Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
As a information security executive, what are your concerns related to disaster recovery and business continuity of your cloud applications? In Organizing sensitive data in the cloud, I mention configuration information for each cloud service layer (software, platform, infrastructure, and security) needs to be kept in a directory. I have a significant concern though.
The concept of Distributed Denial of Service (DDoS) attacks finally entered the mainstream public consciousness this month after assaults on the websites of Visa, MasterCard and PayPal made front page news.
The British national security adviser, Sir Peter Ricketts, has advised all government departments to review their computer security in light of the recent WikiLeaks attacks.
The U.S. Department of Homeland Security has spent $3 million over the past few years on research aimed at bolstering the security of the Internet's routing system. Now, as this research is being deployed across the Internet, DHS wants government agencies and their carriers to be among the earliest adopters of the new Resource Public Key Infrastructure (RPKI) system that it helped create.
Due to a vulnerability in the design of the WebSocket protocol, the Mozilla Foundation has decided to disable support for this protocol in the forthcoming Firefox 4 Beta 8 release. The vulnerability in the code for transparent proxies can potentially be exploited to poison the proxy cache and inject manipulated pages.
The cloud -- and outsourcing in general -- breaks off pieces of the stack beneath any given application. That removes the stack from an enterprise CISO's control, and that's not good.
VeriSign has announced the rollout of its cloud-based DNSSec Signing Service for registrars, which allows DNSSec provisions to be added to second-level domain names. Pat Kane, assistant general manager of naming services at VeriSign, told V3.co.uk that progress being made is at the registry and root levels.
Imagine a world where you can develop software unconstrained by the normal rules of software, which requires a local installation. CPU, memory, security...each of these issues are now someone else's problem.
The switch from IPv4 to IPv6 will force many organizations to rethink the way their networks are defended. The result will be a shift away from the "guilty until proven innocent" attitude to incoming network traffic, toward one of "paranoid openness."
IT security teams must start preparing now for the increased security risks that may arise from implementation of the forthcoming IPv6 protocol, warned security training and research organisation the SANS Institute.
As we reported earlier today, Amazon is now offering a Cluster GPU Instance. Security blogger Thomas Roth decided to find out how quickly the system could be used to crack SHA1 hashes. He was able to crack 14 hashes with passwords ranging in length from one to six characters in 49 minutes. "This just shows one more time that SHA1 is deprecated," he writes.
Renowned researcher Dan Kaminsky tomorrow at Black Hat Abu Dhabi will release a free toolkit that lets organizations test-drive DNSSEC deployment and also demonstrates his claims that the protocol is simple to implement.
A recent survey of 384 business managers from large enterprises revealed that confusion abounds about cloud data security. More than three-quarters of the respondents couldn't say who they believe should be responsible for data housed in a cloud environment, while 65.4% said that the company from which the data originates, the application provider and the cloud service provider are all responsible, and another 13% said they were not sure.
An old standby of cyber criminals--the denial-of-service attack--has become a new worry for data center operators. As companies increasingly use virtualized data centers and cloud services, new weaknesses have opened up in enterprise infrastructure.
At the end of last week, US company VeriSign announced the roll-out schedule for the authentication of.com and .net zones. From the 9th of December, .net domains are to be authenticated via keys that are based on the new DNSSEC (Domain Name System Security Extensions) protocol and stored in the Domain Name System (DNS).
Here's to the multi-tenant application, an invention of the Internet age and without which many of the low-cost services, such as search and travel reservations, would be impossible. And here's to the multi-tenant doubters, such as Oracle's Larry Ellison, who recently questioned its "weak security model" and its "co-mingling of competitors' data."
Comcast has begun migrating its customers to a new Internet security mechanism that will help protect them from being inadvertently routed to phony Web pages for pharming attacks, identity theft and other scams.
Moving to enhance online security, Facebook on Tuesday said that it will soon offer users the ability to receive one-time passwords on their mobile phones and that it has already enabled the ability to sign out of Facebook remotely.