Protecting truckloads of data on the information superhighway

SSL Journal

Subscribe to SSL Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get SSL Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from SSL Journal
REST API Security has come a
#SSL Forget #infosec benefits and #webperf implications, SSL just did an end-run around IT and went straight to the business. With fewer than 1/3 of organizations securing apps with SSL, that could be a problem. If the business isn't panicking, it should be.    Goog...
SOA integrates Thales HSMs to provide the highest level of protection and manage risk in a service oriented architecture Plantation, Fla & Los Angeles, CA - September 2, 2014 - Thales, a world leader in Critical Information Systems and Cybersecurity and SOA Software, an API Managem...
Dell enterprise server solutions have dominated the marketplace for some time, yet many enterprises have turned to other vendors to meet their security needs. Today, however, Dell offers their customers robust enterprise security in the world class Dell SonicWALL next-generation techno...
By William McElmurry For healthcare professionals participating in the Centers for Medicare & Medicaid Services electronic health record (EHR) incentive program, you’ll soon need to demonstrate compliance with the Stage 2 Meaningful Use requirements in order to continue recei...
When visiting a website and you notice that it has the prefix ‘https’ as opposed to ‘http’, of if your browser’s address bar displays a padlock symbol, you are accessing a website that is using an SSL certificate. SSL certificates have long been used by websites processing sensitive in...
Thunder and AX WAFs Pass Rigorous Testing Woking, Surrey: 4th August 2014 - Wick Hill is now shipping A10 Network's Thunder and AX Series application delivery controllers (ADCs), with web application firewall (WAF) version 2.1 certification from ICSA Labs, an independent division of Ve...
#SDN #SDAS There's a whole lot more to software-defined networking than OpenFlow... There's a lot of gnashing of teeth and gnawing at industry reports over the apparent reluctance of organizations to jump with both feet into the SDN ring. According to a new QuinStreet Enterp...
Last month Google said that it was tired of mashed-together bug fixes for OpenSSL and decided to create its own fork called BoringSSL. It has now implemented that variant in the latest Chromium build, the open-source software that eventually arrives in Chrome. OpenSSL is software used ...
MongoDB,Inc has made impressive strides over the past 18 months. One the areas of the product that has seen the most significant improvement has been the area of Security. Security is of paramout importance for a production database. Existing relational databases provides a  number of ...
Cloud computing security issues are constantly a top concern for IT leaders migrating to the cloud. There are many issues related to data security in the cloud and more than one approach to cloud security. Focusing on Infrastructure as a Service cloud security, there are five issues th...
One of the neat features of the Axway API Gateway is the ability to deploy it in a multi-homed environment, so that it
So far… I try not to brag that much (yea right) since a long time ago a good friend would always quip, ‘Everyone loves a bragger!’ Noting that boasters are usually more talk than anything and it is important to stay humble. Well, I’m humbled (and bragging) that ...
The future of HTTP is here, or almost here.   It has been 5 years since SPDY was first introduced as a better way to deliver web sites.  A lot has happened since then.  Chrome, Firefox, Opera and some IE installations support SPDY. SPDY evolved from v2 to v3 to ...
AppDynamics recently announced the launch of our Application Intelligence Platform, which is the underlying infrastructure that delivers our portfolio of products to customers. A key component of the Application Intelligence platform is the notion of extensibility – we can integrate wi...
Healthcare businesses around the world have always had a responsibility to protect the privacy of their patients. Today that means securing patient data from prying eyes. Ever since patient health information became digital, many countries have introduced more stringent regulations to ...
Customer feedback on the SSLonline service is highly positiveNassau, Bahamas, 29th May 2014 - International Private Banking Systems (IPBS, www.ipbs.com), the specialist provider of wealth management software for the private banking sector, today announced that the IPBS e/Banking module...
#gluecon #SDN #devops Glue kicked off this morning with some great keynotes and a full set of breakouts. I was clipping along happily, enjoying Rachel Chalmers keynote on "Social Glue" and contemplating the fascinating relationship between the use of well-designed interfaces (API) bet...
#gluecon #SDN #devops Glue kicked off this morning with some great keynotes and a full set of breakouts. I was clipping along happily, enjoying Rachel Chalmers keynote on "Social Glue" and contemplating the fascinating relationship between the use of well-designed interfaces (API) bet...
Manchester, UK - VXL's enterprise-level Fusion™ device manger goes from strength to strength with the launch of a new version supporting Linux users. Complementing the current Windows XP Embedded Standard, WES 7 and WE8S supported offering, Fusion now sets the industry benchmark ...
