security

Who is responsible for risk mitigation in the Cloud?

October 6th, 2010

RISK THREAT MITIGATING PARTY Insecure, Porous APIs Man in the middle, content threats, code injection, DoS attacks § Enterprise and Cloud Provider Logical Multi-Tenancy Virtual machine attacks, malicious code execution, comingled tenant data § Cloud Provider Data Protection and Confidentiality Reduced confidentiality and privacy for private data stored in the clear at the cloud provider

Building Super Secure Security

September 7th, 2010
Tags: , ,

Can a resilient and fail-safe security system be created?  Given time and money can the ultimate secure network technology be developed?  Defense Advanced Research Projects Agency (DARPA) intends to fund an initiative to find out and in June 2010 announced the Clean‐Slate Design of Resilient, Adaptive Secure Hosts (CRASH).  It relies on human biology to