Cloud Security – Who is Responsible?
A recent survey among cloud providers (via) raises the question about the responsibility for security between cloud-providers and cloud-users. A large majority of 69% out of the 127 cloud providers...
View ArticleCloud Security and the End-to-End principle
The End-to-End Argument The end-to-end principle in systems design has become famous for its successful implementation in the Internet architecture. It suggests “that functions placed at low levels of...
View ArticleSymposia Journal
The latest edition of the Symposia Journal is out, a magazine with community driven high quality articles around Cloud Computing (partly in German). We contributed to the latest edition with an article...
View ArticleTrust and cloud security conference
Last week I was happy to be part of the conference on Trust and Security for cloud computing, organized by the Pole SCS. I enjoyed the very good presentations and interesting ideas for collaborative...
View ArticleAutomation of Vulnerability Assessments with OpenVAS
To scan a host using OpenVAS, you will have to go through a configuration phase that can be done in two different ways, depending on your specific need: Using the Greenbone web interface Using the...
View ArticleApplications of ZMap: weak keys and HTTPS ecosystem
Hi there, in the previous post on ZMap we gave an overview on this new tool for high speed Internet scanning. In this post we will go into detail by showing remarkable findings and results achieved...
View ArticleBackup, Deduplication and Encryption: it’s now possible with ClouDedup
Hi there, in my previous post I presented ClouDedup, our solution for deduplication over encrypted data. I’m now gonna talk about how ClouDedup can be successfully deployed in order to address a very...
View ArticleCloud Storage: How to protect user credentials against malware
Hi there, recently, during the Black Hat USA 2015 event, some cyber security experts from Imperva unveiled a serious vulnerability that affected (it’s been fixed now) several major Cloud Storage...
View ArticleFirst Line of Defense: Best Security Practices for Users
Hi all, if you know us (if you don’t, this is a perfect time to catch up), you should know that SecludIT is mostly committed on building a great and cuttind-edge vulnerability scanner. Today we want to...
View ArticleA deeper look at Whatsapp End-to-end Encryption
Hi all, a few days ago Whatsapp announced that end-to-end encryption is finally available on iOS and Android (only if you have the latest version of Whatsapp installed). That’s great news! It’s worth...
View Article
More Pages to Explore .....