ADS BY GOOGLE
From the Blogosphere

It took some time but the need for Total Security Management is slowly starting to sink in. With regard to quality it took the western manufacturing industry several decades before it realized that a separate quality department – standing at the end of the production line to check whic...
In September 2014, Apple made encryption default with the introduction of the iPhone 6. Then, in February 2016, a Los Angeles judge issued an order to Apple to help break into the encrypted iPhone belonging to a terrorist involved in a mass shooting. Apple had used some of the strong...
Experts are debating whether the Democratic National Committee’s (DNC) email system was hacked by the Russian military intelligence service (G.R.U.) or Guccifer 2.0, a lone wolf Romanian hacker. While this is a very important question, the answer will not change the results: over 20,00...
More than 95 percent of the world’s enterprises rely on SSH user keys to provide administrators and developers an effective means of gaining encrypted access to critical infrastructure: operating systems, applications, payment processing systems, databases, human resource and financial...
Yes this post is about the #Brexit, but it's about your data more importantly! As a company that has a large customer and open source user community in the EU, I thought a quick note on some considerations following the Brexit vote were in order. This is not an opinion piece, as that ...
This is part one of a two-part series of posts about using some common server storage I/O benchmark tools and workload scripts. View part II here which includes the workload scripts and where to view sample results. There are various tools and workloads for server I/O benchmark testin...
Clouds are typically classified into four different topologies: private, public, community and hybrid clouds. Let’s focus on hybrid clouds: what are the use cases that require this topology, what are the challenges, and who stands to benefit from the hybrid cloud trend? First off, a d...
Tangerine Bank in Toronto has improved end-user experiences for online banking and made data more secure across its lifecycle, speeding the delivery of a new credit card offering. We'll now learn how improving end-user experiences for online banking and making data more secure across ...
A data breach could happen to anyone. Data managed by your company is valuable to someone, no matter what the data is. Everything has a price tag on the dark web. It is especially true when it is customer data, such as personal and payment card details. When your customers’ data turns...
The next BriefingsDirect security market transformation discussion explores how airline Allegiant Air solved its payment card industry (PCI) problem -- and got a whole lot better security culture to boot. When Allegiant needed to quickly manage its compliance around the Payment Card I...
Cybercrime costs the global economy as much as $450 billion each year. And, the median cost of cybercrime has increased by nearly 200% in the last five years. Meanwhile, collaboration has become the cornerstone of successful organizations. But collaboration often comes with a risk. ...
Recently, I attended Cloud Expo and @ThingsExpo in NYC (June 7-9) and I found the content to be interesting and thoughtful for companies that are planning their future success. Like most conferences, there was a lot of chatter about IoT app development, consumer trends, and security w...
One of the greatest challenges facing business and government organizations is how to store and move sensitive data around the world while maintaining security. Storing and securing critical data held within data centers (whether physical or virtual) is top of mind from the boardroom t...
Insider threats are on the rise more than ever. It’s a malicious activity that originates from users within an organization, as opposed to attacks like DDoS that come from the outside. Cyber hackers of this kind get inside the system to steal intellectual property from the company via ...
Advances in thin clients, desktop virtualization (VDI), cloud management services, and mobile delivery networks are allowing both increased security and edge applications performance gains. The next BriefingsDirect thought leadership panel discussion focuses on the heightened role of ...
Information security has become a critical priority for many businesses over the past decade, and for good reason. It seems like a new breach is exposed on nearly a daily basis, impacting another organization and its patrons. However, some companies believe that they're safe because th...
It is my firm belief that developers today are not focused on security during periods of head-down development. I would love to know the percentage of web developers that know about the Open Web Application Security Project or OWASP. This non-profit organization is simply focused on th...
Security is one of the most controversial topics in the software industry. How do you measure security? Is your favorite software fundamentally insecure? Are Docker containers secure? Dan Walsh, SELinux architect, wrote: "Some people make the mistake of thinking of containers as a bet...
Organizations are experiencing a new emphasis when it comes to cybersecurity. They are moving from securing the perimeter to securing the data within it, which is the result of the proliferation of connected devices in organizations today: smartphones, tablets and the IoT. Organization...
Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists. The cloud brings unique advantages to individual and business users alike and this explains the exponenti...
