Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Security Journal
Access is everything. It is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Knowing the answers to the questions of who is accessing what, where they are accessing that information from, why they are accessing that information and, finally...
I preview the F5 Agility 2015 conference happening August 4-6 at the Gaylord National Resort & Convention Center in National Harbor, MD. Agility 2015 will lay the foundation for your business to innovate new paths to success, expand through barriers to growth, and deliver the applicati...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. ...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO...
It’s easy to invent additional C-suite job title designations. We might conjure up Chief Data Analytics-Insight Officer (CDAIO - pronounced “see-day-oh”) for example. Equally, we can see that the role of the CIO quickly gained additional layers some time ago – and we now see the CSO (...
"We provide a service that allows our customers to keep bad guys out and let good guys into their applications running in the public cloud, private cloud or in a classic data center," explained Haseeb Budhani, co-founder and CEO of Soha, in this SYS-CON.tv interview at Cloud Expo, held...
With 2015 crossing the half way point, let’s take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. Data breaches are on a record pace this year...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. I...
Cyber warfare is not a futuristic theory being discussed on one of the military channels by some obscure software architect anymore. It is a common occurrence in today’s global economy and it appears some are trying to test the electronic defenses we have set up on the Internet. The q...
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, reviewed the changes that the cloud computing industry has gone through over the last five years and shared insights into what the next five will bring. He also chronicled the cha...
At this year’s Cisco Partner Summit in Montreal, Canada, CANCOM was awarded “Security Partner of the Year” for the Central Europe and Germany regions. Cisco recognized CANCOM’s successes in the development, implementation, and marketing of IT security solutions based on Cisco technolog...
F5 Animated Whiteboards offer a quick, visual story to some of today’s technology challenges and how we can help solve those headaches. Our latest covers Next Generation IPS and how SSL encryption of applications is becoming the norm. SSL ensures the integrity and privacy of transactio...
It’s up to IT to secure BYOD without locking out its greatest asset: employees. Virtual Mobile Infrastructure (VMI) provides a compelling way to do so. Despite the kicking and screaming from IT departments, organizations have largely resigned themselves to the fact that BYOD is here t...
Over the last couple months, in between some video coverage for events, I’ve been writing a series of IoT stories. From the basic What are These "Things”? and IoT Influence on Society to the descriptive IoT Effect on Applications and the IoT Ready Infrastructure. I thought it only fair...
My daughter has been asking for a puppy for over a year. A Chow puppy. I’ve had Chow Chows my entire life and our current Chow, Max, is a big 72lb cinnamon boy. He’s also the medical alert dog for our daughter. Max, a rescue, is about 5 years old and we wanted to get a puppy so Max-Boy...
Learn how automated API testing helped the Dutch government build a robust and secure personal identification system on an extremely aggressive timeline. Through a combination of regression, functional and load testing, the organization reduced testing cycles from 3 weeks to just 1 day...
King Robert the Bruce, who ruled over Scotland from 1306-1329, graces us with his presence and imposes his reign upon the people of Scotland. We learn if he was a nice King or one who ruled with an iron fist and how he lead Scotland to independence against England. Reporting from the E...
The Guardian of Scotland, Sir William Wallace, shares how the real Sir William lived, loved and ultimately met his fate. ps Related F5 Agility EMEA 2015 – The Preview Video F5 EMEA Agility 2015 – Welcome to Edinburgh What Are You Looking Forward To At F5 Agility 2015? F5 Ag...
Our EMEA video partners at cloud-channel.tv, put together a nice wrap up F5 Agility 2015 from Edinburgh, Scotland. Special thanks to F5’s Manny Rivelo and Cisco’s Ravi Balakrishnan along with King Robert the Bruce, Sir William Wallace and a huge thanks to the many attendees for partici...
Ravi Balakrishnan, Cisco Sr. Marketing Manager, discusses the Application Centric Infrastructure and how F5 & Cisco, former fierce competitors, have come together in a joint integrated solution to solve many customer challenges. Cisco’s SND strategy in bringing together programmabi...
Manny Rivelo, F5 EVP of Strategic Solutions and our soon-to-be CEO, shares his vision of Innovate Expand Deliver at F5 Agility 2015. He talks about what hybrid application services means to organizations, how F5 has evolved from just a load balancing company, how organizations use F5 s...
