ADS BY GOOGLE
From the Blogosphere

The cloud isn’t a fad. Businesses that don’t make the move are falling behind the competition. According to a recent ComputerWorld study, more than 40% of IT executives said that their organizations will spend more on Software as a Service (SaaS) and a mix of public, private hybrid and...
Carl Bradley, U.S. Navy (Ret.), is a Cyber Security Consultant, Information Assurance & IT Security Consulting & Intelligence Strategy, HP Enterprise Services, U.S. Public Sector. SecuritySolutionsWatch.com: Thank you for joining us today, Carl. Before discussing HP Enterprise Securit...
SQL injections are unique compared to other cyberattacks. These threats are very common and have been around for a while. One would think that this would mean businesses should have an idea of how to stop these incidents from happening, right? Unfortunately, SQL security remains a thor...
When business disruption, occurs, it is more likely to sneak in through your defenses than it is to overwhelm you by fire, flood, earthquake or hurricane. Instead of breaking in through your walls and ceilings, it sneaks in through your defenses to steal data, install malware or freeze...
A panel of experts examines how The Open Group Trusted Technology Forum standards and accreditation activities enhance the security of global supply chains and improve the integrity of openly available IT products and components.
SiteLock business website security solutions, is the only web security solution to offer complete, cloud-based website protection. Its 360-degree monitoring finds and fixes threats, prevents future attacks, accelerates website performance and meets PCI compliance standards for business...
Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with custo...
As more and more businesses choose to depend on the cloud, it is not unreasonable to be cynical and doubt the evolution. Are businesses risking it all by moving their data to the cloud? Or is this a totally thought-out move? The days of hosting websites and applications on your own in...
My daughter has been asking for a puppy for over a year. A Chow puppy. I’ve had Chow Chows my entire life and our current Chow, Max, is a big 72lb cinnamon boy. He’s also the medical alert dog for our daughter. Max, a rescue, is about 5 years old and we wanted to get a puppy so Max-Boy...
The growing cloud computing industry brings many new opportunities, but with success comes litigation, both from competitors seeking to gain an edge in a crowded market and opportunists seeking to make a quick buck. Valid patents and good innovations deserve due respect and considerati...
Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. Although every one of these sta...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. A June 2014 Gartner Report on Secu...
Maintaining network security has never been more challenging than it is right now. Traditional network perimeters are beginning to blur in the face of consumerization, the rise of mobility, migration to the cloud, and the Internet of Things. The pursuit of business agility has driven t...
The Open Group panel discusses what constitutes a good standard, or set of standards, and how organizations can work to better detect misdeeds. How can global enterprise cybersecurity be improved for better enterprise integrity and risk mitigation? What constitutes a good standard, or...
On March 18, 2015, system administrators and developers received ominous news: two high severity vulnerabilities in OpenSSL would be announced the next day. Since Heartbleed, OpenSSL had been on a bad streak, and it looked like things were only going to get worse. Operations, developme...
Dorothy the CIO was walking the yellow brick road of planning. She was on her way to the Emerald City to ask the great wizard of the agile data center for advice. Along the way she met two other CIOs who joined her on the journey, nicknamed Tin Man and Scarecrow. Their travels brought ...
Avito, a Russian eCommerce site and portal, uses big data technology to improve fraud detection, as well as better understand how their users adapt to new advertising approaches. This BriefingsDirect big data innovation discussion examines how Avito, a Russian eCommerce site and porta...
A network-centric systems approach to IoT has begun to dramatically affect physical security. The opportunity reaches well beyond simply connecting new sensors and information sources. Integration of sensors and controllers is a necessary step and serves as a foundation for generating ...
We found all manner of interesting practices and trends as it relates to cloud and security in our State of Application Delivery 2015 report. One of the more fascinating data points was a relationship between security posture and cloud adoption. That is, it appears that the more applic...
