Skip to main contentdfsdf

Rhm2ktmi's List: Cloud - Security

    • By many accounts, Satoshi came up with a real-world solution to a longstanding computer science paradox known as the double-spend problem, or the Byzantine General's problem (the professor who named it explains why he did so here). The challenge is how to send and receive money online without the need for a trusted third party, such as PayPal, ensuring that the same digital credit standing in for the amount being exchanged isn't being spent twice.
    • A startup called Ripple represents the most active threat to the mega-processors. (We profiled Ripple, and the group that created it, last month.)

    4 more annotations...

    • -Financial inclusion has become a long overdue buzzword among aid agencies and international economic policymakers of late – and it’s opening the door for bitcoin and blockchain technology to become a part of the discussion among international policymakers.
    • According to Oliver Bussmann, CIO of Swiss bank UBS , the biggest disrupting force is the blockchain – the underlying technology behind Bitcoin, the electronic-only currency which is created on computers and isn’t controlled by any government or centralized authority.

       

    • The blockchain is the open, decentralized online ledger which verifies transactions in the digital currency

    1 more annotation...

  • Rivetz 3

    Dec 16, 14

    • At Rivetz, we make it possible to connect web services to  trusted hardware in the user's device. When you can trust a device to provide basic uncompromised keys and transactions,  you can deliver more value with more convenience.
    • Rivetz runs local applets in the hardware of Android phones and PC's that provide a collection of services for securing an online relationship  with a user.

    1 more annotation...

    • IBM has been buying up a load of computer security firms over the past three years to strengthen its chops in the area – and now it has decided to take that gobbled tech to the cloud
    • Dynamic Cloud Security (DCS)

    5 more annotations...

    • There are many players in the field of identity and access management (IAM) ranging from the old guard of Oracle, CA, and IBM to newer players that are built specifically for the cloud.
    • the harder aspect of IAM is to extend this security model to the traditional enterprise, so the entire environment is secure.

    3 more annotations...

    • There’s this emerging trend that is becoming apparent as apps and infrastructure become more closely tied but also uniquely separate across sophisticated, distributed infrastructures that may be running on a corporate data center or on a cloud service.
    • Binding the app to this new kind of stack is an ecosystem of loosely coupled, adaptive software and service technologies that follow the workload, no matter what the infrastructure may be.

    2 more annotations...

    • NGFW (next-generation firewall)
    • We could see this being useful in cases where Skyhigh detects a SaaS-related threat coming from a particular source (which could be as simple as an IP address) and pushing a blocking rule to Palo Alto that blocks all traffic from that source (rather than just Web-based SaaS).

    1 more annotation...

    • Securing any system requires you to implement layers of protection.  Access Control Lists (ACLs) are typically applied to data to restrict access to data to approved entities. Application of ACLs at every layer of access for data is critical to secure a system. The layers for hadoop are depicted in this diagram and in this post we will cover the lowest level of access… ACLs for HDFS.
    • Thomas Davenport, in his keynote at the Hadoop Summit San Jose 2014, said that the big data analytics has entered a new phase: From Analytics 2.0 to 3.0. One aspect of the new phase is data discovery, curation, and relationships, creating new products and services in the data economy.
    • However, while they’ve accelerated an organization’s ability to quickly explore and analyze data, they struggle to help link disparate data sets. These data sets lack a foreign key such as an account number to link them. Without a key, users are forced to overlay the data models without the ability to use algorithms to aid in the deconfliction process, leading to collisions and duplication.

    5 more annotations...

    • On the webinar, Hortonworks’ Vinod Nair presented the recently-announced Apache Argus incubator: a central policy administration framework across security requirements for authentication, authorization, auditing and data protection. Sudeep Venkatesh, of Voltage Security, defined data-centric protection technologies that easily integrate with Hive, Sqoop, MapReduce and other Hadoop interfaces.
    • Apache Argus incubator: a central policy administration framework across security requirements for authentication, authorization, auditing and data protection.
    • The fundamentals and best practices of securing your Hadoop cluster are top of mind today. In this session, we will examine and explain the components, tools, and frameworks used in Hadoop
    • Data Security for Hadoop is a critical requirement for adoption within the enterprise. Organizations must protect sensitive customer, partner and internal information and adhere to an ever-increasing set of compliance requirements. The security challenges these organizations are facing are diverse and the technology is evolving rapidly to keep pace. 

       

    • protect sensitive data across various data stores including Hadoop, securing the data from unauthorized access while at rest, in use and in motion, still maintaining the value of the data for analytics, even in its protected form. Hortonworks and Voltage together are collaborating to provide comprehensive security for the enterprise to enable rapid and successful adoption of Hadoop

    3 more annotations...

    • Cupertino, CA – June 12, 2014 - Voltage Security, the leading expert in data-centric encryption and tokenization, today announced Voltage SecureData™ Suite for Test/Dev, a new solution providing maximum data protection with industry standards-accepted, next-generation Voltage Format-preserving Encryption™ (FPE) and Secure Stateless Tokenization™ (SST) technologies. 

       

    • The Hadoop 2.x update has made it possible for Hadoop-based platforms to expand the scope of this framework like never before. With additions such as YARN, Hadoop-based platforms can now be used to efficiently create Data Hubs.  Zaloni’s Bedrock Management Platform™ is a logical and superior choice for creating these data hubs for several reasons.
    • The fundamentals of a comprehensive security strategy start with user authentication and authorization, and network access control to evaluate the devices to which users are requesting access
    • t goes on to include rights management, directory services, data encryption, and decryption, with intrusion protection services constantly monitoring the environment for potential intruders. Missing on any of these fundamentals creates that “weakest link” that defines the true effectiveness of your security

    4 more annotations...

    • CloudMask's technology works on the premise that no one can be trusted with data - including cloud administrators, governments, employees, and even company IT administrators.
    • Its "zero trust mode" means only the owner of the data maintains control of decryption keys and decides who should get access to data. Workers in the same group can decrypt shared data which is nonetheless accessible to others in an organisation.

    2 more annotations...

1 - 20 of 286 Next › Last »
20 items/page
List Comments (0)