Hosting providers are often judged by their ability to ensure network availability/uptime. Unfortunately, distributed denial of service (DDoS) easily impact service availability and, in some instances, completely take down a hosting platform. As DDoS attacks continue to increase in siz...
Software components that were once good can sour instantly when new vulnerabilities are discovered within them. When that happens, the bears are coming, and you have to respond quickly. Two men are walking through a forest. Suddenly, they see a bear off in the distance, running toward...
Humorous metaphor about the cloud aside, this is a not-so-lighthearted blog entry. This is the convergence of progress, loss, and humility. In the fall of 2015, Salesforce.com (SFDC) announced upcoming initiatives for the Internet of Things. What we now know is that it was envisioned ...
Recent reports from the GAO indicate the US government is falling behind the technology gap, effecting everything from nuclear weaponry preparedness to an increase in medical errors that have pushed them to become the third leading cause of US deaths. We have IT solutions to solve prob...
Many of you are very familiar with iRules, our Tool Command Language (Tcl) based scripter. It’s a powerful application delivery tool to have a programmable proxy that allows you to manipulate – in real time – any network traffic passing through the BIG-IP. Many BIG-IP fans have used it...
Ransom Trojans have evolved over time. The newer variants target files on a computer’s local drives, network shares and cloud paths alike. It's been years since it became obvious that crypto isn't necessarily usable for benign purposes only. Back in the day, a variety of data encrypt...
The EMV liability shift that began in October 2015 is likely to reduce card present payment card fraud. That’s a double-edged sword for retailers with an online presence and those who accept mobile payments, as fraudsters are seeking easier routes to ill-gotten gain. Add to this the on...
Wow, if you ever wanted to learn about Rugged DevOps (some call it DevSecOps), sit down for a spell with Shannon Lietz, Ian Allison and Scott Kennedy from Intuit. We discussed a number of important topics including internal war games, culture hacking, gamification of Rugged DevOps and ...
As the march to connect each and every noun on this planet continues with a blistering pace, the various ways, contraptions and sensors used to collect data is greatly expanding. What once was a (relatively) small collection of fitness trackers, smartwatches, thermostats, automobiles a...
Internet of Things (IoT), hybrid cloud services, mobile-first, and DevOps are increasing the demands and complexity of the overall development process. Key factors to improving both development speed and security despite these new challenges include new levels of collaboration and com...
Most people love new technology. It can make us more productive. It can lower our costs. It can be very “cool.” So, if it’s true and most people love new technology, why do we tend to adopt new technology on a “curve?” Why do innovators and early adopters jump in early while others bec...
As we have seen the growth in security challenges across the organization, we have also seen the growth in security spending and number of products that an enterprise buys. But have we, as an industry, been able to show that we are better off or worse? There is no clear yardstick to me...
Initially, we came across ransomware which exploited the entire system and just restricted you from interacting with your own device, later on requiring you to pay dollars if you want to go back and use your computer. And then it started becoming obsolete because an end-user. People...
The purpose of this document describes how to generate a report for all the certificates using in the Java environment by using a simple shell script. The script checks all certificates that are stored in Keystores. The script generates a report in the form of CSV file and the report c...
According to a study the rising number of cloud-specific security attacks are likely to propel the demand for cloud security systems to 20 percent CAGR over the next four years. Adoption of cloud computing services has risen and so have the security risks associated with them. Accordi...
It is a sad but very real truth that many, dare I say most, IT professionals consider alerts to be the bane of their existence. After all, they’re annoying, noisy, mostly useless and frequently false. Thus, we IT professionals who specialize in IT monitoring are likely well acquainted ...
If we are involved in a cyber-war, where are the frontlines? What are the defenses that will work? Much of the efforts done so far in cybersecurity are nothing more than building an ineffective Maginot Line for cyber-defenses. Should we be spending more time (and money) in figuring ou...
Software as a Service (SaaS) is a model that has become a popular choice for deploying enterprise applications, delivering efficiencies and value to organizations in many ways. The benefits SaaS solutions deliver include not only avoiding the major resource drain and licensing costs as...
Currently, the preferred method of data protection of cloud giants, such as Google, is to replicate the data across different locations (i.e., data centers), rather than performing a true back up. This is done because a true back up seems logistically too complicated given the amount o...
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DN...


ADS BY GOOGLE