Email Alerts
-
Cryptographers say cloud computing can be secured
While securing data in the cloud will remain an issue in the near term, researchers will develop ways to better protect data in the cloud, say a panel of cryptographers at the 2009 RSA Conference. Article
-
Will cloud computing and virtualization save the day?
Will cloud computing and virtualization make enterprises more secure or leave them more vulnerable? At Information Security Decisions 2008, security researchers discuss the pros and cons of the inevitable cloud (part 3 of 4). Video
-
MySpace, Facebook ignoring basic principles of security
Social networking websites MySpace and Facebook present a significant security risk to users, largely because their wide-open application programming interfaces (APIs) are a tempting target for malicious hackers. Article
-
Kaminsky: DNS flaw capable of attacks on many fronts
Black Hat: Security researcher Dan Kaminsky outlined more than a dozen ways the DNS cache poisoning flaw could be exploited by an attacker to wreak havoc on vulnerable systems. Article
-
Kaminsky on DNS rebinding attacks, hacking techniques
Noted network security researcher Dan Kaminsky, director of penetration testing at IOActive, shares his research on Web-based attack techniques. Article
-
Which operating system can best secure an FTP site?
In this expert Q&A, platform security expert Michael Cobb explains how a secure FTP protocol can improve websites and Web services. Ask the Expert
-
IBM's Watchfire halts network research, focuses on Web apps
Watchfire is halting its network and host-based research to focus solely on Web application security as part of its integration into IBM. The Waltham, Mass-based penetration vendor was acquired last year and become part of IBM's Rational development ... Interview
-
SOA, Web services security hinge on XML gateways
XML security gateways could be the missing piece in most SOA deployments, says Tim Bond, a senior security engineer at webMethods Inc. Article
-
Liberty Alliance begins SAML 2.0 testing in July
Liberty Alliance's compatibility testing will pave the way for more tools businesses can use to implement federated ID management. Article
-
How does identity propagation work?
In this expert Q&A, Joel Dubin defines identity propagation and explains how it works. Ask the Expert
Security Management Strategies for the CIO