Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Security Journal
I give a quick tour of the Edinburgh International Conference Center (EICC) and show how to navigate around for the F5 EMEA Agility2015 conference. Get a sneak peek of the pre-show setup, learn how to register and get your badge along with how to find the breakout and general keynote s...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. A June 2014 Gartner Report on Secu...
Maintaining network security has never been more challenging than it is right now. Traditional network perimeters are beginning to blur in the face of consumerization, the rise of mobility, migration to the cloud, and the Internet of Things. The pursuit of business agility has driven t...
On March 18, 2015, system administrators and developers received ominous news: two high severity vulnerabilities in OpenSSL would be announced the next day. Since Heartbleed, OpenSSL had been on a bad streak, and it looked like things were only going to get worse. Operations, developme...
If cloud computing benefits are so clear, why have so few enterprises migrated their mission-critical apps? The answer is often inertia and FUD. No one ever got fired for not moving to the cloud - not yet. In his session at 15th Cloud Expo, Michael Hoch, SVP, Cloud Advisory Service at...
i preview the EMEA F5 Agility 2015 conference happening May 20-21 at the Edinburgh International Conference Centre (EICC) in Edinburgh, Scotland. Agility 2015 will lay the foundation for your business to innovate new paths to success, expand through barriers to growth, and deliver the ...
We found all manner of interesting practices and trends as it relates to cloud and security in our State of Application Delivery 2015 report. One of the more fascinating data points was a relationship between security posture and cloud adoption. That is, it appears that the more applic...
As more applications are needed to run those Things, traditional infrastructure concerns like scale and reliability will become paramount. Additional challenges with identity and access, improving the user experience, and the need for faster provisioning of services could overwhelm IT ...
FireEye Director of Strategic Partners, Sam Ware, talks about the new technical partnership between F5 and FireEye. FireEye aims to provide automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing. ...
SYS-CON Events announced today that CommVault has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo®, which will take place on November 3–5,...
iot clipping”Things” and the applications/services that support them are changing the way we live. Wearables in the sports and health sectors will grow to nearly 170 million devices by 2017 — an annual growth rate of 41 percent. Specific to the enterprise, if you thought the Bring Your...
F5 Worldwide Security Evangelist, David Holmes, talks about why the internet is going SSL Everywhere. He explains why there’s been a surge in encrypted traffic and reveals some interesting statistics from his ongoing research on the SSL protocol. Always an engaging guest, David takes u...
In a fascinating and fun conversation, InfoSec luminary, web application expert, TEDx speaker and WhiteHat Security Founder, Jeremiah Grossman explains some of the change occurring within information security. Have the never ending breaches changed the way people think about security? ...
Greg Maudsley, F5 Director Product Marketing, discusses the many challenges organizations face when trying to secure an evolving hybrid infrastructure all while allowing access to authorized, yet mobile users. As applications move to the cloud, policies & services need to follow. How d...
RSA Technology Consultant Josh Waterloo talks about the evolution of two-factor authentication and how risk based auth is starting to take hold. He also shows us a demo of the integration between RSA SecurID and BIG-IP APM to provide risk based, strong authentication for corporate acce...
Sporting the crisp F5 ‘Defend the New Perimeter’ t-shirt, I show you how to find F5 booth 1515 at RSA 2015 in 17 paces or less. The theme this year is Change – Challenge today’s security thinking and with the mobile revolution, applications delivered from hybrid environments and the sh...
For most C-level executives (and most of the rest of the planet too), the concept of ‘risk’ is generally first perceived as a negative. The notion of risk as a business positive (or a ‘business enabler’ even) is fanciful, flaky and fraught with fallibility – isn’t it? This proposition...
The Internet of Things (IoT) refers to the set of devices and systems that interconnect real world sensors and actuators to the internet. This includes many different types of systems. These systems connect to the internet or gateway in a variety of manners including long range WiFi/E...
I give a preview of RSA 2015, running April 20 – 23 in San Francisco’s Moscone Center. F5 will showcase a number of solutions that help organizations defend against the threats to their data and protect the perimeter. Visit us in Booth 1515 to learn about solutions like our Silverline ...
What keeps an IT manager up at night? Ghosts, goblins and ghouls? Guess again. It takes more than a few measly monsters to cause a lack of sleep in today’s IT department. IT used to exist primarily to monitor and maintain systems, protect against data breaches and malware attacks, an...
