Regulatory Compliant Cloud Computing: Rethinking web application architectures for the cloud

Posted by Arshad Noor on  Dec 16, 2011

This article presents a web application architecture that leverages cloud resources and an enterprise key-management infrastructure to lower costs while proving compliance to data-security regulations 8

Introduction to Cloud Security Architecture from a Cloud Consumer's Perspective

Posted by Subra Kumaraswamy on  Dec 07, 2011

Security concerns plague cloud consumers so how should these concerns be addressed? This article introduces the basic principles and patterns that should guide a cloud security architecture.

Comparison of Intrusion Tolerant System Architectures

Posted by Quyen L. Nguyen and Arun Sood on  Nov 25, 2011

In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 3

Virtual Panel: Security Considerations in Accessing NoSQL Databases

Posted by Srini Penchikala on  Nov 15, 2011

NoSQL databases have been getting lot of attention lately but NoSQL data security is not given much emphasis. This article focuses on the security considerations in accessing NoSQL databases. 4

Developer-Driven Threat Modeling

Posted by Danny Dhillon on  Nov 11, 2011

In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats based on the dataflow diagrams for assessing and mitigating the security risks. 3

Mobile Attacks and Defense

Posted by Charlie Miller on  Oct 17, 2011

In this IEEE article, author Charlie Miller talks about mobile security vulnerabilities. He discusses how iOS and Android phones can be attacked using mobile malware and drive-by downloads.

Agile is at a crossroad: Scale or fail?

Posted by Chris Matts and Olav Maassen on  Oct 14, 2011

Risk management is a crucial discipline for projects, and finding ways to do effective risk management on agile projects will spell the difference between Agile scaling into the enterprise or failing. 5

Resilient Security Architecture

Posted by John Diamant on  Sep 27, 2011

In this IEEE article, author John Diamant talks about improving security quality of software applications using techniques like security requirements gap analysis and architectural threat analysis.

Architecting a Cloud-Scale Identity Fabric

Posted by Eric Olden on  Jun 29, 2011

In this IEEE article, author Eric Olden discusses an identity fabric that links multiple applications to a single identity to manage the volume of user identities in the cloud. 1

General Feedback
Editorial and all content copyright © 2006-2015 C4Media Inc. hosted at Contegix, the best ISP we've ever worked with.
Privacy policy