Tag Archives: cloud security
A hot debate over the inherent security benefits of open source software — or lack thereof — has been raging (again) since the “heartbleed” bug came to light last spring. So…..from a security expert’s point of view (yes, mine!), is … Continue reading
Or…How a security expert can fall for a phishing scheme Think no one will target your business with phishing attacks? Think again… This confession is a bit hard for me. Just recently I was the target of a phishing attack. … Continue reading
Have you ever encountered a situation where a user needed to use an application that displayed all of the rows in a file, but the user really should be restricted from seeing certain rows in that file?
OR….. How Jobs Get Authority to Objects Words have consequences. Saying things like “we’re going to tighten security” or “we’re going to remove public (or default) authority” or “we’re going to remove direct access to data” will almost invariably lead … Continue reading
Recently I’ve written several blog posts about biometric authentication in IT Shops (see “Target Attack Leads to Discussion of Biometric Authentication“, “IT Shop Requirements for Exploiting Biometrics“, “Biometrics and SSO“). This post discusses a couple of secondary factors.
In a recent post I noted that the Target breach once again raised the idea of biometric authentication as means of improving the protection of corporate data. Yet for all of its benefits, adoption of biometric authentication within the IT … Continue reading
I find this authentication mechanism for accessing Web sites and which was proposed in October 2013 very interesting. The main reasons it’s interesting are that it would be so much easier to register at Web sites, authentication is based on … Continue reading
“Former Hostgator employee arrested, charged with rooting 2,700 servers” was the headline of an April 19, 2013 article published by Ars Technica website. Rooting refers to providing the attacker a way to gain superuser access on a computer system. Doing … Continue reading
An interesting article from ExtremeTech.com about security in the cloud. Despite the title (“Is ‘cloud security’ an oxymoron?”), it takes a balanced approach, suggesting you be aware of the pitfalls rather than avoid cloud computing services. Is ‘Cloud Security’ an … Continue reading
Josette Rigsby at MidsizeInsider.com recently posted a blog article called Five Signs Your Cloud Computing Security Is Out of Control.