Recently I’ve received a number of ‘I am writing to inform you that we were the target of a sophisticated cyber attack and some of your personal information may have been accessed by the attackers..’ letters for myself and my family. I especially hate the ones that start, ‘To the paren...
If you have a Network Operations Center (or NOC, as the kids call it), you have a skilled set of eyes monitoring your system and alerting your engineers when things go wrong. (If you have something like a NOC, such as a first tier team that processes tickets, we’re looking at you, too)...
I’ve been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on a multi-week European vacation. After...
At the recent Mobile World Congress 2015 (MWC) in Barcelona, we heard operators and vendors discuss the future of mobile network connectivity around the globe. While we look forward to new updates on this subject (and updates from these major players), the conference was also ripe with...
Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat and risk analysis. Security team efforts haven’t been integrated, or if they are integrated, it is only through rudimentary tech...
After an application crash, we know how important it is to figure out what went wrong and plan so it doesn’t happen again. In this post, we’ll look at some common causes of major website crashes, along with preventive measures you can take to avoid them in the future. With this extra k...
At some point in the near future, our alarm clock will ring when the biometric scanner monitoring our sleep indicates we have achieved optimum rest. Our clock will connect with the coffee maker, and a steaming cup of brew will be waiting, while the lighting system in our home gradually...
A virtual Chief Information Security Officer (CISO) can be an invaluable asset to your company. The virtual CISO provides your business with a person that will be in charge of the electronic security aspects of your company. You will have an executive in place that will not only overse...
Health Shared Services BC in Vancouver implemented one of the healthcare industry’s first Service Asset and Configuration Management Systems to help them optimize performance of their IT systems and applications. We'll explore how HSSBC has successfully implemented one of the healthca...
In 2007, there were virtually no mobile apps. Last year alone, over 100 billion apps were downloaded, generating $26 billion in sales. App stores operated by Apple and Google now offer more than a million apps each and people every day depend on apps like Facebook, Google Maps and Uber...
Like DDoS attacks, aggressive screen scraping can create huge spikes in traffic, cause brownouts, and even take you down for extended periods of time. Web scraping doesn’t make the headlines and most people aren’t aware of the damage it can cause to your website’s success. Thieves an...
CommVault has announced that top industry technology visionaries have joined its leadership team. The addition of leaders from companies such as Oracle, SAP, Microsoft, Cisco, PwC and EMC signals the continuation of CommVault Next, the company's business transformation for sales, go-to...
Over the last several weeks, we’ve examined the risks of using the public cloud in the enterprise workplace. From unauthorized file access to regulatory noncompliance, the potential scenarios vary from dire to more dire – and it’s up to decision makers to take control of their organiza...
I wrap it up from Mobile World Congress 2015. Thanks to you for watching and thanks to our guests this week including Frank Yue, Jonathan George, Peter Nas, Ron Carovano, Richard Duncan, Misbah Mahmoodi and a very special Mahalo to F5 CEO John McAdam! Certainly a personal and professio...
Misbah Mahmoodi, Sr. Product Marketing Manager, does a great job explaining the service provider challenges with the exponential growth in data usage from a subscriber point of view. For mobile operators, one of the worst things that subscribers can experience on the network is when th...
Frank Yue, Sr. Technical Marketing Manager, visits again to talk about the unique challenges service providers face in managing mobile data traffic. As more devices are generating more traffic, congestion can create bottlenecks on a carrier’s network. Service providers need to manage a...
With an industry full of TLAs (three letter acronyms) Richard Duncan, Sr. Manager Systems Engineering, gives a wonderful explanation of SDN using the universal TV remote example. In this fun interview, Richard demystifies SDN and explains how SDN allows organizations to select best of ...
Ron Carovano, Manager, Business Development, joins us from the F5 kiosk in the AirWatch Connect booth at #MWC15. Always a fun and informative guest, Ron fills us in on the F5/AirWatch partnership and how our joint solution helps an employee with their brand new personal mobile device c...
Peter Nas, Sr. Solution Architect, explains what happens when the many MWC attendees from all over the world arrive in Barcelona and need to connect their mobile devices to a carrier network. Peter does a great job walking us through what happens when a mobile device connects to a fore...
Frank Yue, Sr. Technical Marketing Manager, discusses Network Function Virtualization and how service providers are deploying it within their infrastructures. Frank talks about the relation to SDN, the functionality it provides SP’s, the NFV components, the importance within a carrier ...