Skip to main content

Home/ Groups/ Information Security
1More

Financial Cryptography - 0 views

1More

The SwitchWare Project - 0 views

  • The SwitchWare Project Active Network Research at Penn and Bellcore Active networks explore the idea of allowing routing elements to be extensively programmed by the packets passing through them. This allows computation previously possible only at endpoints to be carried out within the network itself, thus enabling optimizations and extensions of current protocols as well as the development of fundamentally new protocols. Welcome to the SwitchWare home page, describing the Active Networks research effort underway in the Penn Department of Computer and Information Science and Bellcore as well as pointers to related material.
1More

http://theory.lcs.mit.edu/~rivest/ducttape.txt - 0 views

  •  

2More

SAML Single Sign-On (SSO) Service for Google Apps - Google Apps APIs - Google Code - 0 views

  • SAML Single Sign-On (SSO) Service for Google Apps
  •  
    Google Apps offers a SAML-based Single Sign-On (SSO) service that provides partner companies with control over authorization and authentication of hosted user accounts to access web-based applications like Gmail or Google Calendar
1More

Your dashboard on idproxy.net - 0 views

  • dashboard on idproxy.net
1More

Infoblox Network Identity Appliances - DNS, DHCP, RADIUS - 0 views

  •  
    appliances provide the essential foundation for identity-driven networks (IDNs), delivering reliable, scalable, and secure network identity services including DNS, DHCP, IPAM, and RADIUS.
1More

IT Controls: How and Where Do You Start? - 0 views

  • As Stephen Katz, former CISO of Citibank, once said, "Controls don't slow the business down; like brakes on a car, controls allow you to go faster."
1More

OpenTC and Trusted Computing at the IBM Zurich Research lab - 0 views

  •  

1More

myNetWatchman - Network Intrusion Detection and Reporting - 0 views

  • Q: What is myNetWatchman? A: myNetWatchman collects, analyzes and reports malicious access attempts to ISPs, who can then take action against the offending machines. [Back to top] Q: How does it work? A: A small client-side application runs as a background application on your system; reading your firewall logs, and creating near-real-time reports that are relayed to the myNetwatchman servers for analysis. [Back to top]
2More

ISO27k infosec management standards - 0 views

  • ISO27k standards provide generally accepted good practice guidance on Information Security Management Systems to protect the confidentiality, integrity and availability of the information content and information systems
  •  
    iso27k iso27000
1More

Companies need to sell security to business-unit execs - Network World - 0 views

  • Stamp says that business units must accept responsibility for the security of the data they generate and control to head off data leaks. "IT people are data custodians, not owners," Stamp says. "We need to transfer responsibility to business people
1More

DRM-roll for consumer privacy protection - Network World - 0 views

  • Through DRM technologies, consumers engaging in electronic commerce could grant vendors and suppliers a license to access and utilize certain aspects of the consumers’ data. This would enable a consumer to grant a read/write license to some creditors, perhaps as a function of a mortgage agreement, and provide a read-only license to a limited subset of the data for simple transactions such as shipping agreements and online orders. Such a license would empower consumers to prevent entities from misusing or reselling consumer information.
2More

Personal Identity Provider (PIP) - Download the Seatbelt - 0 views

  • VeriSign's OpenID SeatBelt Plugin
  •  
    SeatBelt is a Firefox plug-in that assists you when signing in to OpenID sites with your Personal Identity Provider (PIP) URL.
1More

Coordinated Russia vs Georgia cyber attack in progress | Zero Day | ZDNet.com - 0 views

  • Coordinated Russia vs Georgia cyber attack in progress
2More

What a Botnet Looks Like - CSO Online - Security and Risk - 0 views

  • What a Botnet Looks Like
  •  
    Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings
2More

Laptops: How to Thief-Proof Your Laptop - 0 views

  • How to Thief-Proof Your Laptop
  •  
    PC World magazine rounds up eight tips to stop thieves from stealing your laptop
1More

GOES - Global Online Enrollment System - 0 views

  • Global Online Enrollment System allows registered users to enter their own applications for U.S. Customs and Border Protection (CBP) Trusted Traveler Programs
‹ Previous 21 - 40 Next › Last »
Showing 20 items per page