been appointed as Head of Services. Rob will be leading the development of RedPixie's Business Intelligence and Da...
More than half of all American businesses use cloud computing for its many benefits: flexibility, scalability, and cost-effectiveness top the list. However, due to its widespread appeal, the cloud also attracts the wrong kind of attention. In the last 12 months, 16 percent of public cl...
Prof. Dr. Norbert Pohlmann PhD, Ilijana Vavan and Ulf Heggenberger support sales and business development of the Hamburg-based start-up secucloud.Hamburg, 11 July 2014 - Security is one of the basic human needs. Therefore, we carefully protect almost everything in our everyday life - h...
Cloud computing security issues are constantly a top concern for IT leaders migrating to the cloud. There are many issues related to data security in the cloud and more than one approach to cloud security. Focusing on Infrastructure as a Service cloud security, there are five issues th...
With the growing popularity of R, there is an associated increase in the popularity of online forums to ask questions. One of the most popular sites is StackOverflow, where more than 60 thousand questions have been asked and tagged to be related to R. On the same page, you can also fin...
- Half (52%) of UK CIOs view increased security risks as biggest challenge associated with moving IT systems to the cloud- Eight in 10 (82%) say the economic benefits of cloud technology outweigh the potential risks- One-in-five (21%) hire interim professionals to fill the cloud skills...