Privacy in Hostile Environments?
Mark Zuckerberg says that the age of privacy is over. Those who feel socially invulnerable and are totally confortable to give control over their personal data into the hand of American startup...
View ArticleAmazon Web Services last push towards security and compliance: CloudHSM
We are getting used to the fast pace of innovation and new tools brought by Amazon Web Services (AWS), but this week CloudHSM announcement was a surprise. So, you do not trust AWS to store your keys...
View ArticleClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
Hi there, in this post I will have the pleasure to introduce our proposed solution for secure block-level deduplication. We presented this work at IEEE CloudCom 2013 (here you can find the slides)....
View ArticleBackup, Deduplication and Encryption: it’s now possible with ClouDedup
Hi there, in my previous post I presented ClouDedup, our solution for deduplication over encrypted data. I’m now gonna talk about how ClouDedup can be successfully deployed in order to address a very...
View ArticleHaving a look inside public Amazon’s buckets
Hi there, today I want to share with you guys the results of my analysis on public Amazon’s buckets. In the context of my research activity on data security in the cloud and the security of Amazon EC2,...
View ArticleHow to outsource your data to the Cloud without losing confidentiality and...
Hi there, recently, data leaks and various security incidents have been constantly part of daily news and scandals. From an end-user point of view, it looks like storing confidential data in the cloud...
View ArticleCloud Storage: How to protect user credentials against malware
Hi there, recently, during the Black Hat USA 2015 event, some cyber security experts from Imperva unveiled a serious vulnerability that affected (it’s been fixed now) several major Cloud Storage...
View ArticleFirst Line of Defense: Best Security Practices for Users
Hi all, if you know us (if you don’t, this is a perfect time to catch up), you should know that SecludIT is mostly committed on building a great and cuttind-edge vulnerability scanner. Today we want to...
View ArticleA deeper look at Whatsapp End-to-end Encryption
Hi all, a few days ago Whatsapp announced that end-to-end encryption is finally available on iOS and Android (only if you have the latest version of Whatsapp installed). That’s great news! It’s worth...
View Article
More Pages to Explore .....