Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Security Journal
I give a preview of RSA 2015, running April 20 – 23 in San Francisco’s Moscone Center. F5 will showcase a number of solutions that help organizations defend against the threats to their data and protect the perimeter. Visit us in Booth 1515 to learn about solutions like our Silverline ...
What keeps an IT manager up at night? Ghosts, goblins and ghouls? Guess again. It takes more than a few measly monsters to cause a lack of sleep in today’s IT department. IT used to exist primarily to monitor and maintain systems, protect against data breaches and malware attacks, an...
Recently I’ve received a number of ‘I am writing to inform you that we were the target of a sophisticated cyber attack and some of your personal information may have been accessed by the attackers..’ letters for myself and my family. I especially hate the ones that start, ‘To the paren...
If you have a Network Operations Center (or NOC, as the kids call it), you have a skilled set of eyes monitoring your system and alerting your engineers when things go wrong. (If you have something like a NOC, such as a first tier team that processes tickets, we’re looking at you, too)...
I’ve been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on a multi-week European vacation. After...
At the recent Mobile World Congress 2015 (MWC) in Barcelona, we heard operators and vendors discuss the future of mobile network connectivity around the globe. While we look forward to new updates on this subject (and updates from these major players), the conference was also ripe with...
Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat and risk analysis. Security team efforts haven’t been integrated, or if they are integrated, it is only through rudimentary tech...
After an application crash, we know how important it is to figure out what went wrong and plan so it doesn’t happen again. In this post, we’ll look at some common causes of major website crashes, along with preventive measures you can take to avoid them in the future. With this extra k...
At some point in the near future, our alarm clock will ring when the biometric scanner monitoring our sleep indicates we have achieved optimum rest. Our clock will connect with the coffee maker, and a steaming cup of brew will be waiting, while the lighting system in our home gradually...
A virtual Chief Information Security Officer (CISO) can be an invaluable asset to your company. The virtual CISO provides your business with a person that will be in charge of the electronic security aspects of your company. You will have an executive in place that will not only overse...
Health Shared Services BC in Vancouver implemented one of the healthcare industry’s first Service Asset and Configuration Management Systems to help them optimize performance of their IT systems and applications. We'll explore how HSSBC has successfully implemented one of the healthca...
In 2007, there were virtually no mobile apps. Last year alone, over 100 billion apps were downloaded, generating $26 billion in sales. App stores operated by Apple and Google now offer more than a million apps each and people every day depend on apps like Facebook, Google Maps and Uber...
Like DDoS attacks, aggressive screen scraping can create huge spikes in traffic, cause brownouts, and even take you down for extended periods of time. Web scraping doesn’t make the headlines and most people aren’t aware of the damage it can cause to your website’s success. Thieves an...
CommVault has announced that top industry technology visionaries have joined its leadership team. The addition of leaders from companies such as Oracle, SAP, Microsoft, Cisco, PwC and EMC signals the continuation of CommVault Next, the company's business transformation for sales, go-to...
Over the last several weeks, we’ve examined the risks of using the public cloud in the enterprise workplace. From unauthorized file access to regulatory noncompliance, the potential scenarios vary from dire to more dire – and it’s up to decision makers to take control of their organiza...
I wrap it up from Mobile World Congress 2015. Thanks to you for watching and thanks to our guests this week including Frank Yue, Jonathan George, Peter Nas, Ron Carovano, Richard Duncan, Misbah Mahmoodi and a very special Mahalo to F5 CEO John McAdam! Certainly a personal and professio...
Misbah Mahmoodi, Sr. Product Marketing Manager, does a great job explaining the service provider challenges with the exponential growth in data usage from a subscriber point of view. For mobile operators, one of the worst things that subscribers can experience on the network is when th...
Frank Yue, Sr. Technical Marketing Manager, visits again to talk about the unique challenges service providers face in managing mobile data traffic. As more devices are generating more traffic, congestion can create bottlenecks on a carrier’s network. Service providers need to manage a...
With an industry full of TLAs (three letter acronyms) Richard Duncan, Sr. Manager Systems Engineering, gives a wonderful explanation of SDN using the universal TV remote example. In this fun interview, Richard demystifies SDN and explains how SDN allows organizations to select best of ...
Ron Carovano, Manager, Business Development, joins us from the F5 kiosk in the AirWatch Connect booth at #MWC15. Always a fun and informative guest, Ron fills us in on the F5/AirWatch partnership and how our joint solution helps an employee with their brand new personal mobile device c...
