Privacy and Data Security - AWS Security Blog:
'via Blog this'
Monday, June 15, 2015
Friday, June 12, 2015
Why The OPM Breach Is Such a Security and Privacy Debacle | WIRED
By what authority did OPM operate without an IT Security group until 2013? It boggles the mind if true.
Why The OPM Breach Is Such a Security and Privacy Debacle | WIRED:
'via Blog this'
Why The OPM Breach Is Such a Security and Privacy Debacle | WIRED:
'via Blog this'
Friday, June 05, 2015
Tuesday, June 02, 2015
Google Identity Platform | Google Developers
Google Identity Platform | Google Developers: Identity tools from Google help you quickly build an auth system that will grow with your business and reduce the friction of getting users into your app.
'via Blog this'
'via Blog this'
Monday, June 01, 2015
NIST Computer Security Publications - Drafts
NIST Computer Security Publications - Drafts:
NIST requests comments on the draft report NISTIR 8062, Privacy Risk Management for Federal Information Systems, which describes a privacy risk management framework for federal information systems. The framework provides the basis for establishing a common vocabulary to facilitate better understanding of - and communication about - privacy risks and the effective implementation of privacy principles in federal information systems.
'via Blog this'
NIST requests comments on the draft report NISTIR 8062, Privacy Risk Management for Federal Information Systems, which describes a privacy risk management framework for federal information systems. The framework provides the basis for establishing a common vocabulary to facilitate better understanding of - and communication about - privacy risks and the effective implementation of privacy principles in federal information systems.
'via Blog this'
Tuesday, February 24, 2015
60-day Public Reviews for 11 #KMIP Candidate OASIS Standards - end April 18th | OASIS
60-day Public Reviews for 11 #KMIP Candidate OASIS Standards - end April 18th | OASIS:
The Key Management Interoperability Protocol (KMIP) is a single, comprehensive protocol for communication between clients that request any of a wide range of encryption keys and servers that store and manage those keys. By replacing redundant, incompatible key management protocols, KMIP provides better data security while at the same time reducing expenditures on multiple products.
'via Blog this'
The Key Management Interoperability Protocol (KMIP) is a single, comprehensive protocol for communication between clients that request any of a wide range of encryption keys and servers that store and manage those keys. By replacing redundant, incompatible key management protocols, KMIP provides better data security while at the same time reducing expenditures on multiple products.
'via Blog this'
Thursday, January 29, 2015
Cautionary Tales on Bitcoin Security – Bitcoin Magazine
Two factor authentication could have thwarted cashing in bitcoins when compromised by phishing attack.
Cautionary Tales on Bitcoin Security – Bitcoin Magazine:
'via Blog this'
Cautionary Tales on Bitcoin Security – Bitcoin Magazine:
'via Blog this'
Tuesday, January 27, 2015
CISCO - The Internet of Things How the Next Evolution of the Internet Is Changing Everything
The Internet of Things
How the Next Evolution of the Internet Is Changing Everything
'via Blog this'
How the Next Evolution of the Internet Is Changing Everything
'via Blog this'
Thursday, January 08, 2015
Subscribe to:
Comments (Atom)