BT
rss
  • Answering Common Cloud Security Questions from CIOs

    by Gilad Parran-Nissany on  Feb 12, 2014 2

    With the news stories of possible data breaches at enterprises like Target, and the current trend of companies migrating to cloud environments for the flexibility, scalability, agility, and cost-effectiveness they offer, CIOs have been asking hard questions about cloud security.

  • Keeping Your Secrets

    by Dennis Sosnoski on  Sep 30, 2013 2

    Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how even at full strength most forms of encryption are vulnerable to data capture and later decryption if your private keys are exposed. In this article you'll learn some ways of making it more difficult for anyone to see or alter your data exchanges.

  • Automating Data Protection Across the Enterprise

    by Arshad Noor on  Feb 07, 2013

    This article builds on the foundational Regulatory Compliant Cloud Computing (RC3) architecture for application security in the cloud by defining a Data Encryption Infrastructure(DEI) which is not application specific. DEI encompasses technology components and an application architecture that governs the protection of sensitive data within an enterprise.

Encrypting the Internet

Posted by Satyajit Grover, Xiaozhu Kang, Michael Kounavis andFrank Berry on  Sep 22, 2009

The authors, from Intel, offer a three pronged approach to providing secure transmission of high volume HTML traffic using CPU instructions and a novel RSA algorithm to significantly reduce costs. 5

Automating File Uploads with SSH and Ruby

Posted by Matthew Bass on  May 29, 2007

Did you know that in Ruby is not just a powerful, general-purpose OO programming language? Ruby is also useful for scripting! 11

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT