Protecting truckloads of data on the information superhighway

SSL Journal

Subscribe to SSL Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get SSL Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The Citrix and Google collaboration continues to accelerate with new product releases, including Receiver for Chrome and a strong growth of new joint customers and channel partners. Citrix and Google have been working together since 2011 to deliver business apps to the first Chromebooks. With Gartner now predicting Chromebooks will triple in sales by 2017, a rapidly growing number of customers will be looking for a way to leverage the enterprise cloud computing capabilities of the device and services, while still accessing critical line-of-business apps that they rely on today. To offer customers the best end user experience in the industry, Citrix is announcing a new Citrix Receiver for Chrome, which offers Chromebook users the most advanced user experience features in the industry. Although HTML5-based solutions, such as Citrix Receiver for HTML5, will work on Chr... (more)

Couchbase Server 3.0 Beta Begins

Couchbase, Inc., provider of the most complete NoSQL database, today announced the beta release of Couchbase Server 3.0. With this beta release, Couchbase seeks to get valuable user input on new features that strengthen its core architecture and greatly improve the developer and administrator experiences. In addition to making the beta version available, Couchbase has launched a bug bash with winners to be announced at its annual user conference in San Francisco, Couchbase Connect. “In this release, we are extending our core architecture in ways that further Couchbase Server’s lead as the most scalable and best performing NoSQL database,” said Ravi Mayuram, Senior Vice President of Products and Engineering, Couchbase. “In addition to foundational changes, like the advanced stream based protocol and tunable memory, that improve performance and enable Couchbase to su... (more)

Developers and End Users Benefit from Code-signing Certificates

Jersey City, NJ, November 18, 2009 - Buying or borrowing software on the Internet carries risks, both for the developer and for the person who plans to use it. End users who install malicious software in their computers may lose their purchase price. Worse, they may risk damaging their computers. Developers risk that someone may intercept their software file and alter it, adding deleterious code. Such alterations could damage their professional reputations. Developers who sell or exchange software can protect their code and their reputations by using code-signing certificates. Code-signing certificates create X.509 data files called “signatures” that developers can attach to their software files. The signature disappears from the software if anyone (including the developer) alters the code. The digital signature functions as tamper-proof packaging for intangible f... (more)

The BYOD That Is Real

Not too long ago I wrote about VDI and BYOD, and how their hype cycles were impacting IT. In that article I was pretty dismissive of the corporate-wide democratization of IT through BYOD, and I stand by that. Internally, it is just not a realistic idea unless and until management toolsets converge. But that’s internally. Externally, we have a totally different world. If you run a website-heavy business like banking or sales, you’re going to have to deal with the proliferation of Internet enabled phones and tablets. Because they will hit your websites, and customers will expect them to work. Some companies – media companies tend to do a lot of this, for example – will ask you to download their app to view web pages. That’s ridiculous, just display the page. But some companies – again, banks are a good example – have valid reasons to want customers to use an app to acce... (more)

Interop Las Vegas Previews Announcements From More Than 100 Exhibitors and Sponsors

SAN FRANCISCO, March 24, 2014 /PRNewswire/ -- Today Interop previews the latest innovations and news from more than 100 exhibitors who will make announcements at Interop Las Vegas, happening next week, March 31-April 4 at the Mandalay Bay Convention Center. As the leading independent technology conference and expo series, Interop will highlight the latest advancements in networking, virtualization, cloud, mobility, data centers and everything in between. For more information and to register, please visit: interop.com. "Interop continues to inspire and inform the world's foremost IT decision makers, serving as a place to find actionable solutions for pain points and future developments in the enterprise," explained Jennifer Jessup, Interop General Manager. "Now more than ever it is critical for businesses to have the opportunity to evaluate products and services side... (more)

Dear Slashdot: You Get What You Pay For

Open Source SSL Accelerator solution not as cost effective or well-performing as you think o3 Magazine has a write up on building an SSL accelerator out of Open Source components. It's a compelling piece, to be sure, that was picked up by Slashdot and discussed extensively. If o3 had stuck to its original goal - building an SSL accelerator on the cheap - it might have had better luck making its arguments. But it wanted to compare an Open Source solution to a commercial solution. That makes sense, the author was trying to show value in Open Source and that you don't need to shell out big bucks to achieve similar functionality. The problem is that there are very few - if any - commercial SSL accelerators on the market today. SSL acceleration has long been subsumed by load balancers/application delivery controllers and therefore a direct comparison between o3's Open ... (more)

