Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Security Journal
Jonathan George, Sr. Product Marketing Manager, talks about the various threats that can occur on a carrier network. Mobile devices are becoming a hot target for malicious attacks and users may not be aware that they have potentially become part of a botnet. And it is not just mobile d...
I show you how to find F5 booth G11 in Hall 5 of Grand Via 2 for Mobile World Congress (View the map). With close to 90,000 attendees, #MWC15 is a huge show and the theme is The Edge of Innovation. Mobile technology is pushing this innovation and F5 has the solutions to help service pr...
As we kick off 2015, I predict that this will go down in history as the year of the Threat Intelligence Platform (TIP). We say goodbye to the year of the advanced persistent threat (APT) in 2014, just as this time last year we waved adieu to mobile device management (MDM). We’ve seen ...
​I had the chance to sit down with Lee Slaughter, Skytap's Manager of Information Security, to discuss security in the cloud, the efforts that make up a thorough due diligence when choosing a cloud provider, and how to keep up with external and internal threats to your business. Noel:...
I give a preview of Mobile World Congress 2015. #MWC15 is next week, March 2-5 in Barcelona, Spain at the Fira Gran Via. We got some fun stuff for next week, including a very special guest, and some of the topics we’re covering include IoT, NFV, VoLTE and of course, Security. Set the d...
At the end of the year, WhiteHat Security posted an interesting blog titled, "The Parabola of Reported WebAppSec Vulnerabilities" in which a downward trend in web application vulnerabilities (as collected by the folks at Risk Based Security's VulnDB) was noted beginning in 2008 after h...
When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact performance. Organizations need to realize that the complexity and fear of access control is a...
DNS will become even more important as additional sensors, monitors, actuators and other ‘things’ connect to the internet. It helps those devices like refrigerators and automobiles get their updates and helps us people find those things in our digital world. Here is a short Whiteboard ...
The security landscape is evolving more than ever before – not only must chief information security officers (CISOs) deal with constant increasing cyber-attack threats and security breaches but they must keep up with mobility trends and concerns about access to data and protecting iden...
It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American public and American all...
I’m writing this blog on Monday, February 9th, late afternoon with a very full stomach. Last week we launched Vormetric Tokenization with Dynamic Data Masking and today we took the engineers out for a big lunch to celebrate. Now feeling full and contemplative, I thought I’d join the cl...
What happens when the gadgets you wear also control the things around you? No doubt you’ve heard of various internet-connected things like light bulbs, coffee makers and thermostats making their way into our homes. And no doubt, you’ve probably heard of such devices that you wear (or ...
If your business has any investment in public cloud SaaS applications, then it’s time to invest in a Cloud Access Service Broker (CASB). That’s our takeaway from the recently released Gartner security report, “Emerging Technology Analysis: Cloud Access Security Brokers.” More and more...
Matt Quill, F5 Business Development Manager, explains the collaboration with VMware and how F5 has certified three critical components of its industry-leading application services portfolio on vCloud Air, VMware’s hybrid cloud. We now offer LTM, GTM, and ASM to customers in a “bring yo...
Keith McManigal, F5 RVP Channel Sales, stops by to share some insight into F5’s Channel Program. He discusses the critical role the channel plays, how F5/VMware technology integration spurs channel growth and how to become a F5 channel partner. In addition, Keith talks about F5 being a...
I wrap it up from VMware PEX in San Francisco. Special thanks, of course, to you for watching this week – I do appreciate it and hope it is both entertaining and helpful. Appreciation also goes out to Ron Carovano, Matt Quill and Keith McManigal for their guest appearances. Reporting f...
Ron Carovano, Mgr. Business Development for Security Solutions, gives us the scoop on what customers are asking for from security vendors, including F5. Consolidation, visibility, mobility and management are all on the table. Point products do not always solve the problem.
I lead you on a short journey to find F5 booth #209 at VMware Partner Exchange. I talk about the theme of Dare to Thrive and with this being my first 2015 trade show video, an opening number is in order of course.
Recently, Forrester analyst Rick Holland brought up the point of quality vs. quantity when it comes to threat indicators. We agree, the focus should never be on the quantity of data, it should be on the quality of data. So the question becomes, where and how can you gather or make sens...