Peter Nas, Sr. Solution Architect, explains what happens when the many MWC attendees from all over the world arrive in Barcelona and need to connect their mobile devices to a carrier network. Peter does a great job walking us through what happens when a mobile device connects to a fore...
Frank Yue, Sr. Technical Marketing Manager, discusses Network Function Virtualization and how service providers are deploying it within their infrastructures. Frank talks about the relation to SDN, the functionality it provides SP’s, the NFV components, the importance within a carrier ...
Jonathan George, Sr. Product Marketing Manager, talks about the various threats that can occur on a carrier network. Mobile devices are becoming a hot target for malicious attacks and users may not be aware that they have potentially become part of a botnet. And it is not just mobile d...
I show you how to find F5 booth G11 in Hall 5 of Grand Via 2 for Mobile World Congress (View the map). With close to 90,000 attendees, #MWC15 is a huge show and the theme is The Edge of Innovation. Mobile technology is pushing this innovation and F5 has the solutions to help service pr...
As we kick off 2015, I predict that this will go down in history as the year of the Threat Intelligence Platform (TIP). We say goodbye to the year of the advanced persistent threat (APT) in 2014, just as this time last year we waved adieu to mobile device management (MDM). We’ve seen ...
​I had the chance to sit down with Lee Slaughter, Skytap's Manager of Information Security, to discuss security in the cloud, the efforts that make up a thorough due diligence when choosing a cloud provider, and how to keep up with external and internal threats to your business. Noel:...
I give a preview of Mobile World Congress 2015. #MWC15 is next week, March 2-5 in Barcelona, Spain at the Fira Gran Via. We got some fun stuff for next week, including a very special guest, and some of the topics we’re covering include IoT, NFV, VoLTE and of course, Security. Set the d...
At the end of the year, WhiteHat Security posted an interesting blog titled, "The Parabola of Reported WebAppSec Vulnerabilities" in which a downward trend in web application vulnerabilities (as collected by the folks at Risk Based Security's VulnDB) was noted beginning in 2008 after h...
When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact performance. Organizations need to realize that the complexity and fear of access control is a...
DNS will become even more important as additional sensors, monitors, actuators and other ‘things’ connect to the internet. It helps those devices like refrigerators and automobiles get their updates and helps us people find those things in our digital world. Here is a short Whiteboard ...
The security landscape is evolving more than ever before – not only must chief information security officers (CISOs) deal with constant increasing cyber-attack threats and security breaches but they must keep up with mobility trends and concerns about access to data and protecting iden...
It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American public and American all...
I’m writing this blog on Monday, February 9th, late afternoon with a very full stomach. Last week we launched Vormetric Tokenization with Dynamic Data Masking and today we took the engineers out for a big lunch to celebrate. Now feeling full and contemplative, I thought I’d join the cl...
What happens when the gadgets you wear also control the things around you? No doubt you’ve heard of various internet-connected things like light bulbs, coffee makers and thermostats making their way into our homes. And no doubt, you’ve probably heard of such devices that you wear (or ...
If your business has any investment in public cloud SaaS applications, then it’s time to invest in a Cloud Access Service Broker (CASB). That’s our takeaway from the recently released Gartner security report, “Emerging Technology Analysis: Cloud Access Security Brokers.” More and more...
Matt Quill, F5 Business Development Manager, explains the collaboration with VMware and how F5 has certified three critical components of its industry-leading application services portfolio on vCloud Air, VMware’s hybrid cloud. We now offer LTM, GTM, and ASM to customers in a “bring yo...
Keith McManigal, F5 RVP Channel Sales, stops by to share some insight into F5’s Channel Program. He discusses the critical role the channel plays, how F5/VMware technology integration spurs channel growth and how to become a F5 channel partner. In addition, Keith talks about F5 being a...
I wrap it up from VMware PEX in San Francisco. Special thanks, of course, to you for watching this week – I do appreciate it and hope it is both entertaining and helpful. Appreciation also goes out to Ron Carovano, Matt Quill and Keith McManigal for their guest appearances. Reporting f...
Ron Carovano, Mgr. Business Development for Security Solutions, gives us the scoop on what customers are asking for from security vendors, including F5. Consolidation, visibility, mobility and management are all on the table. Point products do not always solve the problem.
I lead you on a short journey to find F5 booth #209 at VMware Partner Exchange. I talk about the theme of Dare to Thrive and with this being my first 2015 trade show video, an opening number is in order of course.