Quantcast
Channel: LayeredTrust
Browsing all 17 articles
Browse latest View live

Programmable Security – Architecting for the Future

Following my Friday fun post titled ‘Houston We have a Problem…(aka A Cool State of Security Report 2013‘, an interesting discussion started on twitterverse regarding liabilities to damages related to...

View Article



The Value of FedRAMP Compliant Cloud Service Providers

FedRAMP (Federal Risk and Authorization Management Program) is a US Government initiative to enable government organisations to procure security accredited Cloud Service Providers (CSPs). The program...

View Article

With Great Cloud Apps Comes Great Security – Authentication At Least!

Twitter released its two-factor authentication ‘feature’ yesterday.  Given the time it took to roll it out, I anticipated it to be a non-shared dedicated mobile application (like Microsoft or Google)...

View Article

Programmable Security – The Security API Calls Are Coming. Who’s Taking Them?

Today, Rich Mogull of Securosis wrote a very interesting post on Software Defined Security (SDS) with AWS, Ruby and Chef. I’ve written my thoughts on programmable security earlier. It is great to see...

View Article

What was/is wrong with RSA’s BSAFE?

Happy New Year! It has been a while. An article in The Register summarises the developments well on the RSA Conference boycott, so I will resist covering this for background. I spent sometime yesterday...

View Article


Bad security architecture – No substitute for CodeSpaces.com

Code Spaces will not be able to operate beyond this point. The cost of resolving this issue to date and the expected cost of refunding customers who have been left without the service they paid for...

View Article

Poll: Public Cloud Security – The Essential Controls Baseline

When consulting with the community on topics related to cloud, we often debate what is the minimum security baseline for an enterprise to look for in cloud service providers. We have created a public...

View Article

The State of Public Cloud Infrastructure Security

Last month, Gartner’s Research VP, Lydia Leong, published the popular Magic Quadrant on Cloud Infrastructure as a Service for 2014. The report is available for a free reprint here. The report...

View Article


Swisscom follows Ericsson, buys into strategic OpenStack investments

Swisscom, the leading Swiss telecoms provider, has followed the footsteps of Ericsson. PLUMgrid and Swisscom announced today that they have teamed up to build secure, agile network infrastructure using...

View Article


CloudLock’s Growth Continues, Confirms the Increasing Need for Cloud Security

The need to identify, assess and control the data going out to cloud is ever increasing. CloudLock, a cloud information security startup with more than 80 employees, posted a 114 percent revenue growth...

View Article

Security Baseline For Public Cloud Infrastructure Services

Public cloud infrastructure providers primarily offer compute resources, storage resources, in the form of Block and Object Storage, and to a certain extent networking on a self-service pay as you go...

View Article

Barbican: Data Security For OpenStack Clouds And More

I recently wrote about OpenStack Barbican for thenewstack.io here. This post aims to provide a deeper understanding of Barbican, the project benefits and some additional insights. We interviewed Jarret...

View Article

Why The Two-Factor Authentication User Atrocity Must Stop

We’ve all been advised to enable two-factor authentication (2FA) on our accounts. Being a security professional, I try and enable 2FA in applications and services whenever available and possible. If...

View Article


HP Attempts To Corner Open Cloud With Eucalyptus

Eucalyptus is joining HP. With Citrix’s cloud leadership departing recently from the CloudStack project, it leaves OpenStack as the only open source project with solid support from the industry giants....

View Article

Information Transparency Reports: A Baseline for Cloud by Apple, Google and...

Apple released its privacy and transparency position in an update today. The emphasis clearly is to instil and maintain trust on issues around security and privacy for Apple device and service users....

View Article


Duo Security – A New Approach to ‘What You Have’ in 2FA

We have written about the problems in using two-factor authentication earlier. The user experience from setup to the execution and management is not an easy one. To check the ‘usability-index’ of a...

View Article

Why Security Automation Is The Way Forward: Lessons from Bash Vulnerability

According to seclists.org, Stephane Chazelas discovered a vulnerability in bash, related to how environment variables are processed: trailing code in function definitions was executed, independent of...

View Article

Browsing all 17 articles
Browse latest View live




Latest Images