Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Security Journal
Have you ever wished that enterprise integration were as simple as snapping together LEGO Blocks? That’s the vision of San Mateo, California-based SnapLogic. The brainchild of […]
By Bob Gourley Editor’s note: We believe the release below will be of high interest to enterprise technologists since it directly relates to topics of enhanced functionality and security of your mission critical infrastructure. – bg From: http://ctolink.us/1v1WiaZ Monday, A...
Thunder and AX WAFs Pass Rigorous Testing Woking, Surrey: 4th August 2014 - Wick Hill is now shipping A10 Network's Thunder and AX Series application delivery controllers (ADCs), with web application firewall (WAF) version 2.1 certification from ICSA Labs, an independent division of Ve...
It’s that time of year again… time for another beautiful late-summer Gartner Catalyst conference in America’s Finest City: San Diego. Aside from being my hometown, the reason San Diego is so great is that it has balance. The warm sun is balanced by the cool ocean breeze, the strong bus...
By Vic Mankotia CA Technologies booth at RSA APJ Conference in Singapore last week. The evolution of cloud, mobility and social networks have opened organizations and their… The post Security and software go hand-in-hand in the application economy
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. Two of the main differences are elasticity and dynamism, which are part of the cloud’s DNA. The fact that security-related c...
Application delivery is always evolving. Initially, applications were delivered out of a physical data center, either dedicated raised floor at the corporate headquarters or from some leased space rented from one of the web hosting vendors during the late 1990’s to early 2000’s or some...
Final deadline for all entries is August 29thLONDON, UK - July 28th 2014 - The Tech Trailblazers Awards early bird rates close at midnight Pacific time this Thursday, leaving enterprise tech startups with just a few days to make savings on their awards submissions fee. The discounted r...
By Bob Gourley Palo Alto Networks protects thousands of enterprise and governments from cyber threats. They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform. The Palo Alto Networks security platform natively brings toget...
24 July 2014 - Pioneering technology services company, telent Technology Services Ltd, has increased its IT security capability by acquiring a 25% stake in CNS Group, the London-based information assurance and cyber security specialists.IT Security is an increasingly critical component...
Do you avoid stores that have had a credit card breach? You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the impact of identity theft on consumer behavi...
Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run ac...
Wednesday 23 July, 2014 Graduates from Northumbria University, Newcastle, have once again taken the London degree shows by storm, bringing home a total of 15 awards and securing employment with internationally-renowned organisations. Impressing some of the creative industries'...
LONDON, UK - July 15th 2014 - The highly successful Tech Trailblazers Awards today introduced an additional category to reflect growing industry interest and engagement in the Internet of Things (IoT).In addition to existing enterprise technology categories such as Cloud, Infosecurity ...
Content and Metadata Federation Improves Performance and Security for Multisite Teams Using Git and P4DKey Points:New architecture enables global teams to access and manage revisions of shared content at LAN speed using Perforce, Git or both Organisations can selectively promote conten...
Inhalts- und Metadatenföderierung verbessert Leistung und Sicherheit für verteilte Git- und P4D-TeamsHighlights:Neue Architektur ermöglicht globalen Teams den Zugriff auf und die Verwaltung von Überarbeitungen an gemeinsam genutzten Inhalten mit LAN-Geschwindigkeit ...
London, UK - 15th July, 2014 - RedPixie, a global technology firm which specialises in transforming IT environments for business success, today announced that Rob Neal has been appointed as Head of Services. Rob will be leading the development of RedPixie's Business Intelligence and Da...
More than half of all American businesses use cloud computing for its many benefits: flexibility, scalability, and cost-effectiveness top the list. However, due to its widespread appeal, the cloud also attracts the wrong kind of attention. In the last 12 months, 16 percent of public cl...
Prof. Dr. Norbert Pohlmann PhD, Ilijana Vavan and Ulf Heggenberger support sales and business development of the Hamburg-based start-up secucloud.Hamburg, 11 July 2014 - Security is one of the basic human needs. Therefore, we carefully protect almost everything in our everyday life - h...
Cloud computing security issues are constantly a top concern for IT leaders migrating to the cloud. There are many issues related to data security in the cloud and more than one approach to cloud security. Focusing on Infrastructure as a Service cloud security, there are five issues th...