The clamor surrounding enterprise cybersecurity is to be expected, of course, with all the breaches – ahem, “incidents” – over the last year or so. Home Depot. Target. Anthem. The list goes on and on. And with breaches come enterprise dollars, frantically swirling over the proverbial b...
The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days, according to Gregory Touhill, deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. ...
Web application security. Everyone knows how important it is (and if they don't, they should) and yet the complexity of managing services that provide it often result in, shall we say, less than holistic coverage of applications. At least that seems to be the case given some rather dis...
SYS-CON Events announced today that WHOA.com, an ISO 27001 Certified secure cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. WHOA.com is a le...
In recent years, the US government has become a leading advocate for continuous monitoring of security threats and vulnerabilities. But how effectively are departments and agencies in implementing these programs? And how do we measure success? Moving Towards Continuous Monitoring Tho...
For most C-level executives (and most of the rest of the planet too), the concept of ‘risk’ is generally first perceived as a negative. The notion of risk as a business positive (or a ‘business enabler’ even) is fanciful, flaky and fraught with fallibility – isn’t it? This proposition...
What keeps an IT manager up at night? Ghosts, goblins and ghouls? Guess again. It takes more than a few measly monsters to cause a lack of sleep in today’s IT department. IT used to exist primarily to monitor and maintain systems, protect against data breaches and malware attacks, an...
Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purp...
This book does a great job of covering all the security topics you need to know about to work successfully in a decent size enterprise. This book is a beast!!! It is 100% textbook, with a lot of exercises at the end of the chapters. If your class uses this book, get ready for a fire h...
One of the most difficult things to do today is to identify a legitimate user. Part of the problem is that the definition of a legitimate users depends greatly on the application. Your public facing website, for example, may loosely define legitimate as "can open a TCP connection and s...
Keeping data from getting out into the wild or being damaged by cyber attackers is what keeps CISOs, the executive team and boards of directors up at night. To protect organizations, cybersecurity needs to be automated and real-time, it needs to learn contextually like we do and it nee...
If you have a Network Operations Center (or NOC, as the kids call it), you have a skilled set of eyes monitoring your system and alerting your engineers when things go wrong. (If you have something like a NOC, such as a first tier team that processes tickets, we’re looking at you, too)...
With recent high profile data breaches companies should ensure they have the five following file governance policies in place in their company to secure their file assets. Ensure that an Identity Management policy is in-place, is clear, and if one exists that it is validated and check...
I’ve been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on a multi-week European vacation. After...
At the recent Mobile World Congress 2015 (MWC) in Barcelona, we heard operators and vendors discuss the future of mobile network connectivity around the globe. While we look forward to new updates on this subject (and updates from these major players), the conference was also ripe with...
Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat and risk analysis. Security team efforts haven’t been integrated, or if they are integrated, it is only through rudimentary tech...
After an application crash, we know how important it is to figure out what went wrong and plan so it doesn’t happen again. In this post, we’ll look at some common causes of major website crashes, along with preventive measures you can take to avoid them in the future. With this extra k...
At some point in the near future, our alarm clock will ring when the biometric scanner monitoring our sleep indicates we have achieved optimum rest. Our clock will connect with the coffee maker, and a steaming cup of brew will be waiting, while the lighting system in our home gradually...
A virtual Chief Information Security Officer (CISO) can be an invaluable asset to your company. The virtual CISO provides your business with a person that will be in charge of the electronic security aspects of your company. You will have an executive in place that will not only overse...
Health Shared Services BC in Vancouver implemented one of the healthcare industry’s first Service Asset and Configuration Management Systems to help them optimize performance of their IT systems and applications. We'll explore how HSSBC has successfully implemented one of the healthca...
A new report sponsored by CA Technologies examines how IT and business leaders aim to sync the security and mobile user experience. CA Technologies’ latest research determines that though top concerns of IT Security practices include the elimination of breaches, data protection and ide...


ADS BY GOOGLE