Answer I've been trying to host an application on Windows Azure that would store people's credit card information of users who would want to buy monthly subscriptions for a monthly fee. We just have to store the card data as secure as possible. And we know we have to be PCI compliant. Will Azure allow us t...
Answer I'm looking to build a web application that's going to handle sensitive PCI data (including banking numbers). What's the best service that can handle all of this data? My friend told me about Rackspace but I'm not sure about its PCI solution. I just need to make sure the database is secured and I on...
Answer Dear LS, I'd like to understand to which extend I need digital certificates (PKI) in order to be in compliance with current most important regulations including sox, but also other relevant regulations that might be applicable. This includes topics like WIFI within an Enterprise on a Global scale o...
Answer Hi, My team and I are stuck. A 3rd party needs access to certain information on our Lotus Notes database about clients statusand we are unsure on how to go about this without jeapodising security and firewalls. We've thought of a web based application for the 3rd party however how will we send the...
Blog Last November IBM announced its next generation supercomputing project, Blue Gene/Q, a project undertaken by software application developers and other computer scientists to build an "ultra-scale" technical computing platform. IBM has logically named its latest beast "Sequoia", the tallest in the f...
Blog Security image via FreeImages What do you think about these new reports regarding the Equifax breach? Are you worried about your data? Check out the new details surrounding the breach in this week's roundup. 1. Equifax breach worsens, additional consumer data exposed - Madelyn Bacon (SearchSecurit...
Blog Executive Summary With this May Microsoft Patch Tuesday update, we see a relatively small set of updates in comparison to those lists of updates released by Microsoft for the months of January and February earlier this year. In total there are two Microsoft Security Updates with the following r...
Blog Readers of Mike Kellys post on software security uses for data visualization - the ability to visualize patterns of data - asked us for info on application visualization, too. Application visualization enables software developers, testers and users to see and interact with a fully functiona...
Blog Question:Are there any good evaluation criteria for determining which applications in a corporate portfolio are good candidates to migrate into the Cloud? Now that businesses are convinced that they should be moving at least some of their applications and systems to the Cloud, the next hurdle is ...
Blog For the last 15 years, cloud computing has been a game changer. It has created efficiencies and increased scalability, giving rise to the "as a service" phenomenon in the enterprise. Cloud computing has certainly become a standard in many IT environments, but as we move into a significantly more con...
Blog There is probably nothing more frustrating to an IT professional than having the security of his network compromised by a renegade executive who refuses to consult IT before ordering the installation of untested applications. Case in point: A recent help desk ticket read, "[Executive] told me to ins...
Blog Start-to-finish SSL encryption is a very good thing when it works. And it usually does. Google has offered always-on encryption for more than two years on the GMail platform. Now Microsoft's Hotmail features the same thing, almost. Here's what I got when I tried to set it up (emphasis added): Con...
Blog Single sign-on (SSO) is a session and user authentication service that allows an end user to provide one set of login credentials (such as name and password) and be able to access multiple applications. Continued Quote of the Day "With the centralized identity management systems included in many...
Blog A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers that provide cached internet content from a network location closest to a user to accelerate its delivery. Continued... Quote of the Day "It's doubtful s...
Blog Kony is a company were getting to know faster than we expected. The organization works in digital experience development platforms and the emerging low-code platform market; it also has a specialism in digital banking. Its products and platforms include Kony Quantum for low-code app developmen...
Blog Alcatel-Lucent has expanded its Open API Service with a group of new "bundled APIs" that combine third-party and service provider elements to create functional building blocks with a more application-oriented slant. The first offering is a trio of bundles designed for social applications, including ...
Blog With this Microsoft Patch Tuesday update, we see a very small set of updates in comparison to the massive updates from last year's November and December updates. In total there are 2 updates with the following rating; 1 Critical and 1 rated Important. Given the nature of the changes and updates in...
Blog If we look at cloud in terms of what it does offer instead of what it doesnt, we may discover more useful architectures than were previously thought to exist. This post brought to us by Lori MacVittie. I have a fairly large, extended family. While I was growing up we gathered at our grandparen...
Blog A newly published report from Clutch, a business-to-business market researcher, shows that the perceived benefits of cloud computing have changed dramatically over the past decade. The report polled 300 IT professionals who use a full-service cloud computing platform and found increased efficiency ...
Blog The Cabinet Office and GDS (Government Digital Service) have issued a service contract notice seeking a private partner that can provide datacentre colocation services to handle UK government's information classified as "official", "secret" and "top secret". The government has earmarked up to 700...