Infrastructure security

Results: 6100



#Item
361Cryptography / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Cryptographic protocols / MD5 / Certificate authority / Public key certificate / HTTPS / Chain of trust / X.509

MD5 Considered Harmful Today Creating a rogue CA certificate Alexander Sotirov Marc Stevens Jacob Appelbaum Arjen Lenstra

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
362Computing / Prevention / Security / Cryptography / Crime prevention / Information governance / National security / Cloud computing / Data center / Information security / Risk management / Business continuity

Guidelines | Technical Infrastructure hosting Gaming and Control Systems Remote Gaming December 2015

Add to Reading List

Source URL: www.mga.org.mt

Language: English - Date: 2015-12-17 04:12:52
363Transport Layer Security / Key management / Public key infrastructure / E-commerce / Hypertext Transfer Protocol / HTTPS / Man-in-the-middle attack / Extended Validation Certificate / Certificate authority / Phishing / Moxie Marlinspike / Public key certificate

Sub-Prime PKI: Attacking Extended Validation SSL for Black Hat USA 2009

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
364Prevention / United States Department of Homeland Security / Safety / Engineering / Infrastructure / Dependability / Quality / Safety engineering / Critical infrastructure / Reliability engineering

ReSA4CI 2015: The 2nd International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection Workshop Programme September 22, 2015 Delft, The Netherlands

Add to Reading List

Source URL: safecomp2015.tudelft.nl

Language: English - Date: 2015-09-03 11:54:38
365Computing / Cloud computing / Cloud infrastructure / Cloud computing security / Threat Stack / Health Insurance Portability and Accountability Act / Computer security / Amazon Web Services / Logicworks / Cloud computing issues

CON TI N U O U S MO N ITO RIN G A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD Healthcare companies utilizing cloud infrastructure require continuous security monitoring. Learn how to prevent da

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-02 12:48:38
366Computing / Security / Cloud computing / E-commerce / Secure communication / Crime prevention / National security / Cloud infrastructure / Payment Card Industry Data Security Standard / Threat Stack / Computer security / Stack

SO LU TIO N B RIEF SECURITY SOLUTIONS FOR PCI DSS AND PII The media and publishing industry’s increasing migration to and expansion in the cloud means you’re tasked with minimizing risk and ensuring compliance throu

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-02 12:48:42
367Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / E-commerce / Public key certificate / Certificate authority / Extended Validation Certificate / CA/Browser Forum / Revocation list / Certificate policy

Draft of Final Forum Guideline Version 1.0 Draft of November 19, 2015 CA/Browser Forum

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2015-12-03 16:13:10
368Cryptography / Certificate authority / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / English phonology

IdenTrust ACES Access Certificates for Electronic Services

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-03-09 18:45:16
369Public key infrastructure / Public-key cryptography / Secure communication / Email encryption / Authentication / Transport Layer Security / Dynamic SSL

My Locker, Your Locker, Our Locker – How to Manage Keys and Certificates Pankaj Kumar Session Objectives

Add to Reading List

Source URL: pankaj-k.net

Language: English - Date: 2007-02-02 01:42:32
370Computing / Security / Business / Computer network security / Cloud computing / Computer security / Cloud infrastructure / Multitenancy / Software as a service / Security controls

Ashit Vora Manager, Security Assurance, Cisco Systems, Inc. September 18, 2012 IT resources and services that are abstracted from the underlying

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2012-09-06 07:18:36
UPDATE