Tag: Security
-
Google’s Vint Cerf talks identifiers vs. pseudonyms online
Google’s Vint Cerf talks identifiers vs. pseudonyms online:
Cerf suggested to imagine a device running on hardware that can generate public and private key pairs in which the private key can’t be extracted without destroying the pair.… Continued
-
Big Data brings intelligence-based security, RSA chief says
Big Data brings intelligence-based security, RSA chief says:
Big data will transform the way enterprises architect and manage security and will finally help get the good guys out in front of the bad guys, said Art Coviello, executive vice president of EMC and executive chairman of RSA.… Continued
-
Cloudera who? Intel announces its own Hadoop distribution
Cloudera who? Intel announces its own Hadoop distribution:
Hadoop is a juggernaut when it comes to big data. Intel is a juggernaut when it comes to data center infrastructure. Its decision to enter into the open source software market is a big one for the chip company, for the Hadoop ecosystem and for the myriad startups playing in this space.… Continued
-
Two-factor authentication won’t protect Twitter, Google: OneID
Two-factor authentication won’t protect Twitter, Google: OneID:
We basically said, let’s take a clean sheet approach to the problem and design a solution that eliminated the use of shared secrets, used modern-day cryptography, and that made it user friendly.… Continued
-
Mobile App Security – Application Security’s “Where’s Waldo”
Mobile App Security – Application Security’s “Where’s Waldo”:
Over the last several years, there has been a major evolution in how applications are being built with new underlying technologies, application architectures and data formats, but have application scanners evolved with them?… Continued
-
Passwords: young people are lax, rich people are careful
Younger people less secure online than their elders new study suggests:
Are younger people less aware of online security risks, or do they simply prefer to take more risks with their personal information? That’s one of the questions raised by the findings of our recent poll of 2,129 U.S.… Continued
-
Kill the Password: Why a String of Characters Can’t Protect Us Anymore
Kill the Password: Why a String of Characters Can’t Protect Us Anymore:
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters—maybe six of them if you’re careless, 16 if you’re cautious—that can reveal everything about you.… Continued
-
Comparing the CISSP and GISP Exams
Comparing the CISSP and GISP Exams:
Lately, I have been spending my time preparing and finally taking the GIAC Information Security Professional (GISP) and the Certified Information Systems Security Professional (CISSP) certification exams.… Continued
-
CPU, PSU, SPU – Oracle Critical Patch Update Terminology Update
It’s never too late to change important terminology and confuse customers, that’s what Oracle must’ve been thinking…
Security Patch Update (SPU) terminology is introduced in the October 2012 Critical Patch Update as the term for the quarterly security patch. … Continued