ADS BY GOOGLE
From the Blogosphere

Local business listings began with a basic business directory more than a decade ago. Chances are, your business has a local listing wherever you have a physical address location. Check it out — go to Google, type in your company name. You’ll probably see a map locating your business a...
As businesses seek to cost-effectively consume IT services, interest is growing in moving computation and storage from on-premise equipment to Internet-based systems, often referred to as "the cloud." This new document from Microsoft focuses on the security challenges and recommended a...
On June 10, 2010, the US Senate Homeland Security and Governmental Affairs Committee (HSGAC) unveiled a major cybersecurity bill designed to modernize, strengthen, and coordinate US Cyber defenses. Senators Collins, Carper and Lieberman introduced this bill with the clear articulation...
Scott Sanchez recently rebutted the argument that “Cloud Isn’t Secure Because It Is Multi-Tenant” by pointing out that “internal data centers are multi-tenant today, and you aren’t managing them as well as a public cloud is managed.” Despite the truth of that statement, his argument do...
The data from Geolocation providers offers highly valuable data to a variety of stakeholders and is no longer just for advertising.
ADNs are not made up of simple networking devices and servers. In order to function reliably, a strong management back end needs to control all parts of the ADN, managing every aspect of application delivery from application awareness through hardware and network management. As these d...
Application health monitors are now a tried and true technology of the Application Delivery Controller, yet traditional monitors require interaction with the application. Inband passive monitors change that requirement and monitor applications transparently.
Load balancing technology is alive and well; in fact, it is the basis from which today’s Application Deliver Controllers (ADCs) operate. But the pervasiveness of load balancing technology does not mean it is universally understood, nor is it typically discussed other than from a basic,...
As we stand upon the precipice of yet another major shift in computing models and technology, it is increasingly important to note that our parachutes (budgets) are not nearly as full as they once were. Diving into new technology without the right safety net today, in a constrained eco...
The TMOS architecture, a collection of real-time features and functions, purpose-built and designed as a full-proxy solution with the power and performance required in today’s network infrastructure.
Integrating security, availability, and application acceleration services to enable context-aware networking.
As we stand upon the precipice of yet another major shift in computing models and technology, it is increasingly important to note that our parachutes (budgets) are not nearly as full as they once were. Diving into new technology without the right safety net today, in a constrained eco...
One of the unfortunate effects of the continued evolution of the load balancer into today’s application delivery controller (ADC) is that it is often too easy to forget the basic problem for which load balancers were originally created—producing highly available, scalable, and predicta...
Green computing tends to focus on individual servers and devices, but even greater benefits can be realized with an architectural strategy that leverages green computing practices across the data center.
In this white paper we discuss using F5 BIG-IP Global Traffic Manager to orchestrate and deliver access to services in the cloud.
How building a smarter storage infrastructure based on the business value of data can enable you to address your data storage requirements efficiently and at the lowest cost.
F5 BIG-IP Local Traffic Manager helps reduce the impact on the WAN from VDI by working with VMware’s client and server components and optimizing the connection between users and their VDI virtual machines. When deployed in a branch scenario, BIG-IP LTM, iSessions, and BIG-IP WOM can co...
F5 Networks’ perspective on cloud computing: definition, architecture, and development. Cloud computing is not a revolution. It is an evolution that has been ongoing for well over a decade, if not since the very beginning of electronic computing. The cloud is simply an architectural mo...
By working collaboratively with partners that build some of the most widely deployed network management tools in the industry, F5 provides the bridge between application system and network infrastructure management. Using third-party tools such as HP Network Node Manager i and Microsof...
The question is usually presented by someone who’s in charge of “Security” in an organization. Now, I wouldn’t have had a problem with this if this was a technician, or a pen-tester of sorts, but I get really nervous when the CISO/CIO/Security manager is the one asking.
There has been a lot of chatter in the news lately about the possibility of a “widespread coordinated” cyber attack against our critical infrastructure and our ability to successfully defend against it. Most of this infrastructure ( eg. utilities, finance, transportation, etc) is own...
Dubbed Panda Cloud Antivrus Pro, the new edition works to protect computer users online and offline by extending the protections in the free product launched last year. The Free Edition is still available and also offers enhanced functions. As more computing functions continue to expl...
