Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Security Journal
The mobility and flexibility of modern business practice has created a demand to extend any application to virtually anyone. While this can bring many benefits to organisations, such as enabling employees to work remotely, cutting costs by using the cloud to simplify IT deployment and ...
There’s a whole lot of talking and proposing and presenting going on around risk-based . Usually it’s around authentication and access. The basic premise is that based on a score, formulated from a set of variables (context), you decide whether or not someone is allowed access to a res...
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedente...
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a ...
Cloud security is at the top of every CIO’s list. It is also the first subject that comes up when you engage in a discussion about the cloud. For those of us who followed the recent Ashley Madison story (from a tech perspective), you would agree that while the breach happened for so ma...
Disaster Recovery isn’t a new concept for IT folks. We’ve been backing up data for years to offsite locations, and used in-house data duplication in order to prevent the risks of losing data stores. But now that cloud adoption has increased, there have been some shifts in how tradition...
There’s really an unlimited number of ways in which programmability in the network (data path scripting) can solve problems, address risk, and simplify architectures. In the area of DevOps it can be used to facilitate continuous delivery (CD) initiatives by supporting the implementatio...
After the deluge of data breaches in 2014 and more emerging every day, security is without a doubt a top strategic initiative for just about every enterprise in 2015. Along with top-notch security, it is imperative for organizations – particularly cloud-driven ones – to also have leadi...
Ski helmets, seat belts, and encryption. What comes to your mind when you read these words? You may immediately think “safety,” and you’d be right, but how about “speed enablers”? At first blush, that may not be the first concept that comes to mind, but there’s a pretty compelling c...
One of the first considerations that IT managers struggle with is how to handle security and compliance. Both security and compliance are aspects of a larger, more strategic concern: governance. Governance essentially represents a set of processes for creating, communicating, and enfor...
It seems like every time I write a blog, a new breach has occurred (for an up-to-date look at local, state and federal breaches I suggest you periodically review the Identity Theft Resource Center’s running list). Since I last penned a post, we’ve seen breaches of the Mayo Clinic, Citi...
Most home security systems have a panic button - if you hear something go bump in the night you can push a panic button to starts the sirens wailing, call the cops and hopefully sends the bad guys scurrying. As useful as this is for home owners, enterprises need a security panic button...
Do the ‘darker’ channels and means that exist for searching the web in anonymity ultimately spell doom for the wider march towards open data? So-called ‘open data’ is supposed to be an instrument for breaking down information gaps across industries and letting companies share benchmar...
It's been three years since I compared medieval security to web security, and a few things have happened. Mobile and wireless have evolved as the dominant platforms, while the life between personal computing and business computing has continued to fray. And, of course, thanks to web se...
Jared Cook, VMware’s Lead Strategic Architect, Office of the CTO, visits #F5Agility15 and shares how F5 and VMware solutions can be used together in an orchestrated fashion to enable customers to spin up applications on-demand, and provision F5 software defined application services tho...
The cyber security, resiliency and accountability of IT systems at financial services organizations is rarely out of national headlines. Firms that operate in the financial space hold extremely sensitive data, so therefore attackers usually consider the effort and risk of attacking th...
F5 President & CEO, Manny Rivelo, shares his vision of Innovate, Expand, Deliver at #F5Agility15. Always insightful, Manny discusses his new role as CEO, what hybrid application services means to organizations, how F5 has evolved from just a load balancing company, how organizations us...
A recent purchase of mine was a 2015 Jeep. Until now, I thought it was a safe and reliable car, but that is not the case anymore. As technology advances and cars become smarter and more technologically savvy, they become another target for hackers. Imagine speeding down the highway,...
Access is everything. It is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Knowing the answers to the questions of who is accessing what, where they are accessing that information from, why they are accessing that information and, finally...
I preview the F5 Agility 2015 conference happening August 4-6 at the Gaylord National Resort & Convention Center in National Harbor, MD. Agility 2015 will lay the foundation for your business to innovate new paths to success, expand through barriers to growth, and deliver the applicati...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. ...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO...
