Welcome!


Security

Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some e...
Companies that need to improve application performance, for example, in server virtualization or VDI environments, frequently come to the conclusion that flash is the best strategy. SSD technology is becoming the "go to" solution for enhancing the performance of these kinds of critical...
While recently researching a known threat group within ThreatConnect.com, we identified several interesting observables associated with targets of a single Chinese-based Advanced Persistent Threat (APT) group. Over the course of seven days, we watched the adversary tailor their comman...
Lake Health's Information Security Officer has been expanding the breadth and depth of risk management there to a more holistic level -- far more than just a series of security products. Many people are practicing IT security and they're employing products and technologies. They're pu...
Cloud computing has dramatically altered how IT infrastructure is delivered and managed, as well as how IT functionality is consumed. However, security and privacy concerns continue to be major inhibitors for risk-conscious organizations to adoption of cloud computing – whether infrast...
With the common theme in today’s security management conversations being “your security will fail” and “expect to be breached,” it’s no question that there has been increased interest in the area of incident response. The industry is realizing that the addition of regulations, people, ...
The smart investment money in software application development is in the management layer. Actually that’s not true, the smart money is probably on almost every level of the application development lifecycle; but the deployment, release automation, testing, governance and release mana...
A wealth of security information exists in our networks from a variety of sources – policy servers, firewalls, switches, networking infrastructure, defensive components, and more. Unfortunately, most of that information is locked away in separate silos due to differences in products an...
Cloud computing is so alluring. The public cloud economizes infrastructure resources and creates a scalable, on-demand source for compute capacity. Additionally, the cloud can be a strategic asset for enterprises that know how to migrate, integrate and govern deployments securely. App...
PCI DSS is the industry standard for the safe and secure processing of payment card transactions. In order for a business to effectively process card payments, PCI DSS needs to be used and maintained. As more firms head online, the internet offering a great many business opportunities ...
Millions or even billions have been spent caring for tens of thousands of pregnant men in the U.K. For UK’s chronically underfunded National Health System, a few hundred million or a few billion is a very big deal. Especially given how easily this problem could have been prevented wi...
Sharing files with friends has never been easier. Whether it is via old-school hard copy methods like CDs, DVDs and USB drives, nefarious peer-to-peer torrents like BitTorrent or new shared, private cloud storage services like Dropbox, getting a photo or music file from one person to a...
There's been a flurry of discussion this week among Internet and Web standards heavy-hitters around WebSocket, the new communications protocol supported in Chrome 4 and Safari 5. What was the main issue? Is there some kind of fundamental security vulnerability with the WS protocol? Web...
“The good thing about standards is that there are so many to choose from.” – Dr. Tanenbaum And so we picked SMIL, an open web standard developed by the W3C (the fellows that brought us HTML, CSS and all the other things that make the internet work) for our new light-weight digital s...
Amazon releases the ability to share EBS snapshots so others can utilize and consume your data, irrespective of format. But EBS is more than just persisted data. It is a whole mechanism to allow for quickly taking snapshots of your data partition and then mounting that partition elsewh...
Contrary to some industry observers, antivirus software is not dead. It is, however, undergoing a game-changing transformation. It has to. After all, the current model of detecting viruses through blacklisting simply cannot keep pace with the unprecedented volume of malware released ev...