Global Crossing issued a press release 1 June 2010 which provides some foreshadowing of future actions I recommend technologists in the federal space closely track. They have just brought John Sutton onboard as Executive Vice President and General Manager of their Federal Sector. Joh...
Cloud isn’t secure because it is multi-tenant. This is a weak argument that I’m tired of hearing. Here’s my short and sweet rebuttal to that position. >> Your internal data centers are multi-tenant today, and you aren’t managing them as well as a public cloud is managed. I ca...
The more relevant comparison would be hosting and managing a network monitoring system on site vs. moving to a SaaS provider. For many organizations, IT is considered overhead and not the primary function of the organization. Companies move to the cloud for most of the same reasons c...
Next week in Phoenix, AZ, the Defense Intelligence Agency will host the 2010 Department of Defense Intelligence Information Systems (DoDIIS) Worldwide Conference. The theme of this event is "Mission Powered Partnerships...Keeping our Customers One Step Ahead." The conference will...
Did you read about the Blippy Data Breach? You know… Blippy, that up-and-coming startup that allowed very sensitive information to leak out and then tried to downplay the incident. In short, it was recently discovered that for two months, the credit card numbers of four Blippy user...
This question has been puzzling a few folks of late, not just CloudFucius. The Judicial/legal side of the internet seems to have gotten some attention lately even though courts have been trying to make sense and catch up with technology for some time, probably since the Electronic Com...
While companies certainly see a business benefit to a pay-as-you-go model for computing resources, security concerns seem always to appear at the top of surveys regarding cloud computing. These concerns include authentication, authorization, accounting (AAA) services; encryption; stora...
Trust is the fundamental business enabler. It is absolutely necessary for clients to trust their Cloud Providers. Without trust, business relationships cannot exist. Without trust, existing relationships cannot blossom. Trust becomes an issue as soon as there are potential conflicts...
Most enterprises lack three essential ingredients to ensure that sensitive information stored in via cloud computing hosts remains secure: procedures, policies and tools. So says a joint survey called “Information Governance in the Cloud: A Study of IT Practitioners” from Symantec Corp...
Enterprise leaders say that it's becoming difficult to find the highly qualified IT and network security talent they need that's affordable, and so they look to service providers for a solution. According to the latest market study by Forrester Research, demand has been growing. That ...
Michael Slaby was Chief Technology Officer for Obama for America. His team was responsible for the technology behind the online campaign. He’s giving a Berkman lunchtime talk. NOTE 1: I’m liveblogging, aqnd thus getting things wrong, paraphrasing, missing points, etc. Do not trust the...
Gladinet recognizes that one of the major concerns of cloud storage users is security. There are certainly many benefits to backing up your data to Synaptic Storage, but how can users be sure that hackers, service provider employees or anyone else can’t look at their files after they’r...
Last week we witnessed the first Cyber War, but it didn’t go down quite as many of us expected. Instead of a group of anonymous hackers trying to take over thousands of infected PCs or trying to cut off access to critical infrastructure, we saw Google declare the first salvo in its war...
I recently wrote a couple of to-be-published articles basically laying out all the reasons why we as security professionals should not be running away from so-called "new" technology. Essentially I am asking that we take the time to really understand what's so new about this stuff. Sma...
We at SafeKidZone believe, without a doubt, that the people who make up 911 emergency services are all heroes. It’s not an easy job, but these brave folks are earnest in their willingness to do what is necessary to help save a life. In the case of the Schmitts, in the article, 911 d...
Web 2.0 is as much about integration as it is interactivity. Thus it’s no surprise that an increasing number of organizations are including a feed of their recent Twitter activity on their site. But like any user generated content, and it is user generated after all, there’s a potentia...
Options to put a stop to the latest mutation of the Pushdo trojan. The Pushdo bot is a malevolent little beast that is nothing new to Infosec professionals. What might be new, however, is that it recently changed its code and now creates junk SSL connections. Lots of them. Pushdo is u...
Last week during its weekly meeting, the NCOIC Cloud Computing Working Group (CCWG) examined some of the legal aspects surrounding electronically stored information. With government use of cloud computing expected to grow, the group reach out to Mr. Jason R. Baron, Director of Litig...


ADS BY GOOGLE