Blog Posts

Are criminal hackers winning the war? Alex Holden says 'no.'

Posted by Jeff Bounds on March 30, 2015 at 7:00am 0 Comments

When I read last year that a Russian crime ring has amassed 1.2 billion combinations of user names and passwords, I wussed out. “The black hats are winning!” I cried.

Fortunately, Alex Holden is here to drop some knowledge on me. Even though the information security company that he founded, Hold Security LLC, was the one that blew the whistle on those Russian hackers, Holden believes that cyber-criminals are struggling to score big paydays more than one might think.

Of course, he is anything but naïve. As we saw in part one of my email interview, Holden says we are in “an age of mass exploitation of vulnerabilities.” Hackers are doing less…

Continue

How your company should be gearing up for the Internet of Things

Posted by George Lawton on March 25, 2015 at 7:00am 0 Comments

As the Internet of Things (IoT) move from a buzzword to new reality, organizations need to take a holistic approach in aligning their software development practices with physical devices. Gartner expects the IoT to lead to 26 billion new connected devices by 2020 and $1.8 trillion in new business value.

We caught up with Mike Walker, an analyst at Gartner, to get a better understanding of what the IoT means for the business at a practical level. 

ServiceVirtualization.com: How will the rise of the Internet of Things affect software development  in the near future?

Mike Walker: IoT will be one of many related digital technologies that will fundamentally disrupt the enterprise. Shown below is Gartner’s 2015 Top Ten Technologies (see: …

Continue

Security guru: Continuous testing a key to stopping hacks

Posted by Jeff Bounds on March 23, 2015 at 7:00am 0 Comments

Alex Holden investigates the big hacks.

His Milwaukee-area information security firm, Hold Security LLC, has identified some of the largest cyber-security breaches of the past couple years.

In October 2013, Hold Security worked with a journalist to discover that a hacker group had put on an unprotected server the source code for key Adobe Systems software products such as Acrobat Reader, Acrobat Publisher and ColdFusion.

In February of last year, Hold Security…

Continue

Latest Activity

Deepak replied to Santhosh's discussion How Do i do service Virtualization Using wsdl
"Hi Santhosh/Burt, Can you please send me the document that talks about virtualization using WSDL? Thanks, Deepak"
yesterday
Avinash Bawgi posted a discussion

SWIFT Virtual Service

Hi All,How do I create a virtual service for the SWIFT messages on DevTest 8.0. I want to automate this process on weblogic queue. This is just for POC purpose.See More
Friday
Sujatha posted a discussion

Handling different responses with similar request from match script in LISA

Hi, I am using Lisa Virtualized environment. In VSI I have a stateless transaction with 2 different responses for one request. In VSM, in JavaScript step before response selection, I am writing a conditional statement and setting a Boolean variable…See More
Friday
Kevin added a discussion to the group HP Service Virtualization Users
Thumbnail

Fixed Length Messages Virtualization on TCP/IP Protocol

Hi All,Currently I am trying to do fixed length messages virtualization on TCP/IP protocol using HP SV.If anyone has done this already, could you please share your experience on how to do it?If you have some tutorials on it, then could you please…See More
Mar 10

Forum

How Do i do service Virtualization Using wsdl

Started by Santhosh in Ask Burt. Last reply by Deepak yesterday. 3 Replies

I am using Version V7.0.2. Do we have any documentation on the steps to be follow to create a virtual service using wsdl.Continue

SWIFT Virtual Service

Started by Avinash Bawgi in Ask Burt on Thursday. 0 Replies

Hi All,How do I create a virtual service for the SWIFT messages on DevTest 8.0. I want to automate this process on weblogic queue. This is just for POC purpose.Continue

Handling different responses with similar request from match script in LISA

Started by Sujatha in Ask Burt Mar 23. 0 Replies

Hi, I am using Lisa Virtualized environment. In VSI I have a stateless transaction with 2 different responses for one request. In VSM, in JavaScript step before response selection, I am writing a conditional statement and setting a Boolean variable value to TRUE or FALSE. I am using the Boolean variable value in match script for one of the response which I need. If its TRUE I want to send that response back or else send meta response. The first or meta response is common in all cases but only…Continue

We have iTKO LISA fulltime/Contract positions with TCS in Windsor, CT & Pittsburgh, PA & Phoenix, AZ

Started by Murthy in Jobs Mar 3. 0 Replies

Role: ITKO LISALocation: Windsor, CT Technical/Functional Skills:-        Expert knowledge of CA LISA toolset including Virtualize, Test and Pathfinder-        LISA Service Virtualization and Test, 5+ years hands-on, progressive experience-        LISA Pathfinder (Continuous Application Insight), 3+ years of experience-        Web Services and SOA proficiencyExperience Required Bachelors’ degree in Computer Science or a related discipline-        Hands-on experience with at least several of the…Continue

 
 
 

© 2015   Created by Alan Baptista.

Badges  |  Report an Issue  |  Terms of Service