It’s easy to invent additional C-suite job title designations. We might conjure up Chief Data Analytics-Insight Officer (CDAIO - pronounced “see-day-oh”) for example. Equally, we can see that the role of the CIO quickly gained additional layers some time ago – and we now see the CSO (...
"We provide a service that allows our customers to keep bad guys out and let good guys into their applications running in the public cloud, private cloud or in a classic data center," explained Haseeb Budhani, co-founder and CEO of Soha, in this SYS-CON.tv interview at Cloud Expo, held...
With 2015 crossing the half way point, let’s take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. Data breaches are on a record pace this year...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. I...
Cyber warfare is not a futuristic theory being discussed on one of the military channels by some obscure software architect anymore. It is a common occurrence in today’s global economy and it appears some are trying to test the electronic defenses we have set up on the Internet. The q...
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, reviewed the changes that the cloud computing industry has gone through over the last five years and shared insights into what the next five will bring. He also chronicled the cha...
At this year’s Cisco Partner Summit in Montreal, Canada, CANCOM was awarded “Security Partner of the Year” for the Central Europe and Germany regions. Cisco recognized CANCOM’s successes in the development, implementation, and marketing of IT security solutions based on Cisco technolog...
F5 Animated Whiteboards offer a quick, visual story to some of today’s technology challenges and how we can help solve those headaches. Our latest covers Next Generation IPS and how SSL encryption of applications is becoming the norm. SSL ensures the integrity and privacy of transactio...
It’s up to IT to secure BYOD without locking out its greatest asset: employees. Virtual Mobile Infrastructure (VMI) provides a compelling way to do so. Despite the kicking and screaming from IT departments, organizations have largely resigned themselves to the fact that BYOD is here t...
Over the last couple months, in between some video coverage for events, I’ve been writing a series of IoT stories. From the basic What are These "Things”? and IoT Influence on Society to the descriptive IoT Effect on Applications and the IoT Ready Infrastructure. I thought it only fair...
My daughter has been asking for a puppy for over a year. A Chow puppy. I’ve had Chow Chows my entire life and our current Chow, Max, is a big 72lb cinnamon boy. He’s also the medical alert dog for our daughter. Max, a rescue, is about 5 years old and we wanted to get a puppy so Max-Boy...
Learn how automated API testing helped the Dutch government build a robust and secure personal identification system on an extremely aggressive timeline. Through a combination of regression, functional and load testing, the organization reduced testing cycles from 3 weeks to just 1 day...
King Robert the Bruce, who ruled over Scotland from 1306-1329, graces us with his presence and imposes his reign upon the people of Scotland. We learn if he was a nice King or one who ruled with an iron fist and how he lead Scotland to independence against England. Reporting from the E...
The Guardian of Scotland, Sir William Wallace, shares how the real Sir William lived, loved and ultimately met his fate. ps Related F5 Agility EMEA 2015 – The Preview Video F5 EMEA Agility 2015 – Welcome to Edinburgh What Are You Looking Forward To At F5 Agility 2015? F5 Ag...
Our EMEA video partners at cloud-channel.tv, put together a nice wrap up F5 Agility 2015 from Edinburgh, Scotland. Special thanks to F5’s Manny Rivelo and Cisco’s Ravi Balakrishnan along with King Robert the Bruce, Sir William Wallace and a huge thanks to the many attendees for partici...
Ravi Balakrishnan, Cisco Sr. Marketing Manager, discusses the Application Centric Infrastructure and how F5 & Cisco, former fierce competitors, have come together in a joint integrated solution to solve many customer challenges. Cisco’s SND strategy in bringing together programmabi...
Manny Rivelo, F5 EVP of Strategic Solutions and our soon-to-be CEO, shares his vision of Innovate Expand Deliver at F5 Agility 2015. He talks about what hybrid application services means to organizations, how F5 has evolved from just a load balancing company, how organizations use F5 s...
Attendees from all over the world share their thoughts and what they are expecting at F5 Agility 2015. Fun round of guests. ps Related F5 Agility EMEA 2015 – The Preview Video F5 EMEA Agility 2015 – Welcome to Edinburgh What’s in store for us at F5 EMEA Agility 2015? Agilit...