Following the news that a developer has discovered a way to use Google Web crawlers to perform SQL injection attacks on other people’s sites, Amichai Shulman, CTO of Imperva, explains why hackers target search engines:
Browsing: Identity and Access Management (IAM)
The CSA continues to build its agenda for the upcoming Cloud Security Alliance Congress, adding a number of notable and heavily debated presentations
The revelations stemming from the documents exfiltrated by former NSA contractor Edward Snowden have changed the way we look at many things
McAfee released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season
Chinese Bitcoin exchange GBL has shut down, taking with it over 25 million yuan (£2.5m, $US4.1m) of investors’ money, in another warning to those who don’t look before they leap with the digital currency.
Now in general availability, Adallom advances the way enterprises secure information in SaaS applications by monitoring all activity, detecting unauthorized access and protecting users in real-time
According to a new report by Der Spiegel, the British signals intelligence spy agency has again employed a “quantum insert” technique as a way to target employees
Former Lavabit proprietor Ladar Levison claims the new Dark Mail initiative he’s cooking up with the team from Silent Circle will enable email that’s virtually spy-proof, but according to at least one expert
This discussion will highlight the importance of establishing organizational identity which is a key component for shared local, regional, national and international situational awareness.
Authentication is one of the essential components of security; it is one part of the concept known as Authentication, Authorization, and Accounting (AAA).