Tagged: security

Subscribe to our Blog

    | 1 MINUTE READ

    Anjuna Enterprise Enclaves Now Available for Redis

    Users of Redis now have a simple way to prevent insiders or bad actors from gaining unauthorized access to Redis databases through infrastructure...


    | 4 MINUTE READ

    Compiler-based Techniques for Enhancing Performance and Privacy in Enclaves

    I’ve been collaborating for a while with the ACSL research lab at the Technion and this collaboration has resulted in the recent publication of...


    | 2 MINUTE READ

    Securing Applications On Bare-metal Instances

    Conventional approaches to securing applications have relied primarily on software to provide protection. However good the software implementation...


    | 2 MINUTE READ

    How Do You Avoid the Facebook Passwords Security Issue and Protect Your Customers’ Secrets?

    ‘Krebs on Security’ recently published that hundreds of millions of Facebook users had their account passwords stored in plain text and searchable...


    | 3 MINUTE READ

    Runtime Protection for Secrets Management

    Hashicorp Vault is one of the most popular secrets-management solutions. It helps manage secret parameters, cryptographic keys and...


    | 2 MINUTE READ

    Container Security Holes

    We can’t think of a better way to put it then the ZDNet article [1]:

    One of the great security fears about containers is that an attacker could...


    | 4 MINUTE READ

    Why Protection Against Root Users Is Important

    Security company Qualys has recently disclosed vulnerabilities in Linux’s Systemd, the default service manager daemon for many Linux...