Organizations need an end-to-end web application and database security
solution to protect data, customers, and their businesses. The integrated
solution from F5 and Oracle provides improved protection against SQL
injection attacks and correlated reporting for richer contextual
information. F5 and Oracle have partnered to offer enhanced security for
web-based database applications. The integration between F5 BIG-IP®
Application Security Manager (ASM) and Oracle Database Firewall provides
richer forensic information about SQL injection attacks through correlated
reporting. Running Time: 17:54 Read full white paper here. And click
here for more F5 Audio.
Listen on Posterous
Technorati Tags: F5, integration, data center, Pete Silva, security,
business, education, technology, application delivery, data replication,
cloud, oracle, database firewall, web, inte... (more)
A recent press report quoted unnamed US intelligence sources saying Russia
had no intention of invading the Ukraine. The appraisal became the subject of
considerable debate when Russian President Vladimir Putin ordered his
nation's military into Ukraine's Crimea region. Follow-on media reports said
strategic assessments had been made by US intelligence and defense
authorities that indicated there was a very good chance that Putin would do
just that in response to Ukraine's internal uprising that threatened ties
Whatever the case may be and whatever the actual facts ... (more)
The promise of easy, rapid, and low-cost deployment is luring increasing
numbers to the cloud. Is security the only remaining obstacle to total
domination by the cloud?
In his session at 14th Cloud Expo in New York City, John Gunn, VP of
Corporate Communications for VASCO Data Security, examined how the evolving
threat landscape will present new security challenges for the cloud.
Delegates also learned how to use transparent authentication to find the
right balance between keeping the promise of user convenience while still
maintaining essential security practices.
Topics prese... (more)
Cloud Shifts the Burden of Security to Dev
The move to the cloud brings a number of new security challenges, but the
application remains your last line of defense.
In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft,
to discuss how developers are extremely well-poised to perform tasks critical
for securing the application - provided that certain key obstacles are
Arthur Hicken has been involved in automating various practices at Parasoft
for almost 20 years. He has worked on projects including database
development, the software develo... (more)
The Internet of Things needs an entirely new security model, or does it? Can
we save some old and tested controls for the latest emerging and different
In his session at Internet of @ThingsExpo, Davi Ottenheimer, EMC Senior
Director of Trust, will review hands-on lessons with IoT devices and reveal
privacy options and a new risk balance you might not expect.
Download Slide Deck: ▸ Here
Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years'
experience managing global security operations and assessments, including a
Full Disk Encryption Is Physical Security, Not IT Security
What threats are you trying to mitigate with full disk encryption? For a
laptop that is moved around from office to home or out on a business trip
full disk encryption should be standard. You need to protect that asset in
the event of theft or loss of the device. It’s a great physical security.
When properly implemented full disk encryption will render any information
stored on that device useless. That’s great for a laptop, but what about
your data center?
ClickToTweet: Full Disk Encryption – Physical Security, Not IT Se... (more)