While news about the malicious hacking trade and the actions of elusive cyber-criminals continue to grab headlines, the third of our annual Insider Threat reports confirm that the risk posed by those legitimately ‘inside the fence’ continues to top business data security concerns. Of c...
I offer a preview of VMware PEX2015 in San Francisco along with some of the videos that are planned for next week. Call this a PEX Promo!
As we continue to work with global companies focused on everything mobile, one thing is clear – the mobile space is changing rapidly and with that comes opportunity for security attacks and identity theft. We are committed to delivering the best-of-breed mobile identity and mobile loca...
Recent data breaches involved an unclassified computer network used by President Obama’s senior staff, prompting countermeasures by the administration and resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or hardwa...
The steadily increasing frequency of data breach occurrences in 2014 has been both astounding and worrisome. From Target and Neiman Marcus to Michaels, Chick-fil-A and Home Depot, fraudsters are leaving no stone unturned, and the millions of customers unlucky enough to use infected poi...
Last summer I wrote about the some of the cool technology that the NFL was going to use during the 2014/15 season. There were sensors in the player’s shoulder pads tracking all their on field movements. It measured player acceleration rates, top speed, length of runs, and even the dist...
Everyone has done it, used some kind of wild way to remember user names and passwords. Let’s face it, the rules for managing passwords is overwhelming. People are required to remember numerous sets of credentials for all of the systems and applications they need to access their job and...
Cyber threats are becoming more advanced, persistent, and focused. The threat landscape is rapidly changing, and evolving faster than ever. Today it is difficult to determine who is winning: either those behind the cyber threats, or those fighting to prevent and remediate the threats. ...
When properly implemented and managed, secure enterprise file sync-and-share (EFSS) applications can improve project management and empower your workforce. Unfortunately, making the business case for secure EFSS isn’t always easy – especially when users and management aren’t aware of t...
With every New Year it is time to look back at the industry events of the past 12 months, and use our expertise to predict what lies ahead, in order to be more prepared. With regards to DDoS attacks, here is a short list of what to expect in 2015. We expect to see an increase in DDoS...
Cloud security is a top concern for chief security officers. In almost any enterprise, cloud migration is a given fact and recent attacks have proven, yet again, that data security is a critical component in any cloud migration strategy. Below are four tips, specific to Infrastructur...
2014 was a year of cloud security and compliance accomplishments and 2015 will certainly bring new challenges and new successes. In 2014, we worked closely with many customers who needed to adhere to HIPAA and PCI DSS compliance requirements. We made sure all bases were covered, data ...
While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking al...
From Baby Boomers to Gen X, Y, & Z, there are certain characteristics that define, at least according to demographers and historians, each generation. Generation X, specifically, might also remember a Rush song called The Analog Kid. While not as frequently played as Tom Sawyer or Subd...
Reliable access to mission-critical applications is a key success factor for enterprises. For many organizations, moving applications from physical data centers to the cloud can increase resource capacity and ensure availability while reducing system management and IT infrastructure co...
Web app attacks are on the rise. According to Verizon's Data Breach Investigations Report, web app attacks doubled in frequency from 2012 to 2013, jumping from under 20% to 40% of recorded incidents. That should be a concern, because it's an application world and that means we're also...
DPS, or damage per second, is a somewhat self-describing term for the amount of damage that can be dealt (by a single person or a group) in one second. It's typically used by players of online games such as World of Warcraft or Diablo. Not that us old skool table top gamers don't calcu...
How much risk do you have of someone stealing disks from your datacenter? Take the average life span of a hard drive. The enterprise class hard drive is designed to last a minimum of 5 years. During that 5 years a SAN or NAS filled with hard disks is expected to have at least 99.999 pe...
Now that we’re past the New Year, it’s time to learn from what happened in 2013 and 2014, especially when it comes to IT Security. One of those things we in IT Security should learn, is that there has been a strong insider related component in the vast majority of the large breaches th...
The shift to the cloud is in full swing. More and more organizations are adopting Software-as-a-Service(SaaS), forcing IT organizations to develop new strategies to secure the onslaught of data created and stored in cloud applications. Failure to develop strategies to close security g...
In 2014, we saw AWS customers (especially in the small and mid-size segments) start to lay claim that they couldn’t make their own networks as secure as using Amazon’s EC2/S3 infrastructure services. This trend will accelerate in 2015. Small and medium businesses usage of cloud applic...