Security Testing – Considerations, Best Practices & Tools

Security testing is a variant of different types of testing methods and approaches where testing is carried out just to ensure that the product, application or the system under test doesn’t have security related loopholes which might result into loss of valuable information in the hands of those unauthorized. This would cause a serious threat to the organizations. It can
read more

Top Considerations for Protecting Data Operations in the Cloud

Cloud computing is emerging technology in today’s world. We can get any kind of applications or services easily without spending any time over Internet. These kinds of business model do not require any upfront investments. It is low the cost, high performance and high availability with good tech support makes your business run without
read more

Securing Docker Containers

Docker is a great technology which simplifies the development and deployment of distributed applications. While building dockerized applications, security at various points needs to be considered. Due to lack of CPU/Hypervisor, Docker security is fully implemented in Software. Let us look at all prominent security aspects of kernel and container applications
read more

REST API Security – Best Practices

Software industry has been undergoing change at a rapid pace for quite some time now and so are the ways to design, develop, deploy and support software applications. From large mainframe systems to microservice architectures, the industry sure has travelled a long journey (or rather still continues to do so). And in the process, software design
read more

RSA Conference 2017

RSA conference will be held on February 13-17, 2017, at Moscone Center, San Francisco, USA. This year the highlight of the event would be how to safeguard against cyber-crime and protect your data. As the world is getting more and more digital and convenient, simultaneously it is also imposing threats on security and privacy.
read more

Software-Defined Security – Future of Network Security

Network security has been into existence ever since the computers and computer networks came into picture. Network security is as critical and significant as the operating system in every computer. Every company, no matter how big or small their networks are, give special attention to their network security. It is a continuous
read more

Overcoming Security Concerns of Docker Technology

Container technology is creating waves in IT industry. With its large number of benefits for IT and dev ops, it has started impacting the industry starting early 2014. According to a research done Docker adoption was up by fivefold from...
Overcoming Security Concerns of Docker Technology
read more

VMware EVO: RAIL™ – VMware’s cutting-edge Evolution!

EVO: RAIL represents a new range of Hyper-Converged Infrastructure offerings from VMware.  This is different from converged architectures (vBlock/Flexpod) as there isn’t a storage array involved, instead there is VMware Virtual SAN.  However, it is working with a variety of...
read more

Security Holes – Part 1

Technically, ‘Vulnerability’ is a cyber-security term that refers to a flaw in a system that can leave it open to attacks. In terms of computing, a resource (either physical or logical) may have one or more vulnerabilities that can be...
read more

Virtual Machine Archival APIs

Introduction of Virtual Machines (VMs) has wiped out the mandatory cap on the rate at which the server trail grew. However this led to the problem of VM sprawl, which essentially means persistent deployment and growth of virtual machines, some...
Virtual Machine Archival APIs
read more