With the growing popularity of R, there is an associated increase in the popularity of online forums to ask questions. One of the most popular sites is StackOverflow, where more than 60 thousand questions have been asked and tagged to be related to R. On the same page, you can also fin...
- Half (52%) of UK CIOs view increased security risks as biggest challenge associated with moving IT systems to the cloud- Eight in 10 (82%) say the economic benefits of cloud technology outweigh the potential risks- One-in-five (21%) hire interim professionals to fill the cloud skills...
This Week in Website Performance is a weekly feature of the Monitis.com blog. It summarizes recent articles about website performance. How to make your web site better, how to improve your users experience when they come to your website and how to optimize the overall experience. Why? ...
Tech Trailblazers Awards offers free entry to startups from World Cup contestant countries and the winning nation London, UK - 30th June 2014 - Amidst World Cup fever, the only independent global enterprise tech startup awards, the Tech Trailblazers, kicks off the awards in football st...
#cloud #SDAS #AWS And you can try it out for free...  June 30, 2014 (The Internet) Today F5 Networks, which delivers solutions for an application world, announced it had completed jumping through the hoops necessary to offer an hourly (utility) billing model for its BIG-IP VE (Vi...
Patch management solution helps Severnside Housing gain greater control of IT and allows the organisation more time to help resolve community queriesLondon, UK 27 June 2014: Shavlik, a global leader in simplifying the complexity of IT management and innovative security systems and IT p...
I wrap it up from Velocity Conference 2014. Special thanks to Dawn Parzych, Robert Haynes, Cyrus Rafii and John Giacomoni for joining us on camera along with Robert, Courtney, and Natasha behind the lens. Also learn what the top questions asked this week at F5 booth 800. Reporting from...
Dawn Parzych, F5 Sr. Product Manager, returns to demo BIG-IP’s Image Optimization solution. Web images can consume up to 60% of a site load and BIG-IP can significantly reduce the image file size and deliver those pictures much faster to the viewer.
John Giacomoni, LineRate Founder and Sr Architect, joins us to give the lowdown on F5’s TMOS proxy and LineRate proxy. John does a great job explaining the nuances of each, how they function within architecture and the associated deployments within an organization. Each can be deployed...
Amazon’s cloud service still needs security improvements says Gartner analyst. By Ellen Messmer The Amazon AWS cloud service is fine for enterprise workloads and applying security controls such as encryption and firewalls is possible, though more security vendors need to step up to sup...
Dawn Parzych, F5 Sr. Product Manager, talks about the benefits of HTTP 2.0 and shows us a demo of 170+ pictures appearing instantly while using the BIG-IP HTTP 2.0 profile. Interesting conversation about web pages loads, the chattiness of the HTTP protocol and the notion of HTTP 2.0 mo...
Robert Haynes, F5 Marketing Services Architect, gives us a preview of the new Acceleration Reference Architecture and shares 3 simple ways you can optimize your application traffic with BIG-IP. Learn more at Synthesis.f5.com
At EELive!, we asked several software development professionals to discuss the state of software quality. Here's what they had to say...
I show you how to find F5 booth 800 at Velocity Conference 2014 in Santa Clara. Velocity focuses on Web Operations and Performance with half of the attendees involved with web and mobile development. We are showcasing our acceleration and optimization solutions making any app a fast ap...
UK CISOs and IT Managers feel isolated and fearful of losing jobs as data breach wave rolls in, suggests new surveyWESTBOROUGH, Mass. and LONDON, UK, June 24th 2014 - Chief Information Security Officers (CISOs) and IT managers may be too confident in their capabilities to ensure their ...
London, United Kingdom, June 24, 2014 --(PR.com)-- Asco Tlc, thanks to the support of BCLOUD, announces the expansion of its cloud offering called “Asco inCloud” with a new service that take the name of “ASCOllabora,” based on the solutions of Storage Made Easy...
Ask two politically opposed people in any given country about the causes of the country’s problems, and guess what? Each will give you an answer filtered through their world-view. Through what they know, and what they believe. That is not to say one is right and one is wrong, both simp...