Manchester, UK - Der Gerätemanager für den Unternehmenssektor Fusion™ von VXL ist nicht aufzuhalten, jetzt kommt die neue Version auch für Linux Anwender. Als Ergänzung zum aktuellen Embedded Standard von Windows XP und den Angeboten WES 7 und WE8S setzt Fusio...
Manchester, Royaume-Uni - Fusion™, le gestionnaire de dispositif de VXL pour les entreprises, ne cesse de se renforcer grâce au lancement d'une nouvelle version qui prend en charge les utilisateurs de Linux. Complétant l'offre actuelle, compatible Windows XP Embedded St...
According to a recent IDC report, OPEX costs are doubling every eight years. Important to consider is this data is based on historical trends, and doesn't necessarily take into consideration the forthcoming explosions in applications and data resulting from technological shifts like th...
#ACI #SDAS #devops #SDN Because something's got to change - and change radically. According to a recent IDC report, OPEX costs are doubling every eight years. Important to consider is this data is based on historical trends, and doesn't necessarily take into consideration the ...
Heartbleed bug works on the vulnerabilities (missing bounds check in handling of the TLS heartbeat extension) in the popular OpenSSL crysptographic library. When the server is infected it can steal typically 64 chunks of information from HTTPS sites. SSL/TSL encryption data secures the...
How many different network protocols can you name? There are, of course, a set of staples just about everyone knows: IP, ARP, VLAN, TCP, UDP, DNS, HTTP, SSL, TLS, SMTP, FTP, SMB, CIFS, 802.1q, 802.1ad. Then there are recent additions like VXLAN, NVGRE, SPDY. But we could fill post ...
New security features for ADCs fill the gap left by Microsoft TMG 28 April, 2014 - KEMP Technologies, has announced that all of its Application Delivery Controllers (ADCs) and load balancers now feature enhanced edge security gateway functionality to protect published workloads and imp...
Houston, TX, April 17, 2014 --(PR.com)-- While several companies are still recovering from Heartbleed, Presensoft remains unaffected by the recent internet-wide security vulnerability that affects the OpenSSL framework which is used by many websites to privately send data to and from ...
There are a variety of opinions on the seriousness of Heartbleed being put forth ranging from "it's not the end of the world" to "the sky is falling, duck and cover." Usually the former cites the relatively low percentage of sites impacted by Heartbleed, pegged at about 17% or 500,000 ...
On April 2, the IT industry was rocked when it was announced that over 60 percent of the Internet — even secure SSL connections — were vulnerable to attack due to a new weakness codenamed Heartbleed. The weakness lives in the OpenSSL cryptographic software library, which en...
What seemed like good news has quickly turned bad, if not downright terrifying. Saturday’s disclosure by Web security firm CloudFlare that at least one worst-case scenario related to the Heartbleed vulnerability might be impossible has been proven wrong by independent researchers...
Here we go again, another huge vulnerability exploit detected in open source security software:
In the previous few posts I’ve discussed the new congestion control algorithms and rate pacing features that are available in BIG-IP 11.5; but if you’re not ready to move to 11.5 there is still plenty that you can do to optimize your TCP profiles. Adjusting the Initial Congestion Windo...
In the previous few posts I’ve discussed the new congestion control algorithms and rate pacing features that are available in BIG-IP 11.5; but if you’re not ready to move to 11.5 there is still plenty that you can do to optimize your TCP profiles. Adjusting the Initial Con...
#F5 #IBMCloud #IBMSAPAlliance #Cloud #SDAS #ThoughtsOnCloud One of the concerns often cited by those migrating to or integrating with "the cloud" is that applications deployed in off-premise cloud environments will fail to meet expectations with respect to availability, perf...
Tuesday 25 March, 2014 Flexible, scalable, Open Source Infrastructure as a Service (IaaS) used by organizations such as Zynga, Datapipe, and ISWest, among others, for creating, managing, and deploying public, private, and hybrid Cloud Computing environments Forest Hill, MD --25...
With literally millions of phishing scams crossing the wires each day, media reports about individual ones are the quintessential dog-bites-man stories that are rarely worth the time of writer or reader alike. Every now and then, though, one comes along that’s clever enough to ma...
MongoDB is now the defacto database for a wide variety of applications, some storing sensitive data. When you store sensitive information in your MongoDB database it is important to encrypt the contents of your data disk. This gives you an extra layer of protection if your data disks, ...
After publishing Ben’s blog post about “Memory Monitoring with LXC” we realized there is a lot of interest in articles about Monitoring. I got in touch with Jehiah Czebotar, Head of Engineering at bitly, and asked him if we could … Continue reading →
The Axway API Gateway, as the name suggests, is often used as a gateway in front of APIs / Web Services. The connection