saasificationsecurity.com
Displaying items by tag: transparency
http://www.saasificationsecurity.com/index.php/component/k2/itemlist/tag/transparency
Subscribe to this RSS feed. Zaterdag, 13 december 2014 00:00. Security and Transparency: How Google Handles Data by Eran Feigenbaum. First and for most, as a Chief Information Security Officer (CISO) at a company, one should ask himself: "What am I going to protect? What are my valuable assets? The answer to these questions depends heavily on the kind of business that you're dealing in. Some examples could be:. Technology, Scale, Agility. Someone needs the key to the store". In conclusion, we see that Go...
saasificationsecurity.com
Displaying items by tag: framework
http://www.saasificationsecurity.com/index.php/component/k2/itemlist/tag/framework
Subscribe to this RSS feed. Zaterdag, 13 december 2014 00:00. ENISA: European approach towards secure cloud adoption. ENISA is active and operational in several fields being:. Providing recommendations to member states on security best practices;. Mobilizing communities and raising security awareness;. Commenting about Security Developments related to Cloud impacting SaaS. SaaSification Security Challenges and Solutions. Security Considerations to Steps to SaaSification.
leadersinsecurity.org
LSEC - Leaders in Security - Projects
https://www.leadersinsecurity.org/projects.html
International Partners and Affiliates. Members of the Board and committees. Industrial Collaboration and topics that we cover. LSEC supports existing and new ideas on how to deal with IT- / cyber security challenges. LSEC develops industrial collaborations; creates programs, supports industry initiatives that unite security stakeholders and participates in research projects funded by the European Commission and other stakeholders. For more information click here. Thanks to SaaS, companies can now reach a...
saasificationsecurity.com
Displaying items by tag: Netskope
http://www.saasificationsecurity.com/index.php/component/k2/itemlist/tag/Netskope
Subscribe to this RSS feed. Zaterdag, 22 november 2014 00:00. Anatomy of a data breach. What type of security measures can be taken? It is obvious that we (the good guys) need to be right 100% of the time, for the bad guys however, they only need to be successful 1% of the time. Krishna Narayanaswamy is Chief Scientist and founder at Netskope. He gave a talk about what data breaches are and how to prevent them while using cloud applications. Is another main cause of data breaches. A last cause which coul...
saasificationsecurity.com
News & Relevant Developments
http://www.saasificationsecurity.com/index.php/news
News and Relevant Developments. Donderdag, 26 juni 2014 00:00. European Cloud SLA Standardisation Guidelines C-SIG. Written by Ulrich Seldeslachts. On June 26th, the European Commission launched the C-SIG, guidelines for standardisation to help business users save money and get the most out of cloud computing services. Being cloud service customers. More information and the C-SIG can be downloaded on the. News and Relevant Developments. Woensdag, 10 september 2014 00:00. Written by Selina Zeegers. From N...
saasificationsecurity.com
Displaying items by tag: europe
http://www.saasificationsecurity.com/index.php/component/k2/itemlist/tag/europe
Subscribe to this RSS feed. Zaterdag, 13 december 2014 00:00. ENISA: European approach towards secure cloud adoption. ENISA is active and operational in several fields being:. Providing recommendations to member states on security best practices;. Mobilizing communities and raising security awareness;. Commenting about Security Developments related to Cloud impacting SaaS. SaaSification Security Challenges and Solutions. Security Considerations to Steps to SaaSification.
saasificationsecurity.com
Displaying items by tag: saas security
http://www.saasificationsecurity.com/index.php/component/k2/itemlist/tag/saas%20security
Subscribe to this RSS feed. Woensdag, 18 februari 2015 00:00. Protecting Code in the Cloud. Before we dive into solutions against reverse engineering, it is important to stress that there is no such thing as a silver bullet when it comes to protecting your code. It is not a solvable problem, but very well a manageable problem. Attackers always work with one important question in mind:. Is the effort, that I have to put in, enough to justify the gain I get out of it? Running on a debugger? Where possible,...
saasificationsecurity.com
Displaying items by tag: reverse engineering
http://www.saasificationsecurity.com/index.php/component/k2/itemlist/tag/reverse%20engineering
Subscribe to this RSS feed. Woensdag, 18 februari 2015 00:00. Protecting Code in the Cloud. Before we dive into solutions against reverse engineering, it is important to stress that there is no such thing as a silver bullet when it comes to protecting your code. It is not a solvable problem, but very well a manageable problem. Attackers always work with one important question in mind:. Is the effort, that I have to put in, enough to justify the gain I get out of it? Running on a debugger? Where possible,...
saasificationsecurity.com
Events
http://www.saasificationsecurity.com/index.php/events
SaaSification Security Bootcamp - SaaS providers challenges to Compliance. Geschreven door Ulrich Seldeslachts. June 5th 2015, Enabling Advanced Security and Connectivity to the Microsoft Azure Cloud , by Barracuda Networks. Geschreven door Ulrich Seldeslachts. September 29th, 2014 - Securing the Cloud and Cloud Security 2014. Geschreven door Ulrich Seldeslachts. December 1st, 2014 : Nebucom LSEC SaaSification Security Bootcamp 1. Geschreven door Ulrich Seldeslachts. Geschreven door Ulrich Seldeslachts.
SOCIAL ENGAGEMENT