What is SOA? One can say that the synthesis of Enterprise Application
Integration (EAI) platforms with middleware tools and concepts evolved into
what we know today as Service Oriented Architecture.
SOA then represents a standards based architectural blueprint with an
emphasis on business centric services and transactions rather than that of
technology oriented objectives: In other words an architectural style which
businesses can use to execute and align services with their business model to
achieve their business strategy, goals and objectives.
For instance, an end-user request a particular IT service per specified
requirements defining capacity and quality levels, in response to this, the
requirements will then be delivered when specified in a service based
delivery methodology which is process aware and which allows auditing.
According to Thomas Erl, we can def... (more)
Malicious software or malware is a security nightmare. One can agree with the
statement that malware in the internet is a growing epidemic and is costing
industry billions of dollars each year.
According to Microsoft Malware "is short for malicious software and is
typically used as a catch-all term to refer to any software designed to cause
damage to a single computer, server, or computer network, whether it's a
virus, spyware, et al."
Although the growth of malware may be flattening, its design sophistication
is not. Per Kaspersky labs approximately 300,000 new malware programs ... (more)
One major concern with the adoption of cloud computing is the lack of a
defined standard or standards that are specific to operations impacting
security, interoperability & mobility within the Cloud ecosystem.
As most managers of security departments will attest to, there is a fine line
between security and operations. While we as business managers want to
ensure that we maximize the ROI on our operational investments and ensure
that availability is paramount for our users, we do not want to do so at
the expense of our security measures, policies and protocols.
On the other hand... (more)
I've been asked quite a few times, "when will it be a good time to get into
cloud computing?" by potential clients. My answer is typically it depends...
I know, I know.... not much direction there, but really it all depends. Why ?
Well, some may state, "we all know of the much beaten security concerns, and
we will ensure that systems on our end are secured and synced to work in
tandem with the vendors' security."
Can one ensure some degree of monitoring by the implementation of an
Intrusion Detection System (IDS) residing within the system hosting the
gateway into the cloud?
As we become more technology dependent, more so in today's "cloud"-driven
environment, IT security needs to evolve from the traditional sense of
We should see the advent and acceptance of a more holistic, flexible and
adaptive model of security that focuses more on managing information
security, people and processes in a natural evolution from the traditional
model of implementation, monitoring and updating.
According to Teubner and Feller  "Governance is understood as securing a
responsible corporate management, having its roots in value-based