Comodo Innovations at SC World Congress October 13 and 14

Jersey City, NJ, September 29, 2009 - Comodo Group will exhibit its landscape of products at the SC World Congress, a trade show for information technology professionals in New York City, October 13 and 14, 2009. Comodo products being demonstrated include Comodo Endpoint Security Manager, which now includes Disk Encryption at no extra charge. Comodo Endpoint Security Manager offers centralized administration of the award-winning Comodo antivirus, firewall and disk encryption software. Endpoint Security Manager also offers a new Offline Updater, permitting administrators to schedule security updates for an entire network. Other Comodo products being demonstrated include Discovery Scanning, an automated inventory of all SSL certificates on a corporate network, and the hardware-free Two-factor Authentication used for regulatory compliance. Comodo Two Factor now has a f... (more)

Blog Roll 2012

It’s that time of year when we gift and re-gift, just like this text.  And the perfect opportunity to re-post, re-purpose and re-use all my 2012 blog entries.  If you missed any of the approximately 130 blogs including 73 videos, here they are wrapped in one simple entry.  I read somewhere that lists in blogs are good. Have a Safe and Happy New Year. The Top 10, Top 10 2013 Predictions Security’s FUD Factor You’ll Shoot Your Eye Out… Holiday Shopping SmartPhone Style SharePoint Conference 2012: The Video Outtakes SPC12 Special Features ‘Radio Killed the Privacy Star’ Music Video? SharePoint Conference 2012: That’s a Wrap SharePoint Conference 2012 Partner Spotlight – The SCE Group SharePoint Conference 2012: Secure Remote Access & SSO with BIG-IP APM SharePoint Conference 2012: Configuring SharePoint on BIG-IP SharePoint Conference 2012: Gimme 90 Seconds with James He... (more)

How to Secure Hadoop Without Touching It

It sounds like a parlor trick, but one of the benefits of API centric de-facto standards  such as REST and JSON is they allow relatively seamless communication between software systems. This makes it possible to combine technologies to instantly bring out new capabilities. In particular I want to talk about how an API Gateway can improve the security posture of a Hadoop installation without having to actually modify Hadoop itself. Sounds too good to be true? Read on. Hadoop and RESTful APIs Hadoop is mostly a behind the firewall affair, and APIs are generally used for exposing data or capabilities for other systems, users or mobile devices. In the case of Hadoop there are three main RESTful APIs to talk about. This list isn’t exhaustive but it covers the main APIs. WebHDFS – Offers complete control over files and directories in HDFS HBase REST API – Offers access to ... (more)

Can my PAN ride the LAN out the WAN?

In 2005, a Preventsys (now McAfee) and Qualys survey found that 52% of companies rely on a ‘Moat & Castle’ approach to Network Security but also admitted, at the time, that once the perimeter is penetrated, they are at risk. I haven’t been able to find a more recent statistic but I’m still betting that once a network is breached, it’s at risk. Networks are evolving, expanding and exploding with more data than ever before which means they also need to be smarter about who and what they allow on. They have become Application Delivery Networks and soon, truly Identity Aware. At the same time, many Enterprise networks are making interconnections with other Corporate networks enabling Federation or trust between the two to create an extended network. The good news/bad news about this is that according to Verizon Business’ “2009 Data Breach Investigations Report (pdf)” 32... (more)

Windows Shopping

I’m really not one of those vocal Operating System lover/haters. My dad worked at IBM for 30 years and so I grew up with computers and even took a PC Jr. with a whopping 128k of RAM and a color (what we called color) monitor with me to college in the 80’s. My first work computer was a Macintosh and learned about all that AppleTalk stuff and the cool publishing Quark could do. I’ve used and administrated Win3.1, NT 4.0 (on laptops), Win95, WinME, Win2000/Server, and of course a user of XP and Vista along with a few variants of Linux. I use Windows for home and work and personally I think each OS has it’s plus’/minus’. Very non-committal, I know. Now I’m looking to buy a new computer and with that, a new Operating System. If you’ve been avoiding the news, TV or print ads over the last year, Windows 7 is the long awaited new OS from Microsoft.  Much has been written a... (more)