Attendees from all over the world share their thoughts and what they are expecting at F5 Agility 2015. Fun round of guests. ps Related F5 Agility EMEA 2015 – The Preview Video F5 EMEA Agility 2015 – Welcome to Edinburgh What’s in store for us at F5 EMEA Agility 2015? Agilit...
I give a quick tour of the Edinburgh International Conference Center (EICC) and show how to navigate around for the F5 EMEA Agility2015 conference. Get a sneak peek of the pre-show setup, learn how to register and get your badge along with how to find the breakout and general keynote s...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. A June 2014 Gartner Report on Secu...
Maintaining network security has never been more challenging than it is right now. Traditional network perimeters are beginning to blur in the face of consumerization, the rise of mobility, migration to the cloud, and the Internet of Things. The pursuit of business agility has driven t...
On March 18, 2015, system administrators and developers received ominous news: two high severity vulnerabilities in OpenSSL would be announced the next day. Since Heartbleed, OpenSSL had been on a bad streak, and it looked like things were only going to get worse. Operations, developme...
If cloud computing benefits are so clear, why have so few enterprises migrated their mission-critical apps? The answer is often inertia and FUD. No one ever got fired for not moving to the cloud - not yet. In his session at 15th Cloud Expo, Michael Hoch, SVP, Cloud Advisory Service at...
i preview the EMEA F5 Agility 2015 conference happening May 20-21 at the Edinburgh International Conference Centre (EICC) in Edinburgh, Scotland. Agility 2015 will lay the foundation for your business to innovate new paths to success, expand through barriers to growth, and deliver the ...
We found all manner of interesting practices and trends as it relates to cloud and security in our State of Application Delivery 2015 report. One of the more fascinating data points was a relationship between security posture and cloud adoption. That is, it appears that the more applic...
As more applications are needed to run those Things, traditional infrastructure concerns like scale and reliability will become paramount. Additional challenges with identity and access, improving the user experience, and the need for faster provisioning of services could overwhelm IT ...
FireEye Director of Strategic Partners, Sam Ware, talks about the new technical partnership between F5 and FireEye. FireEye aims to provide automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing. ...
SYS-CON Events announced today that CommVault has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo®, which will take place on November 3–5,...
iot clipping”Things” and the applications/services that support them are changing the way we live. Wearables in the sports and health sectors will grow to nearly 170 million devices by 2017 — an annual growth rate of 41 percent. Specific to the enterprise, if you thought the Bring Your...
F5 Worldwide Security Evangelist, David Holmes, talks about why the internet is going SSL Everywhere. He explains why there’s been a surge in encrypted traffic and reveals some interesting statistics from his ongoing research on the SSL protocol. Always an engaging guest, David takes u...
In a fascinating and fun conversation, InfoSec luminary, web application expert, TEDx speaker and WhiteHat Security Founder, Jeremiah Grossman explains some of the change occurring within information security. Have the never ending breaches changed the way people think about security? ...
Greg Maudsley, F5 Director Product Marketing, discusses the many challenges organizations face when trying to secure an evolving hybrid infrastructure all while allowing access to authorized, yet mobile users. As applications move to the cloud, policies & services need to follow. How d...
RSA Technology Consultant Josh Waterloo talks about the evolution of two-factor authentication and how risk based auth is starting to take hold. He also shows us a demo of the integration between RSA SecurID and BIG-IP APM to provide risk based, strong authentication for corporate acce...
Sporting the crisp F5 ‘Defend the New Perimeter’ t-shirt, I show you how to find F5 booth 1515 at RSA 2015 in 17 paces or less. The theme this year is Change – Challenge today’s security thinking and with the mobile revolution, applications delivered from hybrid environments and the sh...
For most C-level executives (and most of the rest of the planet too), the concept of ‘risk’ is generally first perceived as a negative. The notion of risk as a business positive (or a ‘business enabler’ even) is fanciful, flaky and fraught with fallibility – isn’t it? This proposition...
The Internet of Things (IoT) refers to the set of devices and systems that interconnect real world sensors and actuators to the internet. This includes many different types of systems. These systems connect to the internet or gateway in a variety of manners including long range WiFi/E...