Protecting truckloads of data on the information superhighway

SSL Journal

Subscribe to SSL Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get SSL Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Before looking for a managed file transfer solution, it is important to determine how data is currently being transferred from your organization. You should find out what users and applications are performing the data transfers, where the source of the data resides, how sensitive the data is, how the data is formatted for the partners and what protocols are used to transmit the information. If the files are encrypted or compressed before transmission, find out what tools and standards are being utilized. After you’ve done your in-house analysis, then start a search for a secure file transfer solution that best fits your needs. Listed below are the Top 10 managed file transfer considerations: 1. Platform Openness – To reduce the points of connection to sensitive data and reduce the risk of exposure to those without a need-to-know the MFT solution should be installed ... (more)

Top Cloud Security Threats

To say that cloud security for cloud computing is gaining traction would be the understatement of our era.  Whether in public clouds, private clouds, or hybrid scenarios – it seems like everyone is in the cloud.  Healthcare providers, eCommerce, disaster recovery services, data storage . . . the types of cloud services available seem to cover every base.  What would Darwin think about his “Survival of the Fittest” evolving from animal species to businesses who take advantage of the flexibility, elasticity, and cost-effectiveness of cloud computing? But, there are dangers in the ... (more)

Bit.ly, Twitter, Security & You

..or, what I did on my twitter vacation the other day.  This brief break from 26 Short Topics about Security is brought to you by bit.ly, twitter, security and You.  I’ve been using bit.ly for a little while both to shorten links and be able to track clicks placed on twitter (and other social sites) – as many of you do.  When the twitter outage hit last week, and many folks found themselves ‘lost’ without it, I decided to review my stats on the bit.ly links I’ve sent and found something interesting; or frightening.  :-)  (Incidentally, there was a another DDoS attack yesterday ... (more)

The Bunker achieves PCI DSS Compliance

Kent, UK, 29 September 2009, The Bunker Secure Hosting Ltd (www.thebunker.net), a leading provider of Ultra Secure Data Centres and Managed Services on a range of technologies, today announces it has achieved Payment Card Industry (PCI) Data Security Standard (DSS) compliance, the internationally-recognised industry standard for payment account data security. PCI DSS is viewed by the payment card industry as the de facto security requirement for organisations that store, process or transmit cardholder details. The Bunker’s PCI DSS accreditation will help customers meet their o... (more)

Turning the Pushdo Bot into the Push-oh-no-you-don’t Bot

Options to put a stop to the latest mutation of the Pushdo trojan The Pushdo bot is a malevolent little beast that is nothing new to Infosec professionals. What might be new, however, is that it recently changed its code and now creates junk SSL connections. Lots of them. I mean you are likely seeing an unexpected increase in traffic by several million hits spread out across several hundred thousand IP addresses. No you didn't read that wrong that is millions of hits and hundreds of thousands of IP addresses. This might be a big deal if you're used to only getting a few hundred o... (more)

The Ascendancy of the Application Layer Threat

Many are familiar with the name of the legendary Alexander the Great, if not the specific battles in which he fought. And even those familiar with his many victorious conquests are not so familiar with his contributions to his father’s battles in which he certainly honed the tactical and strategic expertise that led to his conquest of the “known” world. In 339 BC, for example, then Macedonian King Phillip II – the father of Alexander the Great – became engaged in a battle at Chaeronea against the combined forces of ancient Greece. While the details are interesting, they are not ... (more)