Tag Archives: Security

Setting Up SSH Keys On A Linux Server

Securing Access To a Linux Server With SSH Private Keys As a cloud managed services provider we deploy and manage Linux infrastructure for our cloud customers. In many of the cases we manage the infrastructure ourselves and help the customers deploy their applications so no direct access to the servers is necessary. Other times our customers need direct… Read More »

Security Guide to Social Networks

Source: US Trendmicro by David Sancho INTRODUCTION Social networking sites are websites designed for human interaction. They enable users to meet others; keep in touch with them; and share experiences, feelings, and opinions. They are all built on a similar foundation—the user builds a network of contacts bound by an element of trust. The user then creates content… Read More »

ISO/IEC TR 27008:2011 – Information Technology – Security Techniques – Guidelines for auditors on information security controls

Source: American National Standards Institute (ANSI) The American National Standards Institute is pleased to announce the release of the new member of the ISO/IEC 27000 series, ISO/IEC TR 27008:2011 – Information Technology – Security Techniques – Guidelines for auditors on information security controls, which is now available from the ANSI standards store (webstore.ansi.org) ISO/IEC TR 27008:2011 provides guidance on… Read More »

Comprehensive, Lightweight Application Security Process (CLASP)

Source: OWASP CLASP (Comprehensive, Lightweight Application Security Process) provides a well-organized and structured approach for moving security concerns into the early stages of the software development lifecycle, whenever possible. CLASP is actually a set of process pieces that can be integrated into any software development process. It is designed to be both easy to adopt and effective. It… Read More »

PCI SSC Data Security Standards Overview

Source: PCI Security Standards Council The PCI Security Standards Council offers robust and comprehensive standards and supporting materials to enhance payment card data security. These materials include a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step. The keystone is the PCI Data Security Standard (PCI DSS),… Read More »