Quantcast
Channel: Discussions – Elastic Security
Browsing latest articles
Browse All 16 View Live

Image may be NSFW.
Clik here to view.

Cloud Security – Who is Responsible?

A recent survey among cloud providers (via) raises the question about the responsibility for security between cloud-providers and cloud-users. A large majority of 69% out of the 127 cloud providers...

View Article



Image may be NSFW.
Clik here to view.

Cloud Security and the End-to-End principle

The End-to-End Argument The end-to-end principle in systems design has become famous for its successful implementation in the Internet architecture. It suggests “that functions placed at low levels of...

View Article

Image may be NSFW.
Clik here to view.

Symposia Journal

The latest edition of the Symposia Journal is out, a magazine with community driven high quality articles around Cloud Computing (partly in German). We contributed to the latest edition with an article...

View Article

Image may be NSFW.
Clik here to view.

Trust and cloud security conference

Last week I was happy to be part of the conference on Trust and Security for cloud computing, organized by the Pole SCS.  I enjoyed the very good presentations and interesting ideas for collaborative...

View Article

Image may be NSFW.
Clik here to view.

Automation of Vulnerability Assessments with OpenVAS

To scan a host using OpenVAS, you will have to go through a configuration phase that can be done in two different ways, depending on your specific need: Using the Greenbone web interface Using the...

View Article


Image may be NSFW.
Clik here to view.

Applications of ZMap: weak keys and HTTPS ecosystem

Hi there, in the previous post on ZMap we gave an overview on this new tool for high speed Internet scanning. In this post we will go into detail by showing remarkable findings and results achieved...

View Article

Image may be NSFW.
Clik here to view.

Backup, Deduplication and Encryption: it’s now possible with ClouDedup

Hi there, in my previous post I presented ClouDedup, our solution for deduplication over encrypted data. I’m now gonna talk about how ClouDedup can be successfully deployed in order to address a very...

View Article

Image may be NSFW.
Clik here to view.

Cloud Storage: How to protect user credentials against malware

Hi there, recently, during the Black Hat USA 2015 event, some cyber security experts from Imperva unveiled a serious vulnerability that affected (it’s been fixed now) several major Cloud Storage...

View Article


Image may be NSFW.
Clik here to view.

First Line of Defense: Best Security Practices for Users

Hi all, if you know us (if you don’t, this is a perfect time to catch up), you should know that SecludIT is mostly committed on building a great and cuttind-edge vulnerability scanner. Today we want to...

View Article


Image may be NSFW.
Clik here to view.

A deeper look at Whatsapp End-to-end Encryption

Hi all, a few days ago Whatsapp announced that end-to-end encryption is finally available on iOS and Android (only if you have the latest version of Whatsapp installed). That’s great news! It’s worth...

View Article
Browsing latest articles
Browse All 16 View Live




Latest Images