Category Archives: Security

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

Cloud Comings and Goings

Cloud Comings and Goings

Cloud Power Amazon Web Services – the giant of cloud computing – is on track to do $10 Billion in revenue this year. Yet, rumors swirl that Apple may take a huge chunk of business away from them and Dropbox has definitely left AWS. Is something wrong at AWS? Wait, Salesforce.com (SFDC) – the granddaddy of…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

Developing Security Policies That Incorporate Cloud Solutions

Developing Security Policies That Incorporate Cloud Solutions

Developing Security Policies Implementing cloud computing services and technology means, to most, employing the latest solutions available, taking advantage of high-quality services that would be unaffordable in an on-premise situation, and benefiting from the skills and expertise required to ensure responsible compliance and absolute security. Although it is possible to find these complete solutions, business…

International Data Corporation (IDC) Lauds Innovations in Supercomputing with Innovation Excellence Awards

International Data Corporation (IDC) Lauds Innovations in Supercomputing with Innovation Excellence Awards

FRANKFURT, Germany, June 21, 2016 – International Data Corporation (IDC) today announced the tenth round of recipients of the HPC Innovation Excellence Award at ISC16, a major international supercomputing conference, in Frankfurt, Germany. This year’s winners include The Centre for Computational Medicine, University of Toronto; Walt Disney Animation Studios; DreamWorks Animation; Fortissimo/Ergolines GPUdb; United States…

Cross-Site Scripting – Why Is It A Serious Security Threat For Big Data Applications?

Cross-Site Scripting – Why Is It A Serious Security Threat For Big Data Applications?

Security Threat And Big Data Applications IBM, Amazon, Google, Yahoo, Microsoft – and the list goes on. All these leading IT enterprises have been affected by Cross-Site Scripting (XSS) attacks in the past. Cross-Site Scripting ranks third in the list of top-10 web application vulnerabilities listed by the Open Web Application Security Project (OWASP) –…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Cloud Access Management: Access Everywhere

Cloud Access Management: Access Everywhere

Cloud Access Management As the utilization of cloud applications has become a standard of using in nearly every industry, there needs to be solutions available to help manage these applications. One way for admins to effectively manage their organization’s applications is to use an automated account management solution for both in house and cloud applications.…