Quantcast
Channel: Solutions – Elastic Security
Browsing latest articles
Browse All 21 View Live

Image may be NSFW.
Clik here to view.

Elastic Vulnerability Assessment (EVA) Credentials for AWS EC2 and VPC

One of the major obstacles to Elastic Detector adoption is the step where infrastructure API credentials are asked. Security guys do not easily give their keys to strangers. We fully understand that,...

View Article



Image may be NSFW.
Clik here to view.

How to detect side-channel attacks in cloud infrastructures

Cloud Computing is a disruptive technology which brought enormous benefits. However, even if the benefits are countless, there are several security challenges, such as elasticity and multi-tenancy,...

View Article

Image may be NSFW.
Clik here to view.

Article on PenTest Magazine

Hi there, we are proud to announce that PenTest Magazine published our article titled “Detecting attacks and threats in elastic cloud infrastructures: the case of side-channel attacks”. You can...

View Article

Image may be NSFW.
Clik here to view.

Applications of ZMap: weak keys and HTTPS ecosystem

Hi there, in the previous post on ZMap we gave an overview on this new tool for high speed Internet scanning. In this post we will go into detail by showing remarkable findings and results achieved...

View Article

Image may be NSFW.
Clik here to view.

ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage

Hi there, in this post I will have the pleasure to introduce our proposed solution for secure block-level deduplication. We presented this work at IEEE CloudCom 2013 (here you can find the slides)....

View Article


Image may be NSFW.
Clik here to view.

Backup, Deduplication and Encryption: it’s now possible with ClouDedup

Hi there, in my previous post I presented ClouDedup, our solution for deduplication over encrypted data. I’m now gonna talk about how ClouDedup can be successfully deployed in order to address a very...

View Article

Image may be NSFW.
Clik here to view.

Interesting stuff from CyberTech 2014

Hi there, a couple of weeks ago I’ve attended CyberTech 2014, one of the most exciting industrial conferences for security experts. If you have read this blog before, you probably know that I’m pretty...

View Article

Image may be NSFW.
Clik here to view.

How to outsource your data to the Cloud without losing confidentiality and...

Hi there, recently, data leaks and various security incidents have been constantly part of daily news and scandals. From an end-user point of view, it looks like storing confidential data in the cloud...

View Article


Image may be NSFW.
Clik here to view.

Docker: Best Security Practices

Hi there, let’s start by saying that Docker is great, for many reasons. To mention one, the possibility of using a simple and lightweight tool to manage and deploy apps during all phases of their...

View Article


Image may be NSFW.
Clik here to view.

A deeper look at Whatsapp End-to-end Encryption

Hi all, a few days ago Whatsapp announced that end-to-end encryption is finally available on iOS and Android (only if you have the latest version of Whatsapp installed). That’s great news! It’s worth...

View Article
Browsing latest articles
Browse All 21 View Live


Latest Images