Quantcast
Channel: Payment Card Security & IT Controls Explained » cloud practices
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

RSA Europe 2009, London – Day 1

Below are my notes and takeways from the first day of RSA London.  The day started off with plenty of cinematics and a nature theme opening session by the heads of RSA.  The location is fantastic – the...

View Article



Image may be NSFW.
Clik here to view.

RSA Europe Conference 2009, Day 3 Recap

I attended the session first thing in the morning on Mal-ware with Michael Thumann of ERNW GmbH.  He gave quite a bit of technical detail on how to methodically go through the detection and...

View Article

Image may be NSFW.
Clik here to view.

Symantec’s 2010 State of Enterprise Security

The 2010 survey is complete and I have dug through and have the following thoughts to offer.  First off though – thank you to Symantec for making the information so readily available.  They have...

View Article

Image may be NSFW.
Clik here to view.

#RSAC Panel on Cloud – security and privacy

Security, Privacy, and liability are top issues for #Cloud security and a popular topic at #RSAC (RSA SFO 2011 Conference)  The first session today was moderated by Drue Reeves (Gartner), Michelle...

View Article

Image may be NSFW.
Clik here to view.

Infrastructure Security Response, Google excludes 11M+ domains

Google officially removed a “freehost” provider from a Korean Company that was providing the .co.cc domain (link to The Register article).  This was done on the basis of a large percentage of spammy or...

View Article


Image may be NSFW.
Clik here to view.

Mind the Gap: When third party services are not enough to achieve security or...

MasterCard published a very brief document outlining the very popular Use Case where a Merchant leverages a third party e-commerce system for processing transactions by redirecting to a separate hosted...

View Article

Image may be NSFW.
Clik here to view.

When you play whack-a-mole with File Transfer tools, you chase the mole!...

In the enterprise businesses are seeking to block channels of transferring files, and in many cases the need to manage these is valid and vital to specific business operations. In some cases such...

View Article

Image may be NSFW.
Clik here to view.

Download iCloud backups without the device, risk considerations

The ability to save data, sync information, and manipulate information online is extremely convenient and productive.  The risks that exist with this activity are fresh and emerging.  Unlike the...

View Article


Image may be NSFW.
Clik here to view.

Passwords are Dead, Part II 2nd False Premise – a collaborative research...

The advent of user created, managed and handled passwords as the sole means of authenticating is coming to an end. The utility of these was defined in an era based on assumptions of brute force...

View Article


Image may be NSFW.
Clik here to view.

Innovating and penetrating the market – Battlefield Leadership Series –...

Longues Sur Mer At this location on the coast of Normandy you can see the immense naval guns setup to attack oncoming ships in World War II. The Germans expended resources and relied